Need context about those images of trolleys and tied-up people? You’ll want to look up the Trolley Problem thought experiment, followed by this collection of Trolley Problem memes.
Here’s the “official unofficial” list of tech, entrepreneur, and nerd events for Tampa Bay and surrounding areas for the week of Monday, September 25 through Sunday, October 1, 2023. That’s right, we’re getting into October!
On Tuesday morning, Computer Coach will have an online session titled How to Bounce Back from a Layoff because Luck is NOT a Strategy. This workshop will feature actionable steps you should be taking to help you bounce back from a layoff and reduce your unemployment time to get back to work quickly! Find out more and register here.
Tampa Bay Tech’s “September to Remember” continues on Tuesday with Tampa Bay Techies’ Navigating Your Tech Journey panel discussion and networking event. Keynote speaker Candace Williams will share her story about her journey into the world of technology, from her early days to becoming Associate Director, Cybersecurity at Raytheon and starting Cyb(H)er Ally. Find out more and register here.
On Wednesday late afternoon/evening, Tampa Bay Cyber Peeps will host a happy hour at the World of Beer near Tampa International Airport.Find out more and register here.
Group
Event Name
Time
Young Professionals Networking JOIN in and Connect! • Saint Petersburg, FL
On Thursday at noon, Computer Coach will host an online session: Creating a Strong Professional Brand: Empowering your Career Success. It will feature Charles Billi as our guest speaker. He is an accomplished professional, a 25 year veteran of broadcast television news, and branding expert who will share his knowledge and tips during this virtual webinar. Find out more and register here.
On Thursday evening, Tampa Bay Agile will host the in-person event From Idea to Backlog – How to Ensure Agile Teams Build the Right Product. In this talk, Steven Granese & Adam Ulery present a lightweight product discovery framework that quickly helps agile leaders turn ideas into validated backlogs. They’ll demonstrate how agile leaders can build validated backlogs within two weeks and integrate their work with agile teams to ensure fast user feedback. Find out more and register here.
Group
Event Name
Time
Wesley Chapel, Trinity, New Tampa, Business Professionals • Wesley Chapel, FL
On Friday morning, Computer Coach will host an online session titled The Conscience of Code: Digging into the Ethical Realm of AI. The featured speaker will be elly Harkcom, an IT professional passionate about all things data and analytics. Her AI journey is motivated by the desire to create Machine Learning Models that are fair, unbiased, inclusive, and equitable. Find out more and register here.
Group
Event Name
Time
Winter Park Toastmasters – Learn while having FUN! • Winter Park, FL
How do I put this list together? It’s largely automated. I have a collection of Python scripts in a Jupyter Notebook that scrape Meetup and Eventbrite for events in categories that I consider to be “tech,” “entrepreneur,” and “nerd.” The result is a checklist that I review. I make judgement calls and uncheck any items that I don’t think fit on this list.
In addition to events that my scripts find, I also manually add events when their organizers contact me with their details.
What goes into this list? I prefer to cast a wide net, so the list includes events that would be of interest to techies, nerds, and entrepreneurs. It includes (but isn’t limited to) events that fall under any of these categories:
Programming, DevOps, systems administration, and testing
Tech project management / agile processes
Video, board, and role-playing games
Book, philosophy, and discussion clubs
Tech, business, and entrepreneur networking events
Toastmasters (because nerds really need to up their presentation game)
Sci-fi, fantasy, and other genre fandoms
Self-improvement, especially of the sort that appeals to techies
Google Developer Groups DevFest Central Florida: October 14th in Sanford
DevFest Central Florida is a community-run one-day conference aimed to bring technologists, developers, students, tech companies, and speakers together in one location to learn, discuss and experiment with technology. It will take place on Saturday, October 14th at Seminole State College’s Sanford/Lake Mary Campus in Sanford.
Google Developer Groups DevFest Tampa Bay: October 21st in Tampa
DevFest Tampa Bay is a community-run one-day conference aimed to bring technologists, developers, students, tech companies, and speakers together in one location to learn, discuss and experiment with technology. It will take place on Saturday, October 21st at University of South Florida in Tampa.
TampaCC — a.k.a. Tampa Code Camp or Tampa Community Connect — is dedicated to creating a transformative and immersive event that dives deep into the realms of cloud-based technologies. Developers, architects, security professionals, and visionary leaders are invited to showcase their knowledge, share groundbreaking techniques, and pave the way for the next generation of cloud innovation. It will take place on Saturday, October 28th at Keiser University in Tampa.
I attended BSides St. Pete last Saturday, the second anniversary of this event, and it was nice to see that attendance had more than doubled. It’s nice to see the that the Tampa Bay cybersecurity community is active on both sides of “The Other Bay Area!”
BSides gets it name from “b-side,” the alternate side of a vinyl or cassette single, where the a-side has the primary content and the b-side is the bonus or additional content. In 2009, when the Black Hat conference in Las Vegas received way more presentation submissions than they could take on, the rejected presenters (who still had very could presentations; there just wasn’t enough capacity for them) banded together and made their own “b-side” conference that ran in parallel with Black Hat. From that event came BSides.
Opening keynote: Between Two Palms: A Session on Burnout
The day started at 9 with the opening keynote, which took place not only on the main stage, but between two palm plants, as promised in its title:
The keynote was a frank discussion moderated by John “Cochise” Buzin (one of my instructors at the UC Baseline cybersecurity course I took in the summer of 2020) and featured Chris Machowski (also one of the people behind the UC Baseline course) and Elvira Reyes.
While they stated quite clearly that they aren’t psychology professionals, they are very active in the cybersecurity field, and each of them knows something about burnout from personal experience.
Over their talk, they talked about what they identified as the five stages of burnout, starting with stage one, the honeymoon phase:
This stage is marked by the following:
Job satisfaction
Accepting responsibility
Sustained energy levels
Unbridled optimism
Commitment to the job
Compulsion to prove oneself
Free-flowing creativity
High productivity levels
Stage two is the onset of stress:
In this stage, you’ll experience:
CV symptoms
Inability to focus
Irritability
Reduced sleep quality
Lack of social interaction
Lower productivity
Anxiety
Avoidance of decision-making
Change in appetite
Headache
Neglect of personal needs
Fatigue
Then comes stage three — chronic stress:
Symptoms of this stage include:
Persistent tiredness
Procrastination
Resentfulness
Social withdrawal
Aggressive behavior
Apathy
Chronic exhaustion
Cynical attitude
Decreased sexual desire
Denial of problems
Feeling threatened
Feeling pressured
Alcohol/drug consumption
Next, stage 4, burnout:
Here’s what you’ll experience in this stage:
Obsession with problems
Pessimistic outlook
Physical symptoms
Self-doubt
Social isolation
Chronic headaches
Chronic GI problems
Neglect of personal needs
Escapist activities
Behavioral changes
And finally, stage 5 — habitual burnout:
And with this comes:
Chronic sadness
Chronic mental fatugue
Chronic physical fatigue
Depression
After this rather gloomy description of burnout’s stages came the things you can do to counter burnout:
They generally boil down to “take better care of yourself,” which is in agreement with what the Mayo Clinic says.
I thought their use of the iconography from the Fallout games for the topic of burnout was pretty clever.
Anonymous trooper
I passed by this fella on the way to the next session:
How to build a cybersecurity journey
I caught a bit of Ivan Marchany’s session, How to Build a Cybersecurity Journey, one of the presentations that covered how one gets into the business of cybersecurity.
Among other things, he covered building your own cybersecurity lab…
…and reminded the audience that as far as prospective employers and clients are concerned, you are your projects:
And equally important is the fact that if you don’t have some kind of online presence in this day and age, you effectively don’t exist to employers and clients:
This was a popular topic, and Ivan was playing to a standing-room-only audience:
Cyber risk management
I also caught the tail end of Dan Holland’s presentation, Complexity is the Enemy: How to start doing Cyber Risk Management. I’m pretty sure I arrived at one of the most important slides, the “risk as a product of probability and impact” slide:
I plan to share this slide on the Okta Slack’s “random” channel:
And here are the takeaways from Dan’s presentation:
A Urinal Story: Human Behavior & Security
Somehow, I managed to miss the “urinal story” part of Daniel Lopez’ and Ashwini Machlanski’s presentation on helping firm up the human element in cybersecurity. They covered key parts of managing people through the use of behavioral science and little tricks like “nudges” to get people to be more security-compliant.
This slide summarizes their key takeaways quite well:
Ashwini and Daniel handed out my favorite stickers from the conference:
My one tragic mistake
In wandering the halls and checking out what was happening in other rooms, I failed to catch Stacey Oneal’s Getting into Cybersecurity presentation, which was on my list. I owe her one — I promise I’ll catch you at your next presentation, Stacey!
Super Grouper hadn’t opened by the time I got to the trucks, so I got an Elvis Burger from 1 Up. It’s been a while since I last had a peanut butter-and-bacon burger, and I enjoyed mine. I know it sounds weird, but it’s worth trying!
Lunch keynote: Becoming a Proactive Defender
While having lunch, I caught most of Christopher Peacock’s presentation, Becoming a Proactive Defender:
I’m going to steal his line, “The best teacher is the adversary; the adversary always gets a vote.”
IAM Security and So Can You: An Intro to Identity Access Management and How to Beat It to a Pulp
I’ve been told that there was a presenter at BSides Tampa that was a bit of dick and overdid it with his bad-mouthing Okta while I wasn’t in the room, so while this talk featured a different presenter, you’d better bet your ass that I was going to be at this one.
But Jarred “Raydar” Pemberton was a lot more reasonable than the other guy. He got an intro from Cochise, who not only mentored him, but convinced him that he should give this presentation. That was a good call; in matters of cybersecurity, if Cochise suggests you do something, it’s generally a good idea to do it.
“Does SSO scare red teamers?” Jarrad asked. “Yes,” he plied to his own question, saying that it’s the kind of thing he shied away from.
Jarrad told us about what he does for a living. It’s always fascinating to see how people who use the stuff we make work with it:
Take note of that last point: in addition to the HR staff or outside HR consultants like “The Bobs,” another person that might be at your termination meeting is someone whose job is to close your work accounts.
I’m actually on the Auth0 side of Okta, which provides a service for customer logins, versus the Okta side of Okta, which handles SSO (single sign-on) for the workforce. My experience with the Okta service is mostly as a user: I use it to log into systems at work:
Yup, that’s an Okta slide! Jarrad’s take on Okta:
“One that I work a lot with and do like quite a bit”
“Super easy to use”
“Simple to get brought up to speed”
“It’s what I would recommend to an org if they can afford it”
(Note to self: Send Jarrad some swag.)
SSO, in addition to letting a workforce since into various work systems with a single set of credentials, has other uses, including certain HR-related tasks:
Monitoring access and, by virtue of knowing who’s logging into what, see who’s really coming into the office and who’s merely pretending to do so
Easily hitting the “off” button for an employee when necessary
Jarrad then went into the different types of SSO, starting with cookie sharing. It’s typically used with internally-developed applications, such as home-grown HR and payroll applications at less mature organizations that haven’t graduated to SaaS application, and if those applications have a common parent domain (that is, if they live on an URL of the form *.your-domain-here.your-tld-here. He recommends against it, as it’s pretty much broken.
He then talked about SAML — Security Assertion Markup Language — an open-standard, XML-based framework for authentication and authorization between two entities without a password.
Most of his talk was focused on the standard that also happens to be my livelihood: OAuth or Open Authorization, the open standard for access delegation, which is often used to grant websites or applications access to user information without giving them their login credentials.
He also quickly mentioned Kerberos, which is for authenticating requests among trusted hosts on an untrusted network:
Here’s some good advice from all you pentesters. Be sure to follow them, especially that last one:
It’s not the early 2000s anymore; stop using shared cookies as SSO! All an attacker has to do is acquire a cookie, and they become a legitimate person in the organization, free to wreak havoc.
There’s a particular vulnerability that is an attacker’s dream, where the *.site.tld domain is deleted, but its C record in the DNS isn’t. An attacker could register that subdomain and gather cookies, and eventually, lots of organization data:
When it comes to OAuth, you’re looking for implementation vulnerabilities, in either the client application, or the OAuth service.
In the OAuth flow, only the IdP (identity provider) holds the user credentials, which are contained in the ID token. As an attacker, you want to somehow steal the ID token, which you can then use the request the access token, which is the key to the resources you want to get your paws on.
Because of its delegated nature, OAuth relies on open redirects. A poorly-built or -configured OAuth service that fails to use a list of allowed redirect URIs could be exploited, but that’s the sort of thing that Auth0 doesn’t allow.
As far as CSRF (cross-site request forgery) attacks are concerned, they can be mitigated with OAuth 2.0’s state parameter. For each authentication request, set it to a hard-to-guess value, and see if the response is the same as the one you sent with the request.
And of course, there’s always checking for bad implementations of the standard:
Here’s another meme I’m going to share on the Okta Slack:
And finally, there’s SAML. As the mobile specialist for Auth0, I never touch the stuff:
But if you’re doing pentesting on a SAML-based setup, you’ll want to use SAML Raider, which add SAML-specific functions to Burp Suite:
Last presentations of the day
I caught a bit of Dan Fernandez’ presentation, The Boring Parts of AI: Risks and Governance of Large Language Models — you can find the slides here…
…and a sliver of Cochise’s How to Wage War and Bypass Congress: a Primer on Gray Zone Warfare preso, because it’s always fun to see him go off on a rant.
Thank you, BSides St. Pete!
To Wilson Bautista and the BSides St. Pete team, my thanks for a great event for the cybersecurity community to share knowledge and gather together!
Here’s the “official unofficial” list of tech, entrepreneur, and nerd events for Tampa Bay and surrounding areas for the week of Monday, September 18 through Sunday, September 24, 2023.
Monday at noon: Women Who Code will host an online session titled Building a Go-to-Market Tool with Machine Learning. It will feature a technical deep dive into the Go-to-Market Analytic tool with our Partner ADM for a chance to see machine learning (ML) at work in the real world. Find out more and register here.
High Tech Connect’s September tech fest takes place Monday from 5 to 8 p.m. at Embarc Collective!Find out more and register here.
Group
Event Name
Time
Young Professionals Networking JOIN in and Connect! • Saint Petersburg, FL
On Tuesday at 10:00 a.m., Computer Coach — through its network of meetups — will host the online session How to Beat the Applicant Tracking System (ATS).Find out more and register here.
At noon, you can catch the online session Low-Tech Solutions to Design Inclusive & Engaging Zoom Events by Robbie Samuels. You’ll learn how to take your Zoom events to the next level. Find out more and register here.
On Tuesday at 1 p.m. CoreX Legal will host an online seminar titled If You Build It … Make It Relevant for THEM. It will feature marketing expert Patty Pinckney on key marketing foundations for investors and customers! Find out more and register here.
On Tuesday at 5:30 p.m. at the Entrepreneur Collaborative Center, Google Developer Group Suncoast will host The Web Just Took A Quantum Leap. It will feature Intel’s Alex Menard, who’ll talk about some Intel projects including WebNN, which enables access to fast neural network and machine learning capabilities; Web GPU and Compute Pressure, a new API enabling better user experience and bringing adaptive compute capabilities to the client, just like adaptive streaming has improved streaming use-cases by adapting to live network conditions. Find out more and register here.
On Wednesday evening, the Tampa Bay UX Group is having an in-person panel discussion titled UX Stories: Design. The panel will feature Tiffani Holland, Benjamin Pace, and Vivien Lemoine. Find out more and register here.
On Thursday at noon, Computer Coach will host the online session Maintaining Resilience in Your Job Search. The job market is particularly challenging right now, and if you’re looking for work, you might find this panel helpful. Find out more and register here.
Thursday evening (6:30 p.m.) brings Lean Beer for All Things Agile! Imagine a “lean coffee” gathering…but with BEER! Find out more and register here.
Group
Event Name
Time
Wesley Chapel, Trinity, New Tampa, Business Professionals • Wesley Chapel, FL
On Friday at 10 a.m., join the other Joey in Tampa Bay’s tech scene, Joey Hernandez, in a Computer Coach online session titled Data Privacy and Compliance: Navigating Regulations in the IT Landscape. As more and more information gets moved about, data privacy, compliance regulations, and best practices for safeguarding data are paramount. Find out more and register here.
Group
Event Name
Time
Winter Park Toastmasters – Learn while having FUN! • Winter Park, FL
On Saturday, Women Who Code are holding the WWCode To the Finish Line: Walk, Run or Roll for Equity event. It’s a commitment to walk, run, or roller skate/blade one mile — a symbolic distance representing a collective stride toward breaking down gender inequality barriers in the tech industry. Find out more and register here.
How do I put this list together? It’s largely automated. I have a collection of Python scripts in a Jupyter Notebook that scrape Meetup and Eventbrite for events in categories that I consider to be “tech,” “entrepreneur,” and “nerd.” The result is a checklist that I review. I make judgement calls and uncheck any items that I don’t think fit on this list.
In addition to events that my scripts find, I also manually add events when their organizers contact me with their details.
What goes into this list? I prefer to cast a wide net, so the list includes events that would be of interest to techies, nerds, and entrepreneurs. It includes (but isn’t limited to) events that fall under any of these categories:
Programming, DevOps, systems administration, and testing
Tech project management / agile processes
Video, board, and role-playing games
Book, philosophy, and discussion clubs
Tech, business, and entrepreneur networking events
Toastmasters (because nerds really need to up their presentation game)
Sci-fi, fantasy, and other genre fandoms
Self-improvement, especially of the sort that appeals to techies
High Tech Connect holds monthly get-togethers for people working in high tech in Tampa Bay, and It’ll be at the tech accelerator/coworking space/event space Embarc Collective, and it’ll run from 5 to 8 p.m.
The event will feature these sponsors:
Roberts Recruiting: Tampa-based staffing and recruiting firm, with a focus on Finance & IT roles. (Presenter: Daniel Roberts)
True North Society: Young professionals supporting the mission of Think Big for Kids to empower the next generation of youth. We’re here to provide a compass to the next generation and elevate kids to find their purpose. (Presenter: Saxon Baum)
DevOps Days Tampa Bay: A worldwide series of community run technical conferences covering topics of software development, IT infrastructure operations, and the intersection between them. It is run by volunteers from community, for the benefit of the community. (Presenter: James Gress)
Are you looking for something to do Monday evening? Are you looking for contacts, collaborators, or friends in the tech community? Are you looking for new opportunities? Come to High Tech Connect!
I’ll be in San Francisco’s Moscone Center West at Oktane, which runs from Tuesday, October 3 through Thursday, October 5, and I’ll help run a developer booth on Developer Day, which happens on the Thursday. It’ll be in San Francisco at Moscone Center (Moscone West, to be precise). If you’re planning on attending, let me know — I’d love to catch up!
What is Oktane?
Oktane is Okta’s big annual conference, where the subject matter is all things related to digital identity.
If you’re a reader of this blog, there’s a good chance that you use at least one of Okta’s two major systems:
The workforce identity solution, which most people refer to as just “Okta,” to log into the various systems you use for work.
The customer identity solution, which goes under the brand name “Auth0 by Okta” (or “Auth0” for short), to log into applications as a customer user.
I’ll be there to help demonstrate multifactor authentication with a YubiKey, which you can keep if you try out the process…
…and I’ll also be helping out with the demo where you can try out the Auth0 CLI, which lets you do just about everything you can do on the Auth0 administrative dashboard, but on the command line:
And of course, I’ll have you-know-what with me…
Can you attend Oktane?
Yes, you can, and there are a couple of ways to attend…
If you’re a developer, you’ll probably get the most bang for your buck with the Developer Pass, which sells for a mere US$199. The Developer Pass gives you access to:
Keynote and luminary speakers presentations
Expo hall
The Developer Day event (see below)
Oktane online sessions
If you want the full in-person experience, you’ll want the Full Conference Pass, which sells for US$699 and gives you access to:
Keynote and luminary speakers presentations
Expo hall
In-person breakout sessions
Hands-on workshops
The Wednesday night party
The Developer Day event (see below)
Oktane online sessions
And finally, there’s the FREE option — the Oktane Online Pass, which gives you online access to: