Loading…
Welcome to the third annual Cybersecurity Across Disciplines (CyAD) Conference hosted by the National Cybersecurity Training & Education Center (NCyTE)! 
  • The schedule is tentative and subject to change.  Please check back regularly for the most current version.
  • Important Notice: All sessions are first-come, first-served. While you can plan your schedule in Sched, it does not guarantee a seat in any session. CyAD registrants check your email inbox or junk folder for Sched invite.
arrow_back View All Dates
Tuesday, June 24
 

7:15am CDT

Registration Open and Badge Pick-Up
Tuesday June 24, 2025 7:15am - 4:00pm CDT
Tuesday June 24, 2025 7:15am - 4:00pm CDT
BLDG M Lobby

8:00am CDT

Summit Opening and Welcome
Tuesday June 24, 2025 8:00am - 8:05am CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 8:00am - 8:05am CDT
BLDG M Moraine Rooms

8:05am CDT

Moraine Valley Community College President's Welcome
Tuesday June 24, 2025 8:05am - 8:15am CDT
Speakers
avatar for Dr. Pamela Haney

Dr. Pamela Haney

President, Moraine Valley Community College
Dr. Pamela J. Haney became the sixth president of Moraine Valley Community College on July 1, 2023. She previously served as vice president for Academic Affairs, a position she assumed in 2012. Her leadership at Moraine Valley is committed to ensuring student success and accessibility... Read More →
Tuesday June 24, 2025 8:05am - 8:15am CDT
BLDG M Moraine Rooms

8:15am CDT

Opening Remarks
Tuesday June 24, 2025 8:15am - 8:35am CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 8:15am - 8:35am CDT
BLDG M Moraine Rooms

8:35am CDT

Platinum Sponsor Welcome: Mutare
Tuesday June 24, 2025 8:35am - 8:45am CDT
Speakers
avatar for Rich Quattrocchi

Rich Quattrocchi

Vice President of Digital Transformation, Mutare
As Mutare’s Vice President of Digital Transformation, Rich serves as the primary team liaison and product manager for the organization’s development, marketing and sales efforts surrounding its key product offerings. His love for start-up culture, extensive communication skills... Read More →
Tuesday June 24, 2025 8:35am - 8:45am CDT
BLDG M Moraine Rooms

8:45am CDT

Keynote: Cybersecurity: An Interdisciplinary Imperative
Tuesday June 24, 2025 8:45am - 9:15am CDT
The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against the evolving risks of tomorrow. This keynote will highlight the nexus between cybersecurity and safety, and emphasize the importance of integrating cybersecurity education into curricula. Join us for this keynote to explore how interdisciplinary collaboration and can transform cybersecurity from a technical challenge into a shared mission.
Speakers
avatar for Wei Chen Lin

Wei Chen Lin

Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Wei Chen Lin serves as a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA), where he supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure. As a CSA, Wei Chen conducts various cyber... Read More →
Tuesday June 24, 2025 8:45am - 9:15am CDT
BLDG M Moraine Rooms

9:30am CDT

Keynote: Glimpses into Possible Futures for Cybersecurity and Privacy: Implications from the Personal Perspective to the Global View
Tuesday June 24, 2025 9:30am - 10:15am CDT
Today, our concerns center around how to best ensure cybersecurity and privacy for all of the aspects of our lives touched by technology. This summit will explore a variety of diverse topics such as artificial intelligence, agriculture, biotechnology, critical infrastructure, manufacturing, medicine, and robotics. This event will also look at how best to prepare individuals, whether cybersecurity specialists or those who are focused on business (or government) with a concern for cybersecurity, to deal with the threats that are expected to increase exponentially with the advancements in AI while respecting people’s individual rights related to data privacy.

