Last year’s CyberX Tampa Bay event was a big hit, and it was only natural that there’d be another one this year. Like the first one, this year’s event was packed.
The moment I walked into the venue, I saw so many people and had so many conversations that I never got the chance to take pictures until the start of the “welcome” session in the large room:
…after which we had the choice of two breakout sessions:
Chronicles of an Entry-level Cybersecurity Professional
The Wheel of Misfortune
I went to the Wheel of Misfortune, where audience members got the chance to answer cybersecurity questions for Google swag. Anyone in the audience could volunteer to come up to the front, spin the wheel of topics and answer a question based on that topic.
Hosts Jason Allen and Jonas Kelley were pretty relaxed about audience assistance. At one point, I yelled out the acronym for remebering the 7 layers of the OSI network model — “Please Do Not Take Sausage Pizza Away!” — and no one was penalized.
The room, where every seat and available spot to stand was occupied, was lively, with people enjoying themselves. The audience participation, aided by two engaging hosts, kept the room lively until the very end.
It was then time to recognize CyberX Tampa Bay’s 2023 honoree — someone nominated by attendees as being the person who made the biggest positive impact on Tampa Bay’s cybersecurity scene. This year’s honoree was Jeremy Rasmussen!
And to close the evening, there was the keynote panel on cybersecurity myths. It featured…
Photo by Kasandra Perez. Tap to view at full size.
I attended BSides St. Pete last Saturday, the second anniversary of this event, and it was nice to see that attendance had more than doubled. It’s nice to see the that the Tampa Bay cybersecurity community is active on both sides of “The Other Bay Area!”
BSides gets it name from “b-side,” the alternate side of a vinyl or cassette single, where the a-side has the primary content and the b-side is the bonus or additional content. In 2009, when the Black Hat conference in Las Vegas received way more presentation submissions than they could take on, the rejected presenters (who still had very could presentations; there just wasn’t enough capacity for them) banded together and made their own “b-side” conference that ran in parallel with Black Hat. From that event came BSides.
Opening keynote: Between Two Palms: A Session on Burnout
The day started at 9 with the opening keynote, which took place not only on the main stage, but between two palm plants, as promised in its title:
The keynote was a frank discussion moderated by John “Cochise” Buzin (one of my instructors at the UC Baseline cybersecurity course I took in the summer of 2020) and featured Chris Machowski (also one of the people behind the UC Baseline course) and Elvira Reyes.
While they stated quite clearly that they aren’t psychology professionals, they are very active in the cybersecurity field, and each of them knows something about burnout from personal experience.
Over their talk, they talked about what they identified as the five stages of burnout, starting with stage one, the honeymoon phase:
This stage is marked by the following:
Job satisfaction
Accepting responsibility
Sustained energy levels
Unbridled optimism
Commitment to the job
Compulsion to prove oneself
Free-flowing creativity
High productivity levels
Stage two is the onset of stress:
In this stage, you’ll experience:
CV symptoms
Inability to focus
Irritability
Reduced sleep quality
Lack of social interaction
Lower productivity
Anxiety
Avoidance of decision-making
Change in appetite
Headache
Neglect of personal needs
Fatigue
Then comes stage three — chronic stress:
Symptoms of this stage include:
Persistent tiredness
Procrastination
Resentfulness
Social withdrawal
Aggressive behavior
Apathy
Chronic exhaustion
Cynical attitude
Decreased sexual desire
Denial of problems
Feeling threatened
Feeling pressured
Alcohol/drug consumption
Next, stage 4, burnout:
Here’s what you’ll experience in this stage:
Obsession with problems
Pessimistic outlook
Physical symptoms
Self-doubt
Social isolation
Chronic headaches
Chronic GI problems
Neglect of personal needs
Escapist activities
Behavioral changes
And finally, stage 5 — habitual burnout:
And with this comes:
Chronic sadness
Chronic mental fatugue
Chronic physical fatigue
Depression
After this rather gloomy description of burnout’s stages came the things you can do to counter burnout:
They generally boil down to “take better care of yourself,” which is in agreement with what the Mayo Clinic says.
I thought their use of the iconography from the Fallout games for the topic of burnout was pretty clever.
Anonymous trooper
I passed by this fella on the way to the next session:
How to build a cybersecurity journey
I caught a bit of Ivan Marchany’s session, How to Build a Cybersecurity Journey, one of the presentations that covered how one gets into the business of cybersecurity.
Among other things, he covered building your own cybersecurity lab…
…and reminded the audience that as far as prospective employers and clients are concerned, you are your projects:
And equally important is the fact that if you don’t have some kind of online presence in this day and age, you effectively don’t exist to employers and clients:
This was a popular topic, and Ivan was playing to a standing-room-only audience:
Cyber risk management
I also caught the tail end of Dan Holland’s presentation, Complexity is the Enemy: How to start doing Cyber Risk Management. I’m pretty sure I arrived at one of the most important slides, the “risk as a product of probability and impact” slide:
I plan to share this slide on the Okta Slack’s “random” channel:
And here are the takeaways from Dan’s presentation:
A Urinal Story: Human Behavior & Security
Somehow, I managed to miss the “urinal story” part of Daniel Lopez’ and Ashwini Machlanski’s presentation on helping firm up the human element in cybersecurity. They covered key parts of managing people through the use of behavioral science and little tricks like “nudges” to get people to be more security-compliant.
This slide summarizes their key takeaways quite well:
Ashwini and Daniel handed out my favorite stickers from the conference:
My one tragic mistake
In wandering the halls and checking out what was happening in other rooms, I failed to catch Stacey Oneal’s Getting into Cybersecurity presentation, which was on my list. I owe her one — I promise I’ll catch you at your next presentation, Stacey!
Super Grouper hadn’t opened by the time I got to the trucks, so I got an Elvis Burger from 1 Up. It’s been a while since I last had a peanut butter-and-bacon burger, and I enjoyed mine. I know it sounds weird, but it’s worth trying!
Lunch keynote: Becoming a Proactive Defender
While having lunch, I caught most of Christopher Peacock’s presentation, Becoming a Proactive Defender:
I’m going to steal his line, “The best teacher is the adversary; the adversary always gets a vote.”
IAM Security and So Can You: An Intro to Identity Access Management and How to Beat It to a Pulp
I’ve been told that there was a presenter at BSides Tampa that was a bit of dick and overdid it with his bad-mouthing Okta while I wasn’t in the room, so while this talk featured a different presenter, you’d better bet your ass that I was going to be at this one.
But Jarred “Raydar” Pemberton was a lot more reasonable than the other guy. He got an intro from Cochise, who not only mentored him, but convinced him that he should give this presentation. That was a good call; in matters of cybersecurity, if Cochise suggests you do something, it’s generally a good idea to do it.
“Does SSO scare red teamers?” Jarrad asked. “Yes,” he plied to his own question, saying that it’s the kind of thing he shied away from.
Jarrad told us about what he does for a living. It’s always fascinating to see how people who use the stuff we make work with it:
Take note of that last point: in addition to the HR staff or outside HR consultants like “The Bobs,” another person that might be at your termination meeting is someone whose job is to close your work accounts.
If you’re ever unfortunate enough to be a guest at a layoff meeting, you may encounter “The Bobs” (a term from the film Office Space). Find out more about them here.
I’m actually on the Auth0 side of Okta, which provides a service for customer logins, versus the Okta side of Okta, which handles SSO (single sign-on) for the workforce. My experience with the Okta service is mostly as a user: I use it to log into systems at work:
Yup, that’s an Okta slide! Jarrad’s take on Okta:
“One that I work a lot with and do like quite a bit”
“Super easy to use”
“Simple to get brought up to speed”
“It’s what I would recommend to an org if they can afford it”
(Note to self: Send Jarrad some swag.)
SSO, in addition to letting a workforce since into various work systems with a single set of credentials, has other uses, including certain HR-related tasks:
Monitoring access and, by virtue of knowing who’s logging into what, see who’s really coming into the office and who’s merely pretending to do so
Easily hitting the “off” button for an employee when necessary
Jarrad then went into the different types of SSO, starting with cookie sharing. It’s typically used with internally-developed applications, such as home-grown HR and payroll applications at less mature organizations that haven’t graduated to SaaS application, and if those applications have a common parent domain (that is, if they live on an URL of the form *.your-domain-here.your-tld-here. He recommends against it, as it’s pretty much broken.
He then talked about SAML — Security Assertion Markup Language — an open-standard, XML-based framework for authentication and authorization between two entities without a password.
Want to know more about OAuth? Check out my teammate Matt Raible’s article, What the Heck is OAuth?
Most of his talk was focused on the standard that also happens to be my livelihood: OAuth or Open Authorization, the open standard for access delegation, which is often used to grant websites or applications access to user information without giving them their login credentials.
He also quickly mentioned Kerberos, which is for authenticating requests among trusted hosts on an untrusted network:
Here’s some good advice from all you pentesters. Be sure to follow them, especially that last one:
It’s not the early 2000s anymore; stop using shared cookies as SSO! All an attacker has to do is acquire a cookie, and they become a legitimate person in the organization, free to wreak havoc.
There’s a particular vulnerability that is an attacker’s dream, where the *.site.tld domain is deleted, but its C record in the DNS isn’t. An attacker could register that subdomain and gather cookies, and eventually, lots of organization data:
When it comes to OAuth, you’re looking for implementation vulnerabilities, in either the client application, or the OAuth service.
In the OAuth flow, only the IdP (identity provider) holds the user credentials, which are contained in the ID token. As an attacker, you want to somehow steal the ID token, which you can then use the request the access token, which is the key to the resources you want to get your paws on.
Because of its delegated nature, OAuth relies on open redirects. A poorly-built or -configured OAuth service that fails to use a list of allowed redirect URIs could be exploited, but that’s the sort of thing that Auth0 doesn’t allow.
As far as CSRF (cross-site request forgery) attacks are concerned, they can be mitigated with OAuth 2.0’s state parameter. For each authentication request, set it to a hard-to-guess value, and see if the response is the same as the one you sent with the request.
And of course, there’s always checking for bad implementations of the standard:
Here’s another meme I’m going to share on the Okta Slack:
And finally, there’s SAML. As the mobile specialist for Auth0, I never touch the stuff:
But if you’re doing pentesting on a SAML-based setup, you’ll want to use SAML Raider, which add SAML-specific functions to Burp Suite:
Last presentations of the day
I caught a bit of Dan Fernandez’ presentation, The Boring Parts of AI: Risks and Governance of Large Language Models — you can find the slides here…
…and a sliver of Cochise’s How to Wage War and Bypass Congress: a Primer on Gray Zone Warfare preso, because it’s always fun to see him go off on a rant.
Thank you, BSides St. Pete!
To Wilson Bautista and the BSides St. Pete team, my thanks for a great event for the cybersecurity community to share knowledge and gather together!
BSides gets it name from “b-side,” the alternate side of a vinyl or cassette single, where the a-side has the primary content and the b-side is the bonus or additional content. In 2009, when the Black Hat conference in Las Vegas received way more presentation submissions than they could take on, the rejected presenters (who still had very could presentations; there just wasn’t enough capacity for them) banded together and made their own “b-side” conference that ran in parallel with Black Hat. From that event came BSides.
BSides conferences are community events, and unlike a lot of tech conferences, they’re inexpensive. As I wrote earlier, the remaining “no swag” tickets — which unfortunately don’t come with swag but still get you in the door — sell for a mere $20.
September starts this week, and each week in this new month has its own big Tampa Bay tech event, with new opportunities to learn, network, make friends, and take part in “The Other Bay Area’s” tech scene!
These events, which are covered in more detail below, are:
An evening of tech career guidance (keynote and panel discussion) and networking at Tampa Bay’s premier tech gathering space.
Tuesday, September 26 Embarc Collective
SocialCode x Tampa (Thursday, September 7)
The SocialCode is the name for events that tech recruiter Oscar Technology hold worldwide, and they’re holding one in Tampa on Thursday, September 7th!
The event:
The SocialCode x Tampa
TL;DR:
An evening of AI (3 short talks and a panel discussion) and networking in a swanky Hyde Park venue.
Recommended if you’re:
• Interested in AI (that’s the speaker and panel topic) • Looking for tech work (because it’s sponsored and run by a tech recruiting company) • Looking for a fancier event (it’s in Hyde Park)
When:
Thursday, September 7, 2023 5:30 – 8:00 p.m.
Where:
Hyde House Public Studio 1646 W Snow Avenue, Tampa FL
This event, The SocialCode x Tampa, will focus on AI and feature these speakers:
Craig Bosco, Data Scientist at Gale Healthcare, who’ll talk about how predictive analytics can play a part in healthcare staffing, the role of AI in automation and operational excellence, and how different types of AI can be used to augment the skills of a limited workforce.
James Gress, Generative AI Director at Accenture, who’ll talk about how various organizations are harnessing the power of generative AI to drive innovation in their products and enhance operational efficiency, and how we can use multiple technologies across the entire software delivery lifecycle.
Yours Truly, Joey deVilla, Senior Developer Advocate at Okta, who’ll talk about two different approaches to human/AI synergy — “centaur” (human head/non-human body) and “minotaur” (non-human head/human body) — and how to get on the right side of this equation.
BSides St. Pete 2023 (Friday/Saturday Sept 15 – 16)
BSides is the name of a series of cybersecurity conferences that grew from the “overflow presentation” at Black Hat and are now their own thing! The St. Pete edition happens on the weekend of September 15th and 16th, with the training sessions on the 15th and the conference proper on the 16th!
The event:
BSides St. Pete
TL;DR:
Deep cybersecurity knowledge will abound, with a full Friday of training sessions and a full Saturday devoted to a Black Hat-style conference.
Recommended if you’re:
• Interested in cybersecurity and infosec (that’s what this conference is all about) • Looking for cybersecurity and infosec work (there’ll be lots of people from security companies there, and some of them will be recruiting) • “Homesick” for Black Hat and/or DEFCON or didn’t get to go this year • On a budget and want to get the most hardcore conference bang for your buck
When:
• Training sessions on Friday, September 15, 10:00 a.m. – 3:00 p.m. • Conference day on Saturday, September 16, 8:30 a.m. – 4:00 p.m.
Where:
St. Petersburg College – Seminole Campus 9200 113th Street N, Seminole FL
How much:
• Friday training sessions: $1 (really!) • Regular admission: $25 • College/university student admission: $15 • Middle/high school student admission: $10 • Elementary school student admission: $1
If you want a taste of what BSides is like, check out my article, Scenes from BSides Tampa X 2023, which I attended this spring. BSides St. Pete will continue the tradition of sharing deep cybersecurity/infosec knowledge, but on the St. Pete side of the Bay this time!
The Friday training sessions will be:
Blue Team Workshop – Network Attacks, with Laura Mayeux from Vectra AI
Introduction to Hands-On Purple Teaming, with Bryson Bort & Chris Peacock from SCYTHE
Splunk Boss of the SOC, with Will Robus from Outpost Security
The Saturday conference sessions will be:
Between Two Palms: A Session on Burnout, with Elvira Reyes and Chris Machowski
Complexity is the Enemy: How to start doing Cyber Risk Management with Dan Holland
How I Learned to Stop Worrying and Build a Modern Detection & Response Program, with Allyn Scott
Exploring Threat Actor Strategies on Exploitation of Emerging TLDs, with Pat Gelin
Integrating Cybersecurity into Organizational Culture and Portfolio Management, with Carlos Rodriguez
How to Build a Cybersecurity Journey, with Ivan Marchany
Getting into Cybersecurity, with Stacey Oneal
A Urinal Story: Human Behavior & Security, with Daniel Lopez
Navigating New Cybersecurity Regulations: Charting a Course for Success, with Terri Khalil
Everything I Needed to Know About Practical Cybersecurity, I Learned from my Mom, with Michael Magyar
Creating your Security & Compliance Audit Framework, with Michael Brown
Building a Comprehensive Framework for AI Systems Security: Methodology and Grading, with Wilson Bautista
IAM Security and So Can You: An Intro to Identity Access Management and How to Beat It to a Pulp, with “Uncle Raydar”
Adversarial Prompting: Exploiting Large Language Models, with Sam Decker
Enhancing Chrome Extension Security: Fortifying Your Browser Experience, with Aishwarya Ramesh & Nagarajan Samuel Ogunlade
Cyber Supply Chain Risk Management and Evolving Governance, with Joshua Weathers
How to Wage War and Bypass Congress: a Primer on Gray Zone Warfare, with Jon “Cochise” Buzin
Getting MAAD-AF to Attack Microsoft 365 & Azure AD, with Arpan Sarkar
The Boring Parts of AI: Risks and Governance of Large Language Models, with Dan Fernandez
This event charges admission, but it’s pretty cheap — register here!
DevOpsDays Tampa Bay 2023 (Thursday, September 21)
Devops is underrated, which is a terrible shame, because software and systems don’t happen without it! Luckily for us techies in Tampa Bay, we have a conference on devops, and it’s happening on Thursday, September 21!
The event:
DevOpsDays Tampa Bay
TL;DR:
A full-day conference dedicated to DevOps (“Dev” as in “software development,” “Ops” and in “IT operations”) in Tampa’s best conference venue.
Recommended if you’re:
• Interested in devops, CI/CD, and setting up, operating, and maintaining all the things that make software development and delivery possible (that’s what this conference is all about) • Looking for devops work (there’ll be lots of people working in devops there, and some of them will be recruiting) • Curious as to how software and systems get built and deployed beyond the planning and coding phases
When:
Thursday, September 21, 2023 8:00 a.m. – 5:00 p.m.
Where:
Armature Works 1910 N Ola Avenue, Tampa FL
How much:
• Before September 1: $100 • After September 1: $150
An evening of tech career guidance (keynote and panel discussion) and networking at Tampa Bay’s premier tech gathering space.
Recommended if you’re:
• Wondering what the next move in your tech career should be (that’s the main topic of this meetup) • Looking for tech work (there’ll be lots of people working in tech there, and some of them will be recruiting) • New to the Tampa Bay tech scene or haven’t been to a Tampa Bay tech event in a while
This event will feature Candace Williams, who will share her inspiring journey into the world of technology. From her early days to becoming Associate Director, Cybersecurity at Raytheon and starting Cyb(H)er Ally, Candace’s story is a testament to what’s possible in the tech industry.
Following Candace’s keynote address, there will be a panel of accomplished industry professionals ready to answer your burning questions. Guided by the audience’s inquiries, this discussion will focus on the invaluable lessons they learned when starting their tech careers and finding their own unique paths in the industry.
The 2023 Def Con is well under way! You might want to use this trick to make it harder to spike your drinks. This isn’t to say that everyone at Def Con is trying to surreptitiously drug other people’s drinks, but there is a certain transgressive element there, and as any security expert will tell you: you can never really be too careful.
The latest interesting book bundle from Humble Bundle is the Cybersecurity and Forensics Bundle, which gets you 19 cybersecurity and cyberforensics books by CRC Press for a mere $25 — that’s just $1.32 per book!
As I write this, you have 17 days before this deal disappears. If you need books on cybersecurity and forensics, get these now!