

Keelan Knox
Information Security Professional
Oklahoma City, Oklahoma, United States
Actions
Keelan Knox formerly served as Security Engagement Manager at Alias Cybersecurity, where he quickly advanced after joining the company in 2022. In this role, he brought together expertise in cybersecurity and project management to deliver high-impact client engagements. His background spans business enablement & development, SOC monitoring services, penetration testing, network security, IT auditing, incident response, security awareness training, risk assessment, and social engineering.
During his time at Alias Cybersecurity, Knox was promoted from Security Analyst to Security Engineer to Security Engagement Manager, where he led a team of engineers and security analysts. He oversaw engineering projects as well as security operations & sales, ensuring that technical execution aligned with client objectives and security best practices.
Knox’s leadership experience, combined with his technical foundation, reflects his ability to bridge technical execution with organizational strategy helping teams and businesses strengthen resilience against evolving threats.
Links
Area of Expertise
Topics
Staying Sane in Cyber
Cybersecurity is a niche field. It can also be an isolating one, especially if you're in the work of incident response and digital forensics. If you are in incident response, whether as an in house responder or contracted specialist, the immediate stress can be extreme. It's not just the work of figuring out the attack and remediating the damage. It's knowing and keeping up with the communication, both internally and externally, informal or compliance required. It can take a physical and mental toll. And then there's the aftermath, whether PR or legal or organization specific. Knowing what you can share and process and with whom (if anyone). And digital forensics? You've got even more control over what you can share. That may not be surprising. But beyond that, there's the potential ramifications of even talking about how what you see, often striking and shocking images, affects you. If you say the wrong thing or let slip you've been affected, that can be used later to question your credibility and competence. This talk will provide a framework for understanding the stress of the job and what you can do to mitigate the danger to self and ensure long-term stability. Are you a practitioner? Come to learn for yourself. Are you in leadership or governance? Come to learn how to support your staff. Neither? Come to learn how to support your community. Because healthy individuals in the profession make a healthier cyber community for us all.
Hacking the Human: Zero Trust & Breaches
Ever wonder what it's like to outsmart the smartest? Join me, as we dive deep into the art of "Hacking the Human: Zero Trust & Breaches." We’ll explore the vulnerabilities that hackers love to exploit—human trust. Social engineering isn't just a buzzword; it's the most effective tool in a hacker's arsenal, and I'll show you exactly how it's done.
In this session, we'll break down real-world examples of how I and others have bypassed some of the most secure systems by targeting the weakest link: people. I’ll also share how zero trust can be a game-changer in securing organizations, ensuring that no one—even the most trusted employees—gets a free pass.
This isn't your typical cybersecurity talk. Expect stories, live demonstrations, and a no-nonsense approach to understanding and defending against the threats lurking in organizations. If you think your firewall is enough, think again. Let’s dig into the human factor and turn the weakest link into the strongest defense.
From Vulnerabilities to Vacancies: Hacking the Hiring Pipeline
The same skills that help us identify attack surfaces can also reveal overlooked opportunities in our careers. Most cybersecurity professionals rely on noisy job boards or recruiter reposts, often missing roles hidden deep inside company ATS platforms.
This talk introduces a purpose-built ATS reconnaissance and aggregation tool that systematically enumerates Workday tenants and other hiring platforms (Greenhouse, Lever, SmartRecruiters, Recruitee). By pulling listings directly from employer career sites, the tool ensures that applicants see the most current, authoritative openings, not stale third-party posts.
Key Takeaways:
How to identify and enumerate ATS endpoints across industries. Why direct-to-source applications can bypass recruiter noise and improve visibility. Practical strategies for applying security recon techniques to professional growth.

Keelan Knox
Information Security Professional
Oklahoma City, Oklahoma, United States
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top