Is the future all gloom and doom? Or will AI solve all of our cybersecurity and privacy problems? Or are the futures of cybersecurity and privacy likely to be somewhere between these extremes? In this keynote, glimpses of possible futures related to cybersecurity and privacy will be explored. How can examining lessons from the past inform our views on cybersecurity and privacy in the future? Will geopolitics, such as the possible fracturing of the internet, impact cybersecurity and privacy? How does the training and preparation that is taking place today related to cybersecurity and privacy serve as a potential source of hope for the future?
Speakers
avatar for DeBrae Kennedy-Mayo

DeBrae Kennedy-Mayo

Faculty of Law & Ethics, Georgia Institute of Technology
DeBrae Kennedy-Mayo is Faculty of Law & Ethics at the Scheller College of Business at the Georgia Institute of Technology (Georgia Tech). She is an internationally recognized expert on privacy and cross-border data flows. Kennedy-Mayo researches and writes on legal and policy issues... Read More →
Tuesday June 24, 2025 9:30am - 10:15am CDT
BLDG M Moraine Rooms

10:30am CDT

Panel: Cross Disciplinary Challenges and Support for Cybersecurity Education from an International Perspective
Tuesday June 24, 2025 10:30am - 11:15am CDT
The CyAD Summit aims to facilitate knowledge-sharing and collaboration among academia and industry, explore interdisciplinary approaches to address cybersecurity threats across various sectors, and provide faculty with tools and strategies to integrate cybersecurity into their curriculum.  The prosed panel will offer a way to enlarge the pool of ideas that faculty can use to apply in their classrooms, to participate in Best Practice exchanges and undertake shared efforts : international collaboration.

Relating to industry concerns, allowing cybersecurity challenges to jump to non-technology domains and ability to view approaches to solutions in legal and cultural environments different that one’s own is a practical outcome of international collaboration.  The presenters are all engaged in an international effort to bring new perspectives into cross discipline discussions: the International Cybersecurity Education Collaborative (ICEC).  The panel will address current ICEC initiatives for cybersecurity awareness and skills across disciplines in three vital areas: Innovation, Industry and Access.
Speakers
avatar for Dr. Costis Toregas

Dr. Costis Toregas

GWU CSPRI Director, GWU
Dr. Costis Toregas is the Director of the Cyber Security and Privacy Research Institute at The George Washington University and the Industry and International Programs lead for NCyTE.
avatar for Kyle Jones

Kyle Jones

Assistant Dean of Technology, Grants, and External Partnerships & Professor, Sinclair Community College (OH)
Kyle Jones, a professor and the Information Technology Chair at Sinclair, serves as the lead of NITIC’s AI, Operational Technology, and externship initiatives. He is also a CAE2Y Principal Investigator, the Principal Investigator for the Community College Scholar for Service Program... Read More →
avatar for Amy Hysell

Amy Hysell

California State University, San Bernardino
Amy Hysell is a partnership manager for the Centers of Academic Excellence in Cybersecurity Community National Center, playing a pivotal role in coordinating with the National Security Agency National Centers of Academic Excellence (N-CAE) program, government partners and over 470... Read More →
avatar for Dr Charles Clarke

Dr Charles Clarke

Co-founder CSE Connect, University of Roehampton
Charles is Head of Computing at the University of Roehampton (London). He is a co-founder of CSE Connect, a government funded national and international cyber security education network.As a cyber security education specialist, he regularly presents at national and international events... Read More →
avatar for Dr Natalie Coull

Dr Natalie Coull

Staff, Abertay University
Dr Natalie Coull is the Head of Department of Cybersecurity and Computing at Abertay University, and Director of their NCSC recognised Academic Centre of Excellence in Cyber Security Education (ACE-CSE gold award). Natalie has research expertise in secure coding, digital watermarks... Read More →
Tuesday June 24, 2025 10:30am - 11:15am CDT
BLDG M Moraine Rooms

11:30am CDT

Working Lunch (Panel/Presentation & Discussion)
Tuesday June 24, 2025 11:30am - 12:00pm CDT
Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
Tuesday June 24, 2025 11:30am - 12:00pm CDT
BLDG M Moraine Foyer

12:00pm CDT

Lunch Panel & Discussion: Building Cybersecurity Resilience through Cross-border Collaboration and the ICEC
Tuesday June 24, 2025 12:00pm - 1:00pm CDT
The cybersecurity landscape continues to evolve at a rapid pace, with threats becoming increasingly sophisticated while the global talent shortage grows more acute. This panel discussion brings together international perspectives on building resilient cybersecurity workforces capable of adapting to evolving threats, and how the International Cybersecurity Education Collaborative (ICEC) and its Special Interest Groups (SIGs) are increasing in strength and working together on a global front. Don't miss this session to learn how you can become involved.  
Speakers
avatar for Dr. Costis Toregas

Dr. Costis Toregas

GWU CSPRI Director, GWU
Dr. Costis Toregas is the Director of the Cyber Security and Privacy Research Institute at The George Washington University and the Industry and International Programs lead for NCyTE.
avatar for Dr Tony Coulson

Dr Tony Coulson

Director, Cybersecurity Center, CSUSB
Dr. Tony Coulson is currently a professor and the Executive Director of the Cybersecurity Center at California State University, San Bernardino and a co-PI on the NCyTE project.
avatar for Deanne Cranford-Wesley

Deanne Cranford-Wesley

Director Cybersecurity Program, North Carolina Central University
Dr. Deanne Cranford-Wesley is the Director of Cybersecurity Programs at North Carolina Central University (NCCU); she is also the Point of Contact for the Center of Academic Excellence in Cyber Defense, and she oversees the innovative cybersecurity lab at NCCU. Dr. Cranford- Wesley... Read More →
avatar for Prof. Phil Legg

Prof. Phil Legg

Professor of Cyber Security, University of the West of England
Prof. Phil Legg is a Full Professor of Cyber Security at the University of the West of England (UWE Bristol), UK, in recognition of “Advancing Teaching and Learning” (Primary domain) and for “Research with Impact” (Secondary domain). He is Co-Director of the UWEcyber Acad... Read More →
avatar for John Madelin

John Madelin

Co-Director CSE Connect, CSE Connect
John Madelin is a founding member and innovator of PKI technology in Europe, Board Advisory member of RSA security conferences and growth driver of their business in EMEA.   He designed, built and ran large-scale security services for BT and Verizon’s major clients, achieving top... Read More →
Tuesday June 24, 2025 12:00pm - 1:00pm CDT
BLDG M Moraine Rooms

1:15pm CDT

Collaborative Approaches to Securing Healthcare Systems: Integrating Cybersecurity into Nursing and Business Curricula
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
This session highlights the collaborative potential between nursing and business programs to address cybersecurity vulnerabilities in healthcare systems. Recent breaches, such as the 2023 ransomware attack on Prospect Medical Holdings and the PharMerica data compromise affecting millions, underscore the importance of interdisciplinary approaches. Participants will explore how nursing programs can integrate cybersecurity principles into patient care training, while business programs focus on risk management, regulatory compliance, and financial implications of breaches. By working together, nursing and business faculty can develop curricula that prepare students to safeguard medical devices, protect patient data, and navigate the financial and operational impacts of cyber threats. The session will feature case studies, joint curriculum strategies, and real-life examples to demonstrate how these disciplines can collaboratively enhance healthcare cybersecurity by ensuring that graduates are ready for cybersecurity challenges.
Speakers
avatar for Tatyana Pashnyak

Tatyana Pashnyak

Lecturer of Business, Abraham Baldwin Agricultural College
Tatyana Pashnyak is an educator with over 26 years of experience spanning middle school, high school, community college, four-year college, and university levels. She earned a BS in Middle Grades Education and M.Ed. in Business Education degrees from University of West Georgia and... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-201

1:15pm CDT

Mitigating Voice Phishing Attacks: Best Practices in the AI Age
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
With high-profile incidents increasing and the ongoing shift toward more sophisticated socially engineered, AI powered voice attacks, this topic is timely and essential for enterprise leaders looking to close a critical security gap. Voice communications are rapidly becoming one of the fastest-growing cybersecurity threat vectors with 1 in 5 successful breaches attributed to voice phishing. Yet many organizations remain unprepared.

This session explores the evolution of voice as a significant threat vector, highlighting why it continues to be the most under protected communication channel. We'll analyze real-world examples, including socially engineered voice spear phishing attacks like those deployed by Scattered Spider and ALPHV against MGM, to illustrate the urgency of addressing this gap and the emerging role deep fake voice plays in initial access.

The discussion will cover the latest mitigations, from joint FBI/CISA advisories and the MITRE framework including education and voice traffic firewall controls designed to prevent attacks before they happen. Attendees will gain actionable insights into implementing foundational best practices for voice cybersecurity across four critical business units: Cybersecurity, Information Technology, risk management, and the Contact Center. The session will provide guidance on conducting a voice traffic assessment to evaluate organizational risk and enhance protection strategies.
Speakers
avatar for Rich Quattrocchi

Rich Quattrocchi

Vice President of Digital Transformation, Mutare
As Mutare’s Vice President of Digital Transformation, Rich serves as the primary team liaison and product manager for the organization’s development, marketing and sales efforts surrounding its key product offerings. His love for start-up culture, extensive communication skills... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-205

1:15pm CDT

Securing Legacy Systems through Virtualization
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
There are many technical, financial, and operational advantages to Virtualizing Old Hardware and Operating Systems. These include security, backup and recovery, stability and ease of use. In this demonstration, the presenter will discuss legacy systems and their prevalence in the energy and utilities sector, as well as the manufacturing and transportation industries. Virtualizing these devices will help organizations and companies avoid risk, security incidents, dependency on legacy hardware, and help speed up recovery time. The presenter will demonstrate various legacy systems and programs running in a virtual environment. 
Speakers
avatar for Jesse Varsalone

Jesse Varsalone

Collegiate Associate Professor, Cybersecurity Technology, University of Maryland Global Campus (UMGC)
Jesse holds several certifications in the IT field, including A+, Arduino, CASP+, CEH, CISSP, Cloud+, CTT+, CYSA+, iNet+, Linux+, Net+, Pentest+, Security+, Server+ . He passed his first certification exam in 2000 and his last one in 2023. Jesse has spoken at several conferences including... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-210

1:15pm CDT

Insights and Strategies for Cybersecurity Education Programs to Fortify Critical Sectors
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
This presentation will provide an exploration of interdisciplinary approaches to cybersecurity, focusing on two critical sectors: Water Treatment Plants (primary) and Agriculture (secondary). Drawing on insights from the Cybersecurity Innovation Center (CIC) at West Virginia State University, this session will share practical applications, case studies, and lessons learned to help faculty, college administrators, and industry leaders integrate core cybersecurity concepts into their disciplines. Attendees will gain actionable strategies for teaching, research engagement, and developing grant opportunities to enhance interdisciplinary cybersecurity education.  

  1. Introduction to Critical Infrastructure Cybersecurity
  2.  Safeguarding Water Treatment Plants: Practical Insights and Emerging Threats
    1. Teaching PLC/SCADA Security with Portable Learning Kits
    2. Emerging Threats:
  3.  Addressing Cybersecurity in Agriculture: Opportunities and Challenges
  4. Engaging Research Teams and Faculty for Collaborative Success
    1. CIC’s strategy for fostering a high-performing research team
    2. Guidance for faculty
  5.  Takeaways and Future Directions 
Speakers
avatar for Dr. Ali Alsinayyid

Dr. Ali Alsinayyid

Director of Cybersecurity Innovation Center, West Virginia State University
Dr. Ali Al-Sinayyid, Ph.D., is an Assistant Professor and Director of the Cybersecurity Innovation Center at West Virginia State University. With over 17 years of experience in academia and industry, he has secured significant funding, including a $1 million Google grant, and developed... Read More →
avatar for Naveed Zaman

Naveed Zaman

Dean, College of Natural Sciences and Mathematics, West Virginia State University
Dr. Naveed Zaman is a Professor of Mathematics and Dean of the College of Natural Sciences and Mathematics at West Virginia State University (WVSU). He has extensive experience in higher education administration, academic program development, and strategic planning. He has spearheaded... Read More →

Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-203

2:15pm CDT

Getting Students Hands-On with Top Vulnerabilities in Critical Infrastructure
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
Learn about the CISA Threat Sandbox Challenges, a collection of hands-on red and blue team experiences based on entries from the CISA Known Exploited Vulnerabilities (KEV) Catalog that provide educators and their students the opportunity to learn the tools, techniques, and procedures (TTPs) needed to show competency in exploiting and mitigating KEVs within critical infrastructure themed digital environments. This collection of CISA-funded and co-designed hands-on challenges is available for free for US-based educators and their students via the XP Cyber Range.
Speakers
avatar for James Ashley

James Ashley

Director of Research & Development, XP Cyber @ CSUSB
Mr. Ashley is the Director of R&D at the CSUSB Center for Cyber & AI, and oversees the development of multiple national cybersecurity projects.
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-203

2:15pm CDT

Exploring Cybersecurity’s Role in Managing AI Risk to Community Ecosystems
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
In the spirit of economic development, cities often compete for the attention of large corporate brands, especially “Big Tech”, to settle in their communities creating attractive incentives like tax-breaks and favorable construction terms. Residents in the affected communities get excited about the prospect of new jobs or career growth. With the recent explosion of the everyday use of Artificial Intelligence (AI) changing work and life as we know it in society, cities want to be known as technology leaders or at least early adopters. And in today’s evolving world, one of Cybersecurity’s main functions is to not only enable the business but also just as importantly managing risk for the business.  As professionals, we have an obligation to ensure that solutions our organizations develop, especially those involving AI, promote benefits to not only the organization but also society and do not cause harm to the environment. 
In this session, we will explore Cybersecurity’s role to understand potential and realized risks of accommodations to secure and implement “Big Tech” initiatives in communities with respect to energy, water, and waste systems. Attendees will be exposed to the use of risk management frameworks to identify and mitigate these risks and drive sustainable outcomes as well as the situational applicability of ethics in the cybersecurity profession. Case studies and statistics   will be citied from various real-world communities. While some case discussed will be resolved with implemented remediations, others will be on-going with the opportunity to explore potential solutions.
Speakers
avatar for Joy Toney

Joy Toney

Senior Consultant, AIM For Change LLC
Joy Toney serves as a Senior Program Consultant for AIM for Change, LLC. Joy’s career successes are mapped over 20+ years professional experience, both people leader and individual contributor roles, in non-profit, consumer services, government contracting, and transportation. Joy... Read More →
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-205

2:15pm CDT

Space Cybersecurity: Implications for Critical Infrastructure
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
Space-based services underpin all critical infrastructure and yet space itself is not designated as critical infrastructure. This niche and increasingly important area of cybersecurity has a dearth of SME expertise to support its development and protection. Additionally, there are few academic institutions offering the content needed to build the workforce prepared to address the cybersecurity challenges of the space domain. Of those that exist, most target PhD level candidates working on dissertations related to the topic. While it is encouraging that advanced academics are contributing to the body of knowledge in space cybersecurity, providing content at the undergraduate level provides a richer opportunity for workforce development. This presentation will provide an overview of space cybersecurity, its challenges, its relationship to critical infrastructure, and opportunities for incorporating it into cybersecurity academic content for future workforce development.

Approved for public release; distribution is unlimited. Public Affairs release approval # AFRL20250907
Speakers
avatar for Sherry Neher

Sherry Neher

Information Technology Specialist, Airforce Research Laboratory, Space Vehicles Directorate
Sherry Neher is a member of the space cyber resiliency team at Airforce Reasearch Laboratory. Her research is at the intersection of cybersecurity and autonomy in space vehicle development. 
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-210

2:15pm CDT

Hands-On Embedded Security with the MITRE eCTF
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
Explore the field of embedded systems security with an introduction to MITRE’s Embedded Capture the Flag competition, an annual competition for students in high school through grad school.

In part one, participants will be introduced to the structure of the competition and will gain experience working with microcontrollers by building, flashing, and interacting with the reference design of the 2025 eCTF. They will then explore some basic techniques for attacking the unsecured design. No background experience is required for part one.

In part two, participants will dive deeper into embedded security by attacking real designs submitted by students and exploring the various techniques embedded security practitioners use to defeat secure designs. Understanding of fundamental cybersecurity topics is helpful for part two.

The workshop will be held in a computer lab. If you prefer to bring your own computer (Windows/Mac/Linux), it must have internet access and Python 3.12+ pre-installed. Docker Desktop is also highly recommended, but the workshop can be completed without it.

The workshop can be found at https://github.com/janisbent/ectf-workshop
Speakers
avatar for Ben Janis

Ben Janis

Lead Embedded Security Engineer, MITRE
Ben Janis is a Lead Embedded Security Engineer at MITRE, where he focuses on embedded security research and development. His expertise lies in microarchitectural attacks and developing compiler-assisted countermeasure insertion and automated vulnerability detection tools. In addition... Read More →
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
BLDG T-101/102

2:15pm CDT

Integrating Cybersecurity into Multiple Disciplines using AI and Workplace Scenarios
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
This interactive session equips instructors with tools and frameworks to integrate cybersecurity into various disciplines, emphasizing its importance in biotechnology, advanced manufacturing, and healthcare. By leveraging AI and cross-disciplinary approaches, educators can create engaging scenarios that enhance students' understanding and application of cybersecurity principles. The presentation covers the development of realistic workplace scenarios, follow-up questions, and strategies for seamless curriculum integration, aiming to improve cyber awareness and skills in future professionals. Objectives include providing an AI prompt framework, designing effective follow-up questions, and presenting metrics to assess scenario effectiveness.
Speakers
avatar for Tony Brown

Tony Brown

Department Chair, Forsyth Technical Community College
Tony Brown is the Department Chair for the Davis iTEC Cybersecurity Center. His responsibilities are over the following programs: Cyber Security, Systems Security, Network Management (Program Coordinator), Technical Support, FTCC’s K-12 Initiative, any and all CAE initiatives, and... Read More →
avatar for Victoria Ferrell

Victoria Ferrell

Cybersecurity Program Coordinator, Forsyth Technical Community College
Victoria Ferrell is the Cybersecurity and Systems Security Program Coordinator at Forsyth Technical Community College. With a robust background in education and IT, Victoria focuses on coordinating and instructing hands-on cybersecurity and systems security programs. These responsibilities... Read More →
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
BLDG T-953

3:15pm CDT

Developing Employer-Led Artificial Intelligence Programs in Multiple Scenarios
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
This session will be a panel discussion featuring educators and employers who have participated in developing Artificial Intelligence programs at two major colleges and through two major NSF projects. The focus will be on how faculty and business subject matter experts interacted to develop these programs. Featured will be Applied Artificial Intelligence Programs at Miami Dade College, and Harper College as well as the work being done through two NSF projects: The National Applied AI Consortium and the National Information Technology Innovation Center. All work employed the Business and Industry Leadership Team (BILT) approach to determine program content. The work to be discussed is at different stages of development, and results to date will be presented.  Both successes and challenges each college encountered during program development will be addressed with plenty of time for audience questions.
Speakers
avatar for Ann Beheler

Ann Beheler

Director of Innovation, Center for Occupational Research
 Over many years, Dr. Ann Beheler has been dedicated to helping educators build deeper relationships with employers to then better align undergraduate education to employers’  future employment needs using the Business & Industry Leadership Team Model (BILT) she developed... Read More →
avatar for Aaron Burciaga

Aaron Burciaga

Founder and CEO, Zetai Global
Aaron Burciaga leads ZETAI as CEO, and as a Service-disabled veteran he is renowned for fusing military precision with cutting-edge AI expertise. With 20+ years spearheading transformative AI initiatives for Fortune 500 companies and federal agencies, he delivers solutions that bridge... Read More →
avatar for Bich-Thuy Le

Bich-Thuy Le

President/Founder, LeLumin
Bich-Thuy Le is a seasoned executive with over 25 years of experience leading highly effective teams in digital transformation, governance, and AI across Fortune 500 companies. An award-winning leader with two U.S. AI patents and more pending, she has pioneered innovative solutions... Read More →
avatar for Lawrence (Larry) McWherter

Lawrence (Larry) McWherter

Associate Professor - Cybersecurity, Principal Investigator - National Information Technology Innovation Center (NITIC), Columbus State Community College (OH)
Larry McWherter provides leadership to the NITIC team as the PI, overseeing the strategic direction of all initiatives, and serving as the deliverable lead for the IT Innovation Network’s Community of Practice. Larry is an associate professor of cybersecurity at Columbus State... Read More →
avatar for Dr. Michele Smith

Dr. Michele Smith

VP for Workforce Solutions, Harper College
Dr. Michelé E. Smith has worked for William Rainey Harper College since 2002 and is currently serving as Vice President of Workforce Solutions. Prior to serving in her current role, Michelé held positions at Harper College as the Associate Provost for Curriculum, Special Assistant... Read More →
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M Moraine Rooms

3:15pm CDT

Datathons: Advancing Experiential Learning at the Industry-Academia Nexus
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
Experiential learning enhances education, particularly in competency-based programs at community and technical colleges. Industry collaboration is essential, especially for National Centers of Academic Excellence, as their competencies align with workforce roles.

The electric and power industries play a crucial role in national challenges like risk management, climate resilience, and cyber threats to industrial systems such as SCADA. These challenges go beyond standard cybersecurity curricula, as SCADA training is costly and complex.

This work proposes an experiential learning initiative integrating industry insights through a Datathon, simulating real-world cybersecurity issues in the electric sector. The Datathon provides hands-on experience, helping students understand cybersecurity threats impacting power systems. Endorsed by industry partners, it ensures alignment with workforce needs.
Speakers
avatar for Christian Servin

Christian Servin

Professor/Education Research Developer, El Paso Community College
Christian Servin, Ph.D., is a Professor at EPCC and POC for NCAE-CD. An ACM and IEEE member, he advances computing education and cybersecurity, contributing to curricula and creating experiential learning practices.
avatar for Nadia Karichev

Nadia Karichev

Assistant Professor, El Paso Community College
Nadia Karichev is an assistant professor specializing in Information Technology and Cybersecurity, with expertise in Competency-Based Education and experiential learning practices.
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-203

3:15pm CDT

Creating and Conducting Critical Infrastructure Sector Risk Assessments using the CISA CSET Tool Integrating Artificial Intelligence (AI)
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
This presentation will cover the process of using AI in developing a CSET Tool Risk Assessment Assignment. The presentation will cover CSET/AI scenarios that will use an Oil & Gas Pipeline Company IT/OT Risk Assessment example. The challenge in performing a CSET tool Risk Assessment in an academic environment is having the business and IT subject matter experts input to answer the questions generated by the CSET tool. This presentation will demonstrate how AI was used to simulate the SME’s in a realistic manner.

Speakers
avatar for Stephen Miller

Stephen Miller

Consultant, NCyTE
Mr. Miller is a Professor Emeritus ENMU-Ruidoso (non-Native American Serving Institution), CAE Peer Review National Center (CNC) Director and NSF ATE National Cybersecurity Training and Education Center (NCyTE) Leadership Team Member contracted through Whatcom Community College.He... Read More →
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-210

3:15pm CDT

Transforming Retail Operations with AI, Robotics, and Automation
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
Major retailers – including Walmart, Costco, Amazon, and Target – are leveraging cutting-edge technologies such as artificial intelligence (AI), robotics, wireless IoT, and automation to revolutionize their operations. Between 2023 and 2025, these companies have launched AI-driven logistics systems, cashier-less stores, predictive analytics platforms, robotic inventory solutions, and smart supply chains to boost efficiency and enhance customer experience. At the same time, they face challenges around cybersecurity, workforce impacts, and the high costs of implementation. This report examines how these technologies are being deployed in retail, highlighting recent case studies, benefits (e.g. faster deliveries, cost savings, improved shopping convenience), and challenges (e.g. cyber risks, job displacement, upfront investment).
Speakers
avatar for Michael Qaissaunee

Michael Qaissaunee

Professor/Chair, Engineering and Technology, Brookdale Community College
Professor Mike Qaissaunee chairs Engineering & Technology at Brookdale, directs its Cyber Center, secures NSF grants, and champions cybersecurity education.
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-205

4:15pm CDT

Student Spotlight: Securing the Vehicle Firmware Supply Chain
Tuesday June 24, 2025 4:15pm - 4:35pm CDT
The automotive industry’s systems and over-the-air (OTA) updates have vulnerabilities in its software supply chain (SSC). Although frameworks like Uptane have improved OTA security, gaps remain in ensuring software integrity and provenance. In this paper, we examine challenges securing the automotive SSC and introduce a framework, GUIXCHAIN, that integrates version control, reproducible builds, blockchain technology, and software bills of materials (SBoMs) for transparency, auditability, and resilience. Reproducible builds guarantee identical resulting binaries when compiling the same source code in different environments, as any deviation in the final output indicates a potential compromise in the build process, such as malware injection.

Our preliminary study shows Guixchain’s use of reproducible builds ensures consistent and integrity-secured software across various build environments. The blockchain provides forensic capabilities, offering a history of the what, who and where of discrepancies within the SSC process. SBoMs provide an inventory of the software components used. Our preliminary study demonstrates that Guixchain effectively mitigates risks such as ransomware, unauthorized modifications, and build server compromises, reinforcing the systems integrity and resilience throughout the software life cycle.
Speakers
avatar for Iwinosa Aideyan

Iwinosa Aideyan

Graduate student, Clemson University
Iwinosa Aideyan is a third-year Ph.D. student in Computer Engineering at the Virtual Prototyping of Autonomy-Enabled Ground Systems (VIPR-GS) Center in conjunction with the US Army at Clemson University, with a research focus on automotive cybersecurity.  Her work aims to enhance... Read More →
Tuesday June 24, 2025 4:15pm - 4:35pm CDT
BLDG M Moraine Rooms

4:35pm CDT

Cybersecurity Competitions Across Disciplines
Tuesday June 24, 2025 4:35pm - 4:45pm CDT
Speakers
avatar for Dr. Jake Mihevc

Dr. Jake Mihevc

Asst. VP, Academic Affairs, Mohawk Valley Community College
Jake serves as Dean of Science, Technology, Engineering and Math at Mohawk Valley Community College. He launched the college’s Cybersecurity AS program in 2014 and helped it achieve the CAE-CD designation in 2016. Jake serves as PI of the NCAE Cyber Games project, leads CAE strategic... Read More →
Tuesday June 24, 2025 4:35pm - 4:45pm CDT
BLDG M Moraine Rooms

4:45pm CDT

Day 1 Recap
Tuesday June 24, 2025 4:45pm - 5:00pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 4:45pm - 5:00pm CDT
BLDG M Moraine Rooms

5:00pm CDT

Networking Reception
Tuesday June 24, 2025 5:00pm - 5:30pm CDT
Enjoy networking and light refreshments in the foyer while we set up for this evening’s dinner program.
Tuesday June 24, 2025 5:00pm - 5:30pm CDT
BLDG M Moraine Foyer

5:30pm CDT

Networking Dinner
Tuesday June 24, 2025 5:30pm - 6:00pm CDT
Pick up your dinner in the foyer and bring it into the Moraine Room to continue networking and enjoy the plenary presentation.
Tuesday June 24, 2025 5:30pm - 6:00pm CDT
BLDG M Moraine Foyer

6:00pm CDT

Evening Plenary: Toward an Assured & Resilient Navigation in Advanced Transportation Systems
Tuesday June 24, 2025 6:00pm - 6:45pm CDT
The role of positioning and navigation systems as a critical infrastructure can't be ignored in our today's applications. However, these critical systems face key challenges facing these systems, such as signal interference, spoofing, cybersecurity threats, and dependency on space-based infrastructure, which can compromise their reliability and effectiveness. Therefore, there is a need for innovative solutions to these challenges, such as integrating terrestrial and space-based systems for improved resilience, developing robust backup technologies, and deploying advanced threat detection mechanisms. Collaboration between governments, private sectors, and academia will be emphasized as a vital component of creating a resilient ecosystem for positioning and navigation systems. Recently, the US Department of Transportation has funded a consortium to establish the Center for Assured & Resilient Navigation in Advanced Transportation Systems (CARNATIONS). CARNATIONS focuses on proposing innovative research and workforce development solutions to deal with positioning and navigation challenges.
Speakers
avatar for Dr. Moussa Ayyash

Dr. Moussa Ayyash

Director at Chicago State University & co-PI of the Center for Assured & Resilient Navigation in Advanced Transportation Systems (CARNATIONS), Chicago State University
Dr. Moussa Ayyash is a Professor in the Department of Information Studies at Chicago State University and Director of the Center of Information and National Security Education and Research (CINSER). He holds B.S., M.S., and Ph.D. degrees in Electrical and Computer Engineering. His... Read More →
Tuesday June 24, 2025 6:00pm - 6:45pm CDT
BLDG M Moraine Rooms

6:45pm CDT

Day 1 Closing Remarks
Tuesday June 24, 2025 6:45pm - 7:00pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 6:45pm - 7:00pm CDT
BLDG M Moraine Rooms
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone


Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -