We've been working to explore ways to safely continue the BSides Tallahassee conference for 2020. However, we've recently learned that our venue is moving to convert the conference space to distanced learning facilities to support college students in the fall semester and we won't be able to host in person. This is in conjunction with some of the continuing concerns our board has had recently around the global pandemic and the safety of our speakers, volunteers, and attendees due to the continuing prevalence of infections in Florida. While we've been exploring a teleconference focused event, we've been unsuccessful at fully transitioning due to volunteer workload.
With that being said, we're going to have to cancel BSides Tallahassee for 2020.
We know this is disappointing, but we're looking to review and come back stronger when the world is in a calmer place. Stay safe, and we hope to see you all again in the future!



 August 22, 2020

 9:00am - 5:00pm

 Tallahassee Community College

 Venue Map


Grab Your Ticket

General Admission
$20 per Person

Register by
July 1
to receive
  • T-Shirt (Choice of Red or Blue)
  • Lunch
  • Door Prize Entry
  • Admission

Register by
August 1
to receive
  • Lunch
  • Door Prize Entry
  • Admission

At Door
to receive
  • Door Prize Entry
  • Admission

Student Admission
Free Admission with Valid Student ID

Schedule & Speakers

9:00 am

Doors Open

Registration Open
9:00-3:30 / Room TBD

9:30 am

Opening Ceremony
9:30-10:00 / Room TBD

10:00 am

Lockpick Village Open
10:00-4:00 / Room TBD

Test your hand at picking various difficulties of locks.

Cyber Range Open
10:00-4:00 / Room TBD

Come enjoy our digital playground.

Extracting the Attacker: Getting the Bad Guys Off Your SaaS

David Branscome
Microsoft Partner Technical Architect

Defensive / Technical   A look at ways attackers implant themselves in cloud solutions and how to monitor for and remove them.

10:00-11:00 / Room TBD

10:30 am

Secure Coding Tournament Open

provided by SecureCodeWarrior
10:30-3:30 / Room TBD

Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play & Node.JS.

Make sure you bring your laptop!

The Top 10 (unexpected) Ways I Pwn'd You

Steve Campbell
Securicon Senior Security Consultant

Offensive / Technical   Penetration Testers have to get creative when testing environments where prior findings have been remediated or you're presented with very little attack surface. Follow along to my stories of the unexpected methods I’ve used to pwn systems and provide more value to my clients. Some of these will never be picked up by a scanner, or ignored due to a lack of appreciation for their impact.

10:30-11:30 / Room TBD

11:00 am

Awareness Endgame: Reducing Risk with Automation

Colin James & Russell DeHennis
Florida Department of Economic Opportunity

Defensive / Technical   Most breaches begin with a phishing attack that could have been prevented with a strong user security awareness training program. You won't have to search the galaxy to find help turning your program from cosmic dust to JARVIS. Using a handful of tools and custom scripts, we further automated our awareness training program and integrated aspects of it into our risk management program. We will show how we did it and how your organization can too.

11:00-12:00 / Room TBD

12:00 pm

Lunch Served

must have lunch ticket
12:00-1:00 / Room TBD

Register by April 1 for included lunch!

12:30 pm


CONNECT 1200: Hacking in Tallahassee circa 1980-1990s

Champ Clark III
Quadrant Information Security Chief Technology Officer

Offensive / History   Did you know there was a “hacking” scene in Tallahassee in the late 1980s and 1990s? This talk intends to paint a picture of what is was like to be a hacker in Tallahassee during this period by telling stories about the "hacks" and the small group of people that were dedicated to the exploration of computer systems and networks.

12:30-1:30 / Room TBD

1:30 pm

Eyes In Our Children’s Bedrooms

Sanchari Das & Joshua Streiff
Indiana University Bloomington

Defensive / Science, Technology, Society & Compliance   A presentation on original research into smart toy IoT vulnerabilities and penetration testing on smart toy products with a summary of the risks, vulnerabilities, and mitigations that can be deployed to better protect some of the most vulnerable users; children.

1:30-2:30 / Room TBD

2:00 pm

"Cracking" Up: Analyzing Organizational Password Security

Falcon Street
Florida Department of Economic Opportunity CICO

Defensive / Technical   This talk will look at how one organization worked to handle the ever-changing needs of password security requirements and NIST password recommendations by creating automated scripts and using specialized software and hardware to conquer weak passwords.

2:00-3:00 / Room TBD

2:30 pm

Show Me the Money

Carlota Sage
Tulle Software & Services

Defensive / Managerial & Compliance   A how-to for smaller orgs to put together the financial justification for starting a security program and hiring security personnel.

2:30-3:30 / Room TBD

3:00 pm

Tales from professional thieves

Dan McInerney & Justin Wynn

Offensive / Technical   A brief look at common and uncommon physical security bypasses that afflict many organizations and a rousing collection of tales from professional penetration testers who sometimes find themselves covered in poo or being chased by SWAT teams in the name of security.

3:00-4:00 / Room TBD

3:30 pm

Registration Closed

Secure Coding Tournament Closed

Operationalizing Threat Hunting using MITRE ATT&CK Framework

Arun Warikoo

Defensive / Technical   A walkthrough for how to operationalize the MITRE ATT&CK Framework and begin developing a threat hunting program.

3:30-4:30 / Room TBD

4:00 pm

Lockpick Village Closed

Cyber Range Closed

4:30 pm

Closing Ceremony
4:30-5:00 / Room TBD

Secure Codeing Winners Announced
4:30-5:00 / Room TBD

Who will be crowned the Secure Code Warrior?

Door Prizes Announced
4:30-5:00 / Room TBD

Must be present to win.

5:00 pm

Doors Close

Thank You to our Sponsors







Inaugural Conference 2019

Speakers Playlist

YouTube Channel Playlist

Photo Gallery

Google Photo Album

We ♥ our Volunteers

Board Members

Nicholas Carroll

Chair of the Board

Amy Hollen

Board Member

Dan Barfield

Board Member

Kevin Hilt Jr.

Board Member

Contact us


 800.231.6075 x 700


 Tallahassee Community College
2020 Venue Map



Code of Conduct & Photography Policy

BSides Tallahassee is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organizers.


Ensure you have the permission from anyone you photograph or record. This includes those in the background of your shot. “Crowd shots” from the front (facing the crowd) are strongly discouraged. No photo/video/audio recording in the Professional Track.


Capital City Cyber Defense Network
Capital City Cyber Defense Network, 501(c)(3)