BSidesOklahoma 2019 April 12, 2019 to April 12, 2019, Oklahoma, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Zero to logging in 50 minutes! Stephen Nelson It is 2019 and your company doesn’t even have centralized log management. Management won’t let ...
Quick Wins To Enhance Your Active Directory Security Eric Kuehn Active Directory environments are typically the lifeblood of every company; acting as the core authentication ...
Imperial Stout: Building Bolder BurpSuite Functionality through Extensions Jason Gillam I have been building tools and extensions to support penetration testing tasks for many years, ...
The Future of Security Assessments with UAVs and Drones The Agency The ability to fly and own your own UAV or drone has become increasingly easier ...
Introducing ArTHIR –ATT&CK Remote Threat Hunting Incident Response Windows tool Michael Gough ArTHIR is a modular framework that can be used remotely against one, or many target ...
What to do during an IR Event Donovan Farrow Get prepared for an attack! 5 Scenarios that will help you accurately stop the Hack!
Harden Your Web App - How I Learned to Stop Worrying Kristopher Wall Ever wonder how the bad guys break into web servers? Curious what they're looking for? ...
Is your InfoSec program "Livin' on a Prayer"? Chad Kliewer Even though there are no rock stars in InfoSec, we can use classic rock as ...
The Next Generation of APIs - GraphQL and its Security Landscape Matthew Moses The popularity of GraphQL APIs is on the rise. Open sourced by Facebook in 2015, ...
Panel Round 1 Moss Vs Lawlz It's gonna get weird.
Can we protect privacy without breaking the web? Luke Crouch Privacy, Cross-Origin Resource Sharing, Cookies, oh my!
Securing Industrial Control Systems Pedro Serrano A quick look at the most important steps in trying to secure Industrial Control Systems ...
Defending and Responding to Business E-Mail Compromises within Office 365 Michael Waters A discussion of Office 365 incident response and forensics capabilities, security features, and how security ...
Panel Round 2 Moss Vs Lawlz Lawlz briefly takes the upper hand!
HACKERS, HOOLIGANS, HEISTS, & HISTORY Arron Harrell From 19th century mechanical computers to telephones, radios, digital computers & the Internet, sabotage, fraud, ...
Securing Industrial Control Systems (continued) Pedro Serrano A quick look at the most important steps in trying to secure Industrial Control Systems ...
UEFI, BMC, and the Gremlins Therein Nathan Keltner Your modern computer is a matryoshka doll of computers, computers inside computers, and it’s also ...
Cyber Patriot Panel Julio Tirado Recruiting the next generation into information security roles is a priority. Join us to learn ...
Improving Incident Response with Real-World Attacks Nathan Sweaney This talk is designed to help small/medium businesses think through how they respond to security ...
CMMI and Incident Response Joe Sullivan Incident response is a technical process by nature, but do you know how to develop ...
Anomaly Factor: Analyzing Packets to Determine Fact from Fiction Ramece Cave Explore the intriguing world of protocol anomalies. Learn how to analyze PCAP and log data ...
What's zDeal with zBang?! Discover Hidden Risks in AD with zBang Andy Thompson Did you know, just because a user isn’t in the Domain Admins group doesn’t mean ...
The New Normal: Assessing Modern Applications in Today's Environments Jason Gillam Application development and deployment practices have changed significantly in recent years. In a world of ...
Penetration Testing - Lessons Learned 2018 Aaron Bozarth Josh Bozarth and Aaron Moss will discuss several trends that we saw as attackers over ...
Just enough Bitcoin to execute cryptojacking attacks with JavaScript Luke Crouch Whatever their price, Bitcoin and cryptocurrencies continue to provide interesting technical and security opportunities. This ...
Introduction to Social Engineering Forensics The Agency After a security incident we can easily address the technical details of an attack, however ...
PowerShell to the People! Jimmy Lawlz We'll be starting with some basic PowerShell (PS) how to’s, mainly things I wish I ...
It’s Not the Technology Stupid – Enterprise Tips and Tricks for Getting Things Done Ian Anderson Most people assume challenges in information security are of a technical type, but the challenges ...