How to do Virtual Conferences The Right Way

Share this
Sage Knows IT: How to do Virtual Conferences The Right Way

I’m so filled with excitement right now.  Today marks the first time I have attended a virtual industry conference and I must say it’s bittersweet.  On one end, I always find myself increasingly nervous when I attend these events in person, mainly because I find it difficult to connect with people on a personal level.  Anxiety kicks in and I completely shut down.  On the other end, it shows the world that the InfoSec Community knows how to adapt to adversity.

See this event was supposed to take place last month but was promptly rescheduled due to the world wide pandemic that is COVID-19.  Since it is nearly impossible to escape the risk, the event coordinators at Bsides San Antonio felt (and rightfully so), that the show must go on but in a safe manner.

I can’t imagine how expeditiously they must have worked to get this thing rescheduled a month later in virtual mode, but they must have had a killer business continuity plan in place.  Jokes aside, I am really grateful for the opportunity to attend and learn from the industry experts.

So how did it go?

The Pre-Show.

The day started out amazing.  Overzealous with excitement, I logged in a whole hour early to the main client, GoTo Web.  Was a bit worried at first as when I clicked the link, the timer itself wasn’t moving as we were ticking closer to the event.  I think I wore out my F5 (refresh key) like no tomorrow.  Poor Keyboard.

As 9AM rolled around, I noticed that the web client wasn’t doing anything for Track 4; other than tell me that the webinar was about to start.  I had to be doing something right, it was now 9:05 AM.  I opened another tab and went to the Twitter account of BsidesSATX to see if there were any updates.  Nothing of substance for me.

As I was about to draft a 3-line tweet to the handle, I had an epiphany; perhaps I should check my email and see if there is another link that would take me into my registered event.  Yeah, I probably should have started there to begin with. 

Not only was there a link that worked on the first try, they also had the information to a Discord chat, which I will hit on in a bit.  Obviously and maybe not so surprising to me, they had their stuff together and I did not.

Tranquillo, Sage.

The Talks.

For the sake of the brevity of this post, I’m not going to go into each talk individually as I planned to do separate posts going into the depths of what I have learned.  What I will say is that each of the 8 talks I attended, reaffirmed my commitment to shifting my professional focus to information security.

My strategic approach was to attend talks that focused solely or moderately on Incident Response or Forensics.  What I got was that and more.  My first talk was “Automating Disk and Memory Evidence Collection in AWS” which focused on evidence gathering where I learned some best practices related to log collections, acquisition tools like CloudWatch and Margarita Shotgun and how much time is too much time to gather information from automated tools.

Ryan Tick, Vaishnav Murthy: Automating Disk and Memory Evidence Collection in AWS
Ryan Tick, Vaishnav Murthy: Automating Disk and Memory Evidence Collection in AWS

Another notable talk was “The World’s Prettiest (fake) Cyber Warfare Ops Center – and How I Built It” which was given by a 15-year old local student.  I wasn’t sure what was more impressive, him having both his Net+ and Sec+ certifications at his age or the fact that he helped build a command center display for the San Antonio Museum of Science and Technology (SAMSAT).

And there was so much more.  Cannot wait to finish each of the posts and share them.  Each of the events were easy to get into and all of the presenters had an aura of confidence and were welcoming in their responses to the audience’s questions including my own.  As I stated previously, the integration of Discord has helped tremendously with interactions during and after each talk.

The Tech.

One of the natural attractions to an industry is the ability to network with others in the profession.  Naturally this becomes a huge hurdle when it comes to an all virtual event but I must say Bsides showed out.


Their incorporation of Discord, a popular gaming communication platform was nothing short of amazing.  They organized the channels by categories.  Tracks had 4 channels and were specifically reserved for active talks.  For those that don’t know, Tracks are categorized talks.  For instance, all talks that were in Track 1 were denoted as “In The Beginning.”  This is typically reserved for entry level talks whereas Track 4, “In The Weeds”  were more focused or advanced talks.

Discord Channels

When the talks were over, the presenter would transition their responses from their active channel to what Bsides calls Breakout sessions, which were basically reserved for Q&A after the presentation was over.  This was smart as, you allow the conversation to continue without interrupting the next presenter.

You also had tracks for Capture the Flag events, Sponsors, Workshops and community talks.  

Considering this was all virtual, this event felt very much like you were actually there.

The last thing I would touch on which may be important to many is the streaming service.  They opted to use Go To Web which is a co-brand of LogMeIn.  Fitting choice considering the industry, I must say.  For the most part, there were no connection issues I experienced and the functionality between presenter and administrator seemed seamless.  There were a few attendees that expressed issues with hearing the audio but not seeing the slides but I didn’t experience that myself.  They seemed to either be accessing the application using either a thin client or Chromium (a browser used by Linux users).

The Aftermath.

Having gone through this experience, I can safely say I would recommend any organization needing to put on a virtual conference to follow the formula  Bsides did.  The reality of the situation is that COVID isn’t going anywhere anytime soon, so we must adapt and utilize the resources we do have to maximize our capabilities and accessibility. I’m glad that Bsides is leading that charge.

Next week I will start posting what I have learned specifically from the events that I attended.  If you went to the event, please leave a comment below on your experiences.  Would love to hear from you.

To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.
Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Maximizing Email Security: Understanding the Importance of DKIM, SPF, and DMARC

Email is a crucial part of our daily lives, but unfortunately, it’s also a popular target for cybercriminals who use various tactics like spam, phishing, and spoofing to scam people. The FTC recently issued a warning to users of MetaMask and PayPal about phishing scams that are currently circulating through fake emails. The scam claims that the user’s cryptocurrency wallet has been blocked and encourages them to click a link and update their wallet to prevent the loss of their crypto. To protect email users from these threats, authentication protocols like DKIM, SPF, and DMARC are strongly recommended.

Top 10 Cybersecurity Job Sites

Top 10 Job Sites for Cybersecurity Professionals

As the world continues to rely heavily on technology, the demand for cybersecurity professionals continues to grow. Cybersecurity jobs offer high salaries, job security, and a wide range of career options. However, finding the right job can be challenging.

Investigating the FAA Outage: Separating Fact from Fiction

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system.

Creating Your Wireless Workspace in 2023

As more and more of us work remotely or from home, having a wireless workspace has become increasingly important. Not only does it allow for greater flexibility and mobility, but it can also help declutter your desk and make your work environment more efficient.

Failing Exams: How to Turn Failure into an Opportunity for Growth

One of the most valuable lessons I have learned is that failing an exam is not the end of the world. In fact, it can be a crucial step in the learning process. When we fail, it forces us to take a step back and assess what went wrong.

What Is Symmetric Encryption? [VIDEO]

Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….

This Post Has One Comment

Comments are closed.