Loading…
Welcome to the third annual Cybersecurity Across Disciplines (CyAD) Conference hosted by the National Cybersecurity Training & Education Center (NCyTE)! 
  • The schedule is tentative and subject to change.  Please check back regularly for the most current version.
  • Important Notice: All sessions are first-come, first-served. While you can plan your schedule in Sched, it does not guarantee a seat in any session. CyAD registrants check your email inbox or junk folder for Sched invite.
Tuesday, June 24
 

7:15am CDT

Registration Open and Badge Pick-Up
Tuesday June 24, 2025 7:15am - 4:00pm CDT
Tuesday June 24, 2025 7:15am - 4:00pm CDT
BLDG M Lobby

8:00am CDT

Summit Opening and Welcome
Tuesday June 24, 2025 8:00am - 8:05am CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 8:00am - 8:05am CDT
BLDG M Moraine Rooms

8:05am CDT

Moraine Valley Community College President's Welcome
Tuesday June 24, 2025 8:05am - 8:15am CDT
Speakers
avatar for Dr. Pamela Haney

Dr. Pamela Haney

President, Moraine Valley Community College
Dr. Pamela J. Haney became the sixth president of Moraine Valley Community College on July 1, 2023. She previously served as vice president for Academic Affairs, a position she assumed in 2012. Her leadership at Moraine Valley is committed to ensuring student success and accessibility... Read More →
Tuesday June 24, 2025 8:05am - 8:15am CDT
BLDG M Moraine Rooms

8:15am CDT

Opening Remarks
Tuesday June 24, 2025 8:15am - 8:35am CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 8:15am - 8:35am CDT
BLDG M Moraine Rooms

8:35am CDT

Platinum Sponsor Welcome: Mutare
Tuesday June 24, 2025 8:35am - 8:45am CDT
Speakers
avatar for Rich Quattrocchi

Rich Quattrocchi

Vice President of Digital Transformation, Mutare
As Mutare’s Vice President of Digital Transformation, Rich serves as the primary team liaison and product manager for the organization’s development, marketing and sales efforts surrounding its key product offerings. His love for start-up culture, extensive communication skills... Read More →
Tuesday June 24, 2025 8:35am - 8:45am CDT
BLDG M Moraine Rooms

8:45am CDT

Keynote: Cybersecurity: An Interdisciplinary Imperative
Tuesday June 24, 2025 8:45am - 9:15am CDT
The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against the evolving risks of tomorrow. This keynote will highlight the nexus between cybersecurity and safety, and emphasize the importance of integrating cybersecurity education into curricula. Join us for this keynote to explore how interdisciplinary collaboration and can transform cybersecurity from a technical challenge into a shared mission.
Speakers
avatar for Wei Chen Lin

Wei Chen Lin

Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Wei Chen Lin serves as a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA), where he supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure. As a CSA, Wei Chen conducts various cyber... Read More →
Tuesday June 24, 2025 8:45am - 9:15am CDT
BLDG M Moraine Rooms

9:30am CDT

Keynote: Glimpses into Possible Futures for Cybersecurity and Privacy: Implications from the Personal Perspective to the Global View
Tuesday June 24, 2025 9:30am - 10:15am CDT
Today, our concerns center around how to best ensure cybersecurity and privacy for all of the aspects of our lives touched by technology. This summit will explore a variety of diverse topics such as artificial intelligence, agriculture, biotechnology, critical infrastructure, manufacturing, medicine, and robotics. This event will also look at how best to prepare individuals, whether cybersecurity specialists or those who are focused on business (or government) with a concern for cybersecurity, to deal with the threats that are expected to increase exponentially with the advancements in AI while respecting people’s individual rights related to data privacy.

Is the future all gloom and doom? Or will AI solve all of our cybersecurity and privacy problems? Or are the futures of cybersecurity and privacy likely to be somewhere between these extremes? In this keynote, glimpses of possible futures related to cybersecurity and privacy will be explored. How can examining lessons from the past inform our views on cybersecurity and privacy in the future? Will geopolitics, such as the possible fracturing of the internet, impact cybersecurity and privacy? How does the training and preparation that is taking place today related to cybersecurity and privacy serve as a potential source of hope for the future?
Speakers
avatar for DeBrae Kennedy-Mayo

DeBrae Kennedy-Mayo

Faculty of Law & Ethics, Georgia Institute of Technology
DeBrae Kennedy-Mayo is Faculty of Law & Ethics at the Scheller College of Business at the Georgia Institute of Technology (Georgia Tech). She is an internationally recognized expert on privacy and cross-border data flows. Kennedy-Mayo researches and writes on legal and policy issues... Read More →
Tuesday June 24, 2025 9:30am - 10:15am CDT
BLDG M Moraine Rooms

10:30am CDT

Panel: Cross Disciplinary Challenges and Support for Cybersecurity Education from an International Perspective
Tuesday June 24, 2025 10:30am - 11:15am CDT
The CyAD Summit aims to facilitate knowledge-sharing and collaboration among academia and industry, explore interdisciplinary approaches to address cybersecurity threats across various sectors, and provide faculty with tools and strategies to integrate cybersecurity into their curriculum.  The prosed panel will offer a way to enlarge the pool of ideas that faculty can use to apply in their classrooms, to participate in Best Practice exchanges and undertake shared efforts : international collaboration.

Relating to industry concerns, allowing cybersecurity challenges to jump to non-technology domains and ability to view approaches to solutions in legal and cultural environments different that one’s own is a practical outcome of international collaboration.  The presenters are all engaged in an international effort to bring new perspectives into cross discipline discussions: the International Cybersecurity Education Collaborative (ICEC).  The panel will address current ICEC initiatives for cybersecurity awareness and skills across disciplines in three vital areas: Innovation, Industry and Access.
Speakers
avatar for Dr. Costis Toregas

Dr. Costis Toregas

GWU CSPRI Director, GWU
Dr. Costis Toregas is the Director of the Cyber Security and Privacy Research Institute at The George Washington University and the Industry and International Programs lead for NCyTE.
avatar for Kyle Jones

Kyle Jones

Assistant Dean of Technology, Grants, and External Partnerships & Professor, Sinclair Community College (OH)
Kyle Jones, a professor and the Information Technology Chair at Sinclair, serves as the lead of NITIC’s AI, Operational Technology, and externship initiatives. He is also a CAE2Y Principal Investigator, the Principal Investigator for the Community College Scholar for Service Program... Read More →
avatar for Amy Hysell

Amy Hysell

California State University, San Bernardino
Amy Hysell is a partnership manager for the Centers of Academic Excellence in Cybersecurity Community National Center, playing a pivotal role in coordinating with the National Security Agency National Centers of Academic Excellence (N-CAE) program, government partners and over 470... Read More →
avatar for Dr Charles Clarke

Dr Charles Clarke

Co-founder CSE Connect, University of Roehampton
Charles is Head of Computing at the University of Roehampton (London). He is a co-founder of CSE Connect, a government funded national and international cyber security education network.As a cyber security education specialist, he regularly presents at national and international events... Read More →
avatar for Dr Natalie Coull

Dr Natalie Coull

Staff, Abertay University
Dr Natalie Coull is the Head of Department of Cybersecurity and Computing at Abertay University, and Director of their NCSC recognised Academic Centre of Excellence in Cyber Security Education (ACE-CSE gold award). Natalie has research expertise in secure coding, digital watermarks... Read More →
Tuesday June 24, 2025 10:30am - 11:15am CDT
BLDG M Moraine Rooms

11:30am CDT

Working Lunch (Panel/Presentation & Discussion)
Tuesday June 24, 2025 11:30am - 12:00pm CDT
Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
Tuesday June 24, 2025 11:30am - 12:00pm CDT
BLDG M Moraine Foyer

12:00pm CDT

Lunch Panel & Discussion: Building Cybersecurity Resilience through Cross-border Collaboration and the ICEC
Tuesday June 24, 2025 12:00pm - 1:00pm CDT
The cybersecurity landscape continues to evolve at a rapid pace, with threats becoming increasingly sophisticated while the global talent shortage grows more acute. This panel discussion brings together international perspectives on building resilient cybersecurity workforces capable of adapting to evolving threats, and how the International Cybersecurity Education Collaborative (ICEC) and its Special Interest Groups (SIGs) are increasing in strength and working together on a global front. Don't miss this session to learn how you can become involved.  
Speakers
avatar for Dr. Costis Toregas

Dr. Costis Toregas

GWU CSPRI Director, GWU
Dr. Costis Toregas is the Director of the Cyber Security and Privacy Research Institute at The George Washington University and the Industry and International Programs lead for NCyTE.
avatar for Dr Tony Coulson

Dr Tony Coulson

Director, Cybersecurity Center, CSUSB
Dr. Tony Coulson is currently a professor and the Executive Director of the Cybersecurity Center at California State University, San Bernardino and a co-PI on the NCyTE project.
avatar for Deanne Cranford-Wesley

Deanne Cranford-Wesley

Director Cybersecurity Program, North Carolina Central University
Dr. Deanne Cranford-Wesley is the Director of Cybersecurity Programs at North Carolina Central University (NCCU); she is also the Point of Contact for the Center of Academic Excellence in Cyber Defense, and she oversees the innovative cybersecurity lab at NCCU. Dr. Cranford- Wesley... Read More →
avatar for Prof. Phil Legg

Prof. Phil Legg

Professor of Cyber Security, University of the West of England
Prof. Phil Legg is a Full Professor of Cyber Security at the University of the West of England (UWE Bristol), UK, in recognition of “Advancing Teaching and Learning” (Primary domain) and for “Research with Impact” (Secondary domain). He is Co-Director of the UWEcyber Acad... Read More →
avatar for John Madelin

John Madelin

Co-Director CSE Connect, CSE Connect
John Madelin is a founding member and innovator of PKI technology in Europe, Board Advisory member of RSA security conferences and growth driver of their business in EMEA.   He designed, built and ran large-scale security services for BT and Verizon’s major clients, achieving top... Read More →
Tuesday June 24, 2025 12:00pm - 1:00pm CDT
BLDG M Moraine Rooms

1:15pm CDT

Collaborative Approaches to Securing Healthcare Systems: Integrating Cybersecurity into Nursing and Business Curricula
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
This session highlights the collaborative potential between nursing and business programs to address cybersecurity vulnerabilities in healthcare systems. Recent breaches, such as the 2023 ransomware attack on Prospect Medical Holdings and the PharMerica data compromise affecting millions, underscore the importance of interdisciplinary approaches. Participants will explore how nursing programs can integrate cybersecurity principles into patient care training, while business programs focus on risk management, regulatory compliance, and financial implications of breaches. By working together, nursing and business faculty can develop curricula that prepare students to safeguard medical devices, protect patient data, and navigate the financial and operational impacts of cyber threats. The session will feature case studies, joint curriculum strategies, and real-life examples to demonstrate how these disciplines can collaboratively enhance healthcare cybersecurity by ensuring that graduates are ready for cybersecurity challenges.
Speakers
avatar for Tatyana Pashnyak

Tatyana Pashnyak

Lecturer of Business, Abraham Baldwin Agricultural College
Tatyana Pashnyak is an educator with over 26 years of experience spanning middle school, high school, community college, four-year college, and university levels. She earned a BS in Middle Grades Education and M.Ed. in Business Education degrees from University of West Georgia and... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-201

1:15pm CDT

Mitigating Voice Phishing Attacks: Best Practices in the AI Age
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
With high-profile incidents increasing and the ongoing shift toward more sophisticated socially engineered, AI powered voice attacks, this topic is timely and essential for enterprise leaders looking to close a critical security gap. Voice communications are rapidly becoming one of the fastest-growing cybersecurity threat vectors with 1 in 5 successful breaches attributed to voice phishing. Yet many organizations remain unprepared.

This session explores the evolution of voice as a significant threat vector, highlighting why it continues to be the most under protected communication channel. We'll analyze real-world examples, including socially engineered voice spear phishing attacks like those deployed by Scattered Spider and ALPHV against MGM, to illustrate the urgency of addressing this gap and the emerging role deep fake voice plays in initial access.

The discussion will cover the latest mitigations, from joint FBI/CISA advisories and the MITRE framework including education and voice traffic firewall controls designed to prevent attacks before they happen. Attendees will gain actionable insights into implementing foundational best practices for voice cybersecurity across four critical business units: Cybersecurity, Information Technology, risk management, and the Contact Center. The session will provide guidance on conducting a voice traffic assessment to evaluate organizational risk and enhance protection strategies.
Speakers
avatar for Rich Quattrocchi

Rich Quattrocchi

Vice President of Digital Transformation, Mutare
As Mutare’s Vice President of Digital Transformation, Rich serves as the primary team liaison and product manager for the organization’s development, marketing and sales efforts surrounding its key product offerings. His love for start-up culture, extensive communication skills... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-205

1:15pm CDT

Securing Legacy Systems through Virtualization
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
There are many technical, financial, and operational advantages to Virtualizing Old Hardware and Operating Systems. These include security, backup and recovery, stability and ease of use. In this demonstration, the presenter will discuss legacy systems and their prevalence in the energy and utilities sector, as well as the manufacturing and transportation industries. Virtualizing these devices will help organizations and companies avoid risk, security incidents, dependency on legacy hardware, and help speed up recovery time. The presenter will demonstrate various legacy systems and programs running in a virtual environment. 
Speakers
avatar for Jesse Varsalone

Jesse Varsalone

Collegiate Associate Professor, Cybersecurity Technology, University of Maryland Global Campus (UMGC)
Jesse holds several certifications in the IT field, including A+, Arduino, CASP+, CEH, CISSP, Cloud+, CTT+, CYSA+, iNet+, Linux+, Net+, Pentest+, Security+, Server+ . He passed his first certification exam in 2000 and his last one in 2023. Jesse has spoken at several conferences including... Read More →
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-210

1:15pm CDT

Insights and Strategies for Cybersecurity Education Programs to Fortify Critical Sectors
Tuesday June 24, 2025 1:15pm - 2:00pm CDT
This presentation will provide an exploration of interdisciplinary approaches to cybersecurity, focusing on two critical sectors: Water Treatment Plants (primary) and Agriculture (secondary). Drawing on insights from the Cybersecurity Innovation Center (CIC) at West Virginia State University, this session will share practical applications, case studies, and lessons learned to help faculty, college administrators, and industry leaders integrate core cybersecurity concepts into their disciplines. Attendees will gain actionable strategies for teaching, research engagement, and developing grant opportunities to enhance interdisciplinary cybersecurity education.  

  1. Introduction to Critical Infrastructure Cybersecurity
  2.  Safeguarding Water Treatment Plants: Practical Insights and Emerging Threats
    1. Teaching PLC/SCADA Security with Portable Learning Kits
    2. Emerging Threats:
  3.  Addressing Cybersecurity in Agriculture: Opportunities and Challenges
  4. Engaging Research Teams and Faculty for Collaborative Success
    1. CIC’s strategy for fostering a high-performing research team
    2. Guidance for faculty
  5.  Takeaways and Future Directions 
Speakers
avatar for Dr. Ali Alsinayyid

Dr. Ali Alsinayyid

Director of Cybersecurity Innovation Center, West Virginia State University
Dr. Ali Al-Sinayyid, Ph.D., is an Assistant Professor and Director of the Cybersecurity Innovation Center at West Virginia State University. With over 17 years of experience in academia and industry, he has secured significant funding, including a $1 million Google grant, and developed... Read More →
avatar for Naveed Zaman

Naveed Zaman

Dean, College of Natural Sciences and Mathematics, West Virginia State University
Dr. Naveed Zaman is a Professor of Mathematics and Dean of the College of Natural Sciences and Mathematics at West Virginia State University (WVSU). He has extensive experience in higher education administration, academic program development, and strategic planning. He has spearheaded... Read More →

Tuesday June 24, 2025 1:15pm - 2:00pm CDT
BLDG M-203

2:15pm CDT

Getting Students Hands-On with Top Vulnerabilities in Critical Infrastructure
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
Learn about the CISA Threat Sandbox Challenges, a collection of hands-on red and blue team experiences based on entries from the CISA Known Exploited Vulnerabilities (KEV) Catalog that provide educators and their students the opportunity to learn the tools, techniques, and procedures (TTPs) needed to show competency in exploiting and mitigating KEVs within critical infrastructure themed digital environments. This collection of CISA-funded and co-designed hands-on challenges is available for free for US-based educators and their students via the XP Cyber Range.
Speakers
avatar for James Ashley

James Ashley

Director of Research & Development, XP Cyber @ CSUSB
Mr. Ashley is the Director of R&D at the CSUSB Center for Cyber & AI, and oversees the development of multiple national cybersecurity projects.
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-203

2:15pm CDT

Exploring Cybersecurity’s Role in Managing AI Risk to Community Ecosystems
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
In the spirit of economic development, cities often compete for the attention of large corporate brands, especially “Big Tech”, to settle in their communities creating attractive incentives like tax-breaks and favorable construction terms. Residents in the affected communities get excited about the prospect of new jobs or career growth. With the recent explosion of the everyday use of Artificial Intelligence (AI) changing work and life as we know it in society, cities want to be known as technology leaders or at least early adopters. And in today’s evolving world, one of Cybersecurity’s main functions is to not only enable the business but also just as importantly managing risk for the business.  As professionals, we have an obligation to ensure that solutions our organizations develop, especially those involving AI, promote benefits to not only the organization but also society and do not cause harm to the environment. 
In this session, we will explore Cybersecurity’s role to understand potential and realized risks of accommodations to secure and implement “Big Tech” initiatives in communities with respect to energy, water, and waste systems. Attendees will be exposed to the use of risk management frameworks to identify and mitigate these risks and drive sustainable outcomes as well as the situational applicability of ethics in the cybersecurity profession. Case studies and statistics   will be citied from various real-world communities. While some case discussed will be resolved with implemented remediations, others will be on-going with the opportunity to explore potential solutions.
Speakers
avatar for Joy Toney

Joy Toney

Senior Consultant, AIM For Change LLC
Joy Toney serves as a Senior Program Consultant for AIM for Change, LLC. Joy’s career successes are mapped over 20+ years professional experience, both people leader and individual contributor roles, in non-profit, consumer services, government contracting, and transportation. Joy... Read More →
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-205

2:15pm CDT

Space Cybersecurity: Implications for Critical Infrastructure
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
Space-based services underpin all critical infrastructure and yet space itself is not designated as critical infrastructure. This niche and increasingly important area of cybersecurity has a dearth of SME expertise to support its development and protection. Additionally, there are few academic institutions offering the content needed to build the workforce prepared to address the cybersecurity challenges of the space domain. Of those that exist, most target PhD level candidates working on dissertations related to the topic. While it is encouraging that advanced academics are contributing to the body of knowledge in space cybersecurity, providing content at the undergraduate level provides a richer opportunity for workforce development. This presentation will provide an overview of space cybersecurity, its challenges, its relationship to critical infrastructure, and opportunities for incorporating it into cybersecurity academic content for future workforce development.

Approved for public release; distribution is unlimited. Public Affairs release approval # AFRL20250907
Speakers
avatar for Sherry Neher

Sherry Neher

Information Technology Specialist, Airforce Research Laboratory, Space Vehicles Directorate
Sherry Neher is a member of the space cyber resiliency team at Airforce Reasearch Laboratory. Her research is at the intersection of cybersecurity and autonomy in space vehicle development. 
Tuesday June 24, 2025 2:15pm - 3:00pm CDT
BLDG M-210

2:15pm CDT

Hands-On Embedded Security with the MITRE eCTF
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
Explore the field of embedded systems security with an introduction to MITRE’s Embedded Capture the Flag competition, an annual competition for students in high school through grad school.

In part one, participants will be introduced to the structure of the competition and will gain experience working with microcontrollers by building, flashing, and interacting with the reference design of the 2025 eCTF. They will then explore some basic techniques for attacking the unsecured design. No background experience is required for part one.

In part two, participants will dive deeper into embedded security by attacking real designs submitted by students and exploring the various techniques embedded security practitioners use to defeat secure designs. Understanding of fundamental cybersecurity topics is helpful for part two.

The workshop will be held in a computer lab. If you prefer to bring your own computer (Windows/Mac/Linux), it must have internet access and Python 3.12+ pre-installed. Docker Desktop is also highly recommended, but the workshop can be completed without it.

The workshop can be found at https://github.com/janisbent/ectf-workshop
Speakers
avatar for Ben Janis

Ben Janis

Lead Embedded Security Engineer, MITRE
Ben Janis is a Lead Embedded Security Engineer at MITRE, where he focuses on embedded security research and development. His expertise lies in microarchitectural attacks and developing compiler-assisted countermeasure insertion and automated vulnerability detection tools. In addition... Read More →
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
BLDG T-101/102

2:15pm CDT

Integrating Cybersecurity into Multiple Disciplines using AI and Workplace Scenarios
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
This interactive session equips instructors with tools and frameworks to integrate cybersecurity into various disciplines, emphasizing its importance in biotechnology, advanced manufacturing, and healthcare. By leveraging AI and cross-disciplinary approaches, educators can create engaging scenarios that enhance students' understanding and application of cybersecurity principles. The presentation covers the development of realistic workplace scenarios, follow-up questions, and strategies for seamless curriculum integration, aiming to improve cyber awareness and skills in future professionals. Objectives include providing an AI prompt framework, designing effective follow-up questions, and presenting metrics to assess scenario effectiveness.
Speakers
avatar for Tony Brown

Tony Brown

Department Chair, Forsyth Technical Community College
Tony Brown is the Department Chair for the Davis iTEC Cybersecurity Center. His responsibilities are over the following programs: Cyber Security, Systems Security, Network Management (Program Coordinator), Technical Support, FTCC’s K-12 Initiative, any and all CAE initiatives, and... Read More →
avatar for Victoria Ferrell

Victoria Ferrell

Cybersecurity Program Coordinator, Forsyth Technical Community College
Victoria Ferrell is the Cybersecurity and Systems Security Program Coordinator at Forsyth Technical Community College. With a robust background in education and IT, Victoria focuses on coordinating and instructing hands-on cybersecurity and systems security programs. These responsibilities... Read More →
Tuesday June 24, 2025 2:15pm - 4:00pm CDT
BLDG T-953

3:15pm CDT

Developing Employer-Led Artificial Intelligence Programs in Multiple Scenarios
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
This session will be a panel discussion featuring educators and employers who have participated in developing Artificial Intelligence programs at two major colleges and through two major NSF projects. The focus will be on how faculty and business subject matter experts interacted to develop these programs. Featured will be Applied Artificial Intelligence Programs at Miami Dade College, and Harper College as well as the work being done through two NSF projects: The National Applied AI Consortium and the National Information Technology Innovation Center. All work employed the Business and Industry Leadership Team (BILT) approach to determine program content. The work to be discussed is at different stages of development, and results to date will be presented.  Both successes and challenges each college encountered during program development will be addressed with plenty of time for audience questions.
Speakers
avatar for Ann Beheler

Ann Beheler

Director of Innovation, Center for Occupational Research
 Over many years, Dr. Ann Beheler has been dedicated to helping educators build deeper relationships with employers to then better align undergraduate education to employers’  future employment needs using the Business & Industry Leadership Team Model (BILT) she developed... Read More →
avatar for Aaron Burciaga

Aaron Burciaga

Founder and CEO, Zetai Global
Aaron Burciaga leads ZETAI as CEO, and as a Service-disabled veteran he is renowned for fusing military precision with cutting-edge AI expertise. With 20+ years spearheading transformative AI initiatives for Fortune 500 companies and federal agencies, he delivers solutions that bridge... Read More →
avatar for Bich-Thuy Le

Bich-Thuy Le

President/Founder, LeLumin
Bich-Thuy Le is a seasoned executive with over 25 years of experience leading highly effective teams in digital transformation, governance, and AI across Fortune 500 companies. An award-winning leader with two U.S. AI patents and more pending, she has pioneered innovative solutions... Read More →
avatar for Lawrence (Larry) McWherter

Lawrence (Larry) McWherter

Associate Professor - Cybersecurity, Principal Investigator - National Information Technology Innovation Center (NITIC), Columbus State Community College (OH)
Larry McWherter provides leadership to the NITIC team as the PI, overseeing the strategic direction of all initiatives, and serving as the deliverable lead for the IT Innovation Network’s Community of Practice. Larry is an associate professor of cybersecurity at Columbus State... Read More →
avatar for Dr. Michele Smith

Dr. Michele Smith

VP for Workforce Solutions, Harper College
Dr. Michelé E. Smith has worked for William Rainey Harper College since 2002 and is currently serving as Vice President of Workforce Solutions. Prior to serving in her current role, Michelé held positions at Harper College as the Associate Provost for Curriculum, Special Assistant... Read More →
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M Moraine Rooms

3:15pm CDT

Datathons: Advancing Experiential Learning at the Industry-Academia Nexus
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
Experiential learning enhances education, particularly in competency-based programs at community and technical colleges. Industry collaboration is essential, especially for National Centers of Academic Excellence, as their competencies align with workforce roles.

The electric and power industries play a crucial role in national challenges like risk management, climate resilience, and cyber threats to industrial systems such as SCADA. These challenges go beyond standard cybersecurity curricula, as SCADA training is costly and complex.

This work proposes an experiential learning initiative integrating industry insights through a Datathon, simulating real-world cybersecurity issues in the electric sector. The Datathon provides hands-on experience, helping students understand cybersecurity threats impacting power systems. Endorsed by industry partners, it ensures alignment with workforce needs.
Speakers
avatar for Christian Servin

Christian Servin

Professor/Education Research Developer, El Paso Community College
Christian Servin, Ph.D., is a Professor at EPCC and POC for NCAE-CD. An ACM and IEEE member, he advances computing education and cybersecurity, contributing to curricula and creating experiential learning practices.
avatar for Nadia Karichev

Nadia Karichev

Assistant Professor, El Paso Community College
Nadia Karichev is an assistant professor specializing in Information Technology and Cybersecurity, with expertise in Competency-Based Education and experiential learning practices.
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-203

3:15pm CDT

Creating and Conducting Critical Infrastructure Sector Risk Assessments using the CISA CSET Tool Integrating Artificial Intelligence (AI)
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
This presentation will cover the process of using AI in developing a CSET Tool Risk Assessment Assignment. The presentation will cover CSET/AI scenarios that will use an Oil & Gas Pipeline Company IT/OT Risk Assessment example. The challenge in performing a CSET tool Risk Assessment in an academic environment is having the business and IT subject matter experts input to answer the questions generated by the CSET tool. This presentation will demonstrate how AI was used to simulate the SME’s in a realistic manner.

Speakers
avatar for Stephen Miller

Stephen Miller

Consultant, NCyTE
Mr. Miller is a Professor Emeritus ENMU-Ruidoso (non-Native American Serving Institution), CAE Peer Review National Center (CNC) Director and NSF ATE National Cybersecurity Training and Education Center (NCyTE) Leadership Team Member contracted through Whatcom Community College.He... Read More →
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-210

3:15pm CDT

Transforming Retail Operations with AI, Robotics, and Automation
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
Major retailers – including Walmart, Costco, Amazon, and Target – are leveraging cutting-edge technologies such as artificial intelligence (AI), robotics, wireless IoT, and automation to revolutionize their operations. Between 2023 and 2025, these companies have launched AI-driven logistics systems, cashier-less stores, predictive analytics platforms, robotic inventory solutions, and smart supply chains to boost efficiency and enhance customer experience. At the same time, they face challenges around cybersecurity, workforce impacts, and the high costs of implementation. This report examines how these technologies are being deployed in retail, highlighting recent case studies, benefits (e.g. faster deliveries, cost savings, improved shopping convenience), and challenges (e.g. cyber risks, job displacement, upfront investment).
Speakers
avatar for Michael Qaissaunee

Michael Qaissaunee

Professor/Chair, Engineering and Technology, Brookdale Community College
Professor Mike Qaissaunee chairs Engineering & Technology at Brookdale, directs its Cyber Center, secures NSF grants, and champions cybersecurity education.
Tuesday June 24, 2025 3:15pm - 4:00pm CDT
BLDG M-205

4:15pm CDT

Student Spotlight: Securing the Vehicle Firmware Supply Chain
Tuesday June 24, 2025 4:15pm - 4:35pm CDT
The automotive industry’s systems and over-the-air (OTA) updates have vulnerabilities in its software supply chain (SSC). Although frameworks like Uptane have improved OTA security, gaps remain in ensuring software integrity and provenance. In this paper, we examine challenges securing the automotive SSC and introduce a framework, GUIXCHAIN, that integrates version control, reproducible builds, blockchain technology, and software bills of materials (SBoMs) for transparency, auditability, and resilience. Reproducible builds guarantee identical resulting binaries when compiling the same source code in different environments, as any deviation in the final output indicates a potential compromise in the build process, such as malware injection.

Our preliminary study shows Guixchain’s use of reproducible builds ensures consistent and integrity-secured software across various build environments. The blockchain provides forensic capabilities, offering a history of the what, who and where of discrepancies within the SSC process. SBoMs provide an inventory of the software components used. Our preliminary study demonstrates that Guixchain effectively mitigates risks such as ransomware, unauthorized modifications, and build server compromises, reinforcing the systems integrity and resilience throughout the software life cycle.
Speakers
avatar for Iwinosa Aideyan

Iwinosa Aideyan

Graduate student, Clemson University
Iwinosa Aideyan is a third-year Ph.D. student in Computer Engineering at the Virtual Prototyping of Autonomy-Enabled Ground Systems (VIPR-GS) Center in conjunction with the US Army at Clemson University, with a research focus on automotive cybersecurity.  Her work aims to enhance... Read More →
Tuesday June 24, 2025 4:15pm - 4:35pm CDT
BLDG M Moraine Rooms

4:35pm CDT

Cybersecurity Competitions Across Disciplines
Tuesday June 24, 2025 4:35pm - 4:45pm CDT
Speakers
avatar for Dr. Jake Mihevc

Dr. Jake Mihevc

Asst. VP, Academic Affairs, Mohawk Valley Community College
Jake serves as Dean of Science, Technology, Engineering and Math at Mohawk Valley Community College. He launched the college’s Cybersecurity AS program in 2014 and helped it achieve the CAE-CD designation in 2016. Jake serves as PI of the NCAE Cyber Games project, leads CAE strategic... Read More →
Tuesday June 24, 2025 4:35pm - 4:45pm CDT
BLDG M Moraine Rooms

4:45pm CDT

Day 1 Recap
Tuesday June 24, 2025 4:45pm - 5:00pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 4:45pm - 5:00pm CDT
BLDG M Moraine Rooms

5:00pm CDT

Networking Reception
Tuesday June 24, 2025 5:00pm - 5:30pm CDT
Enjoy networking and light refreshments in the foyer while we set up for this evening’s dinner program.
Tuesday June 24, 2025 5:00pm - 5:30pm CDT
BLDG M Moraine Foyer

5:30pm CDT

Networking Dinner
Tuesday June 24, 2025 5:30pm - 6:00pm CDT
Pick up your dinner in the foyer and bring it into the Moraine Room to continue networking and enjoy the plenary presentation.
Tuesday June 24, 2025 5:30pm - 6:00pm CDT
BLDG M Moraine Foyer

6:00pm CDT

Evening Plenary: Toward an Assured & Resilient Navigation in Advanced Transportation Systems
Tuesday June 24, 2025 6:00pm - 6:45pm CDT
The role of positioning and navigation systems as a critical infrastructure can't be ignored in our today's applications. However, these critical systems face key challenges facing these systems, such as signal interference, spoofing, cybersecurity threats, and dependency on space-based infrastructure, which can compromise their reliability and effectiveness. Therefore, there is a need for innovative solutions to these challenges, such as integrating terrestrial and space-based systems for improved resilience, developing robust backup technologies, and deploying advanced threat detection mechanisms. Collaboration between governments, private sectors, and academia will be emphasized as a vital component of creating a resilient ecosystem for positioning and navigation systems. Recently, the US Department of Transportation has funded a consortium to establish the Center for Assured & Resilient Navigation in Advanced Transportation Systems (CARNATIONS). CARNATIONS focuses on proposing innovative research and workforce development solutions to deal with positioning and navigation challenges.
Speakers
avatar for Dr. Moussa Ayyash

Dr. Moussa Ayyash

Director at Chicago State University & co-PI of the Center for Assured & Resilient Navigation in Advanced Transportation Systems (CARNATIONS), Chicago State University
Dr. Moussa Ayyash is a Professor in the Department of Information Studies at Chicago State University and Director of the Center of Information and National Security Education and Research (CINSER). He holds B.S., M.S., and Ph.D. degrees in Electrical and Computer Engineering. His... Read More →
Tuesday June 24, 2025 6:00pm - 6:45pm CDT
BLDG M Moraine Rooms

6:45pm CDT

Day 1 Closing Remarks
Tuesday June 24, 2025 6:45pm - 7:00pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Tuesday June 24, 2025 6:45pm - 7:00pm CDT
BLDG M Moraine Rooms
 
Wednesday, June 25
 

7:14am CDT

Registration Open & Badge Pick-Up
Wednesday June 25, 2025 7:14am - 11:00am CDT
Wednesday June 25, 2025 7:14am - 11:00am CDT
BLDG M Lobby

7:15am CDT

Networking Breakfast
Wednesday June 25, 2025 7:15am - 7:45am CDT
Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
Wednesday June 25, 2025 7:15am - 7:45am CDT
BLDG M Moraine Foyer

7:45am CDT

Morning Plenary: Mission First, People Always
Wednesday June 25, 2025 7:45am - 8:30am CDT
Through public-private partnerships and federally funded R&D centers, MITRE works across government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation.
 
This talk will introduce MITRE and how you can incorporate some of its free cybersecurity frameworks into your work, featuring CVE/CWE, ATT&CK, D3FEND, ATLAS, and EMB3D.

Speakers
avatar for Ben Janis

Ben Janis

Lead Embedded Security Engineer, MITRE
Ben Janis is a Lead Embedded Security Engineer at MITRE, where he focuses on embedded security research and development. His expertise lies in microarchitectural attacks and developing compiler-assisted countermeasure insertion and automated vulnerability detection tools. In addition... Read More →
Wednesday June 25, 2025 7:45am - 8:30am CDT
BLDG M Moraine Rooms

8:45am CDT

Building the Next Generation: Strengthening Multidisciplinary Cybersecurity Education Through the National Community College Cybersecurity Fellowship Program
Wednesday June 25, 2025 8:45am - 9:30am CDT
The National Community College Cybersecurity Fellowship Program is bridging the gap in cybersecurity education by developing a pipeline of trained faculty. This session will showcase a proven model for recruiting and training cybersecurity students, industry professionals, and military personnel who want to give back by teaching in the classroom. Attendees will learn best practices in mentoring, professional development, and hands-on teaching assignments. This session will also provide an opportunity to hear from and connect with current fellows to explore how they can support your classes. Community college faculty across disciplines will learn how they can mentor and guide students in developing cybersecurity lessons tailored to their fields, helping to expand cybersecurity awareness across diverse sectors.
Speakers
avatar for Kristine Christensen

Kristine Christensen

Professor, CIS / Director, Faculty Development / Program Director, National Community College Cybersecurity Fellowship, Moraine Valley Community College / NCyTE
Dr. Kristine Christensen is a professor of Computer Information Systems, teaching and developing curriculum in areas such as web development, user interface design, programming, Internet of Things (IoT), robotics, and engineering technology. She teaches across multiple disciplines... Read More →
Wednesday June 25, 2025 8:45am - 9:30am CDT
BLDG T Fogelson Theater

8:45am CDT

5G Networks Architecture, Complexities and Vulnerabilities: Simulation and Visualization
Wednesday June 25, 2025 8:45am - 9:30am CDT
5G networks will support billions of IoT devices, enabling Industry 4.0, smart infrastructure, connected cars, and public safety. IoT introduces new security risks due to device scale and attack surfaces. A strong IoT security approach requires zero trust and defense-in-depth strategies. Some of the Key risks: supply chain compromises, weak authentication, DDoS, malware, botnets, and data breaches.

This study will showcase access to 5G network, discovery of KPI of a 5 network, the simulation of 3 different attacks on 5G networks including:

1- Jamming 5G network: A 5G jamming attack is a type of denial-of-service (DoS) attack that disrupts wireless communication by overwhelming a 5G network with interference, preventing devices from transmitting or receiving signals effectively
2- Bidding 5G network: A 5G bidding attack is a type of downgrade attack where an attacker forces a device to connect to a lower-generation network (e.g., 4G, 3G) instead of the more secure 5G network. This allows the attacker to exploit weaker security protocols and intercept or manipulate communications.
3- A man in the middle attack: A Man-in-the-Middle (MitM) attack in a 5G network occurs when an attacker intercepts, alters, or relays communication between a user and the network without their knowledge. Despite 5G’s enhanced security, sophisticated MitM attacks can still exploit vulnerabilities in network authentication, encryption, and signaling protocols.
Each one of the attacks will be showcased, simulated, and visualized.
Speakers
avatar for George Meghabghab

George Meghabghab

Professor/Director of Cyber Defense / Networking / Programming, Roane State CC
Computer Science/Computer Information Technology Educator with over 30 years of teaching and training in IT, Cyber defense, information assurance, and digital forensics.  Passion for teaching and training students to strengthen the IT and cybersecurity disciplines by developing dynamic... Read More →
Wednesday June 25, 2025 8:45am - 9:30am CDT
BLDG T-403

8:45am CDT

Leveraging AI To Implement Cybersecurity Operations
Wednesday June 25, 2025 8:45am - 10:25am CDT
As cybersecurity threats grow in complexity and volume, traditional security operations struggle to keep pace. This presentation explores how artificial intelligence technologies are transforming cybersecurity operations, enabling organizations to detect, analyze, and respond to threats with unprecedented speed and accuracy. 

Key TopicsEvolution of Security Operations Centers (SOCs)
  • The transition from manual monitoring to AI-augmented operations
  • Challenges faced by traditional SOCs: alert fatigue, skill gaps, and resource constraints
  • The emergence of AI-native security platforms and their integration into existing infrastructure
AI Applications in Cybersecurity Operations
  • Threat Detection and Analysis
    • Machine learning algorithms that identify anomalous network behavior and potential threats
    • Natural language processing for analyzing threat intelligence and security reports
    • Computer vision techniques for identifying suspicious visual patterns in systems
  • Incident Response Automation
    • AI-driven triage and priority of security alerts
    • Automated containment and remediation capabilities
    • Decision support systems that guide human analysts through complex incidents
  • Compliance and Governance 
    • Risk analysis and management
    • Implementing policy and procedures
    • Audit planning and implementation
Ethical and Practical Considerations
  • Managing false positives and algorithmic bias in security contexts
  • Balancing automation with human oversight and decision-making
  • Privacy considerations when implementing AI-powered monitoring
  • Regulatory compliance challenges in AI-augmented security operations
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
Wednesday June 25, 2025 8:45am - 10:25am CDT
BLDG T-953

8:45am CDT

From Vulnerability to Victory: Safeguarding Manufacturing through IT/OT Convergence!
Wednesday June 25, 2025 8:45am - 10:25am CDT
The convergence of IT and OT systems in critical manufacturing has significantly 
increased potential cyber-attack surfaces and associated cybersecurity risks.  
Ever complex and enduring cyber-attacks threaten to cripple the nation’s ability to 
maintain our economic viability and national security.  

Modern Manufacturing Technologies necessarily focus on lean production, quality maintenance, and accelerated production. This operationally focused mindset easily creates a widening attack-surface vortex when not intimately coupled with fully integrated cyber hygiene and the use of the Internet of Things (IoT) sensors, software, and network connectivity that incorporates a security focus on existing and realistic threats. This marriage of operations and security must be cultivated and fully incorporated 
to minimize and mitigate critical infrastructure attacks.

Our session will focus on the complex interplay between manufacturing 
advancements, IT/OT convergence, and the subsequent cybersecurity challenges
faced by business and industry. Presenters will expand on IT, Cybersecurity, and Modern Manufacturing points of view. We will further develop IT and OT perspectives and engage the audience by illustrating one or two past cyber-attack events. We will then provide potential steps for developing a combined operations/cybersecurity mindset to engage IT and OT in a symbiotic balance.  The goal is to identify, meet, and exceed requirements for current and future operational and cybersecurity challenges.
Speakers
avatar for Kyle Jones

Kyle Jones

Assistant Dean of Technology, Grants, and External Partnerships & Professor, Sinclair Community College (OH)
Kyle Jones, a professor and the Information Technology Chair at Sinclair, serves as the lead of NITIC’s AI, Operational Technology, and externship initiatives. He is also a CAE2Y Principal Investigator, the Principal Investigator for the Community College Scholar for Service Program... Read More →
avatar for Scot McLemore

Scot McLemore

Executive in Residence (Advanced Manufacturing), Columbus State Community College (OH)
Scot McLemore, Executive in Residence for Columbus State Community College, utilizes his immediate past experience as an advanced manufacturing workforce expert and higher education employer partner at American Honda Motor Company to cultivate relevant pathways of study to support... Read More →
avatar for Lawrence (Larry) McWherter

Lawrence (Larry) McWherter

Associate Professor - Cybersecurity, Principal Investigator - National Information Technology Innovation Center (NITIC), Columbus State Community College (OH)
Larry McWherter provides leadership to the NITIC team as the PI, overseeing the strategic direction of all initiatives, and serving as the deliverable lead for the IT Innovation Network’s Community of Practice. Larry is an associate professor of cybersecurity at Columbus State... Read More →
Wednesday June 25, 2025 8:45am - 10:25am CDT
BLDG T-101/102

9:40am CDT

The California Career Education Pipeline and Pathway Project (C3EPE3)
Wednesday June 25, 2025 9:40am - 10:25am CDT
The California Cybersecurity Career Education Pipeline and Pathway Program (C3EP3) is a 10-year (2023-2033) statewide initiative designed to address California's cybersecurity skills gap and produce 75,000 skilled cybersecurity professionals.C3EP3, developed by the California Cybersecurity Task Force (CCTF) in collaboration with public, private, and educational stakeholders, aims to align, link, and enhance California's cybersecurity ecosystem. This includes education, research, workforce development, training, and critical infrastructure protection. The program seeks to guide and support California decision-makers and policymakers in: Innovating cybersecurity strategies and policies, enhancing statewide cybersecurity capabilities, improving cybersecurity workforce development and talent acquisition.C3EP3 is a multidisciplinary and interdisciplinary initiative that establishes a comprehensive and replicable framework. This framework is designed to serve a wide range of stakeholders, including Public and private sector organizations, K-12 and higher education institutions (faculty, students, and staff), and Community-based organizations. C3EP3 main focuses is on developing and promoting cutting-edge cybersecurity education and workforce development pathways.   Enhancing curriculum across all levels of the academic and career ladder (from kindergarten through doctoral programs).C3EP3 is expected to strengthen California's cybersecurity workforce, improve the state's overall cybersecurity posture, and support economic growth by providing a pipeline of qualified cybersecurity professionals.
Speakers
avatar for Dr. Keith Clement

Dr. Keith Clement

Professor of Criminology at California State University, Fresno, Fresno State University
Dr. Keith Clement is a Professor of Criminology at California State University, Fresno. Dr. Clement serves as California Cybersecurity Task Force (CCTF) Workforce Development and Education Subcommittee Chair. The CCTF is a partnership between the California Governor's Office of Emergency... Read More →
avatar for Mario Perez

Mario Perez

CSIS Professor/Network Engineer, Los Angeles Valley College
Mario Perez is a seasoned cybersecurity professional with a passion of empowering individuals and organizations to safeguard their digital assets. With extensive experience in network engineering, ethical hacking, and cloud security, Mario has a deep understanding of the evolving... Read More →
Wednesday June 25, 2025 9:40am - 10:25am CDT
BLDG T-701

9:40am CDT

The Future of Delivery Services: Integrating AI and Automation
Wednesday June 25, 2025 9:40am - 10:25am CDT
Delivery services are changing the way we do business rapidly, and AI and automation are at the heart of this transformation. In this session, we’ll explore how technologies like autonomous drones, self-driving vehicles, AI-powered logistics, and smart warehouses are making deliveries faster, more efficient, and customer-friendly. Through real-world examples, we’ll look at both the opportunities and challenges that come with these advancements. We'll also dive into trends shaping the future, from last-mile delivery innovations to sustainability efforts. Expect an interactive experience with discussions and activities to keep things engaging. Whether you're in education, logistics, supply chain management, or just curious about what’s next, this session will help you understand how to make the most of AI and automation in modern delivery services.
Speakers
avatar for April H. Best

April H. Best

Information Technology Program Chair/Instructor, Lenoir Community College
April H. Best is a dedicated IT educator, mentor, and leader with over a decade of experience in higher education. As the Information Technology Program Chair and Instructor at Lenoir Community College, she is committed to equipping students with the technical skills and real-world... Read More →
avatar for Deanne Cranford-Wesley

Deanne Cranford-Wesley

Director Cybersecurity Program, North Carolina Central University
Dr. Deanne Cranford-Wesley is the Director of Cybersecurity Programs at North Carolina Central University (NCCU); she is also the Point of Contact for the Center of Academic Excellence in Cyber Defense, and she oversees the innovative cybersecurity lab at NCCU. Dr. Cranford- Wesley... Read More →
Wednesday June 25, 2025 9:40am - 10:25am CDT
BLDG T-404

9:40am CDT

Securing Every Sector: Foundational Cybersecurity for All Professions
Wednesday June 25, 2025 9:40am - 10:25am CDT
Curious about cybersecurity but not sure where to start? This session offers a beginner-friendly introduction to cybersecurity fundamentals and their applications across disciplines like healthcare, automotive, criminal justice, and the other Cybersecurity & Infrastructure Security Agency (CISA) defined 16 critical infrastructure sectors.  Participants will explore real-world use cases through guided discussions and discover discipline-specific cybersecurity resources. Whether you’re an educator, industry professional, or simply cyber-curious, this session will provide the foundational knowledge to integrate cybersecurity concepts into your discipline or field; no hoodie required! 
Speakers
avatar for Kristine Christensen

Kristine Christensen

Professor, CIS / Director, Faculty Development / Program Director, National Community College Cybersecurity Fellowship, Moraine Valley Community College / NCyTE
Dr. Kristine Christensen is a professor of Computer Information Systems, teaching and developing curriculum in areas such as web development, user interface design, programming, Internet of Things (IoT), robotics, and engineering technology. She teaches across multiple disciplines... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Wednesday June 25, 2025 9:40am - 10:25am CDT
BLDG T Fogelson Theater

10:25am CDT

Networking Break
Wednesday June 25, 2025 10:25am - 10:50am CDT
Wednesday June 25, 2025 10:25am - 10:50am CDT
Building T Main Lobby

10:50am CDT

Student Spotlight: From SWORD to Pen: Sharpening Cybersecurity Skills through Space Research
Wednesday June 25, 2025 10:50am - 11:10am CDT
As we advance toward the New Space Era, the space cybersecurity sector calls for deep, multidisciplinary research to stay ahead of evolving threats. To accomplish Space Cyber Resiliency, research must uncover the full scope of the attack surface and underlying technologies, enabling secure system design and architectural resilience. In doing so, practitioners strengthen essential cybersecurity skills—critical thinking, adaptive problem-solving, and geopolitical awareness—while learning to translate complexity into actionable solutions. Space research trains professionals to think strategically under uncertainty, refine threat modeling, and operate across domains. This talk explores how research at the edge of space not only supports national defense and commercial innovation, but also sharpens the mindset required for tomorrow’s cybersecurity leaders, transforming the sword of defense into the pen of research and innovation.
Speakers
avatar for Dwight Groves

Dwight Groves

Student, Fullerton College
Dwight Groves is a Cybersecurity major also pursuing a bachelor’s degree in Drones & Autonomous Systems at Fullerton College — the only program of its kind on the West Coast. As an alumnus of the Air Force Research Laboratory (AFRL) Scholars Program, he has contributed to space... Read More →
Wednesday June 25, 2025 10:50am - 11:10am CDT
BLDG T Fogelson Theater

11:15am CDT

CMMC Implementation & Audit Preparation
Wednesday June 25, 2025 11:15am - 12:00pm CDT
The DoD Cybersecurity Maturity Model Certification (CMMC) program represents a fundamental shift in how defense contractors must approach cybersecurity compliance. With this final rule, DoD establishes the program in order to verify contractors have implemented required security measures necessary to safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). This hands-on workshop provides participants with essential knowledge about CMMC requirements while demonstrating how artificial intelligence can revolutionize the documentation and compliance tracking process.
Participants will gain practical insights into the CMMC framework while learning how AI-powered tools can dramatically reduce the time and complexity involved in generating required documentation and maintaining ongoing compliance.
Speakers
avatar for Michael Qaissaunee

Michael Qaissaunee

Professor/Chair, Engineering and Technology, Brookdale Community College
Professor Mike Qaissaunee chairs Engineering & Technology at Brookdale, directs its Cyber Center, secures NSF grants, and champions cybersecurity education.
avatar for Jiri Jirik

Jiri Jirik

Director of the Education Pathway National Center (EPNC), Moraine Valley Community College
With over two decades of experience in cybersecurity spanning both industry and academia, Jiri currently serves as the Director of the Education Pathway National Center (EPNC) at Moraine Community College. In this role, he engages stakeholders across academia, industry, and the public... Read More →
Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-953

11:15am CDT

Creating and Conducting Critical Infrastructure Sector Risk Assessments using the CISA CSET Tool Integrating Artificial Intelligence (AI) (REPEAT SESSION)
Wednesday June 25, 2025 11:15am - 12:00pm CDT
This presentation will cover the process of using AI in developing a CSET Tool Risk Assessment Assignment. The presentation will cover CSET/AI scenarios that will use an Oil & Gas Pipeline Company IT/OT Risk Assessment example. The challenge in performing a CSET tool Risk Assessment in an academic environment is having the business and IT subject matter experts input to answer the questions generated by the CSET tool. This presentation will demonstrate how AI was used to simulate the SME’s in a realistic manner.

Speakers
avatar for Stephen Miller

Stephen Miller

Consultant, NCyTE
Mr. Miller is a Professor Emeritus ENMU-Ruidoso (non-Native American Serving Institution), CAE Peer Review National Center (CNC) Director and NSF ATE National Cybersecurity Training and Education Center (NCyTE) Leadership Team Member contracted through Whatcom Community College.He... Read More →
Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-701

11:15am CDT

Online Automotive Capture the Flag (CTF) Competition with the finals in Detroit, Michigan, USA
Wednesday June 25, 2025 11:15am - 12:00pm CDT
The Automotive Capture the Flag (CTF) is a cybersecurity competition designed for ethical hackers, automotive security researchers, and students to test their skills in securing modern vehicles against cyber threats. This event consists of online qualifying rounds leading up to an on-site finals event in Detroit, Michigan, USA—the heart of the automotive industry.

Teams or individuals participate in an online Jeopardy-style CTF, solving automotive cybersecurity challenges to earn points. Challenges may include CAN bus analysis, ECU reverse engineering, key fob hacking, infotainment system security, and automotive network penetration testing. The top teams advance to the on-site finals. On-Site Finals (Detroit, Michigan)

The top qualifying teams compete in a real-world automotive hacking challenge at a major venue in Detroit.
The final round is an attack-defense style CTF where teams secure and exploit vulnerabilities in real or simulated vehicle components. Participants work with real ECUs, automotive networks, and simulated vehicle environments to capture flags.

Detroit, known as the Motor City, is the hub of the global automotive industry, making it the perfect location for an automotive security showdown. The city hosts leading automotive manufacturers, suppliers, and cybersecurity research labs, ensuring an immersive and competitive event.
Speakers
avatar for Jesse Varsalone

Jesse Varsalone

Collegiate Associate Professor, Cybersecurity Technology, University of Maryland Global Campus (UMGC)
Jesse holds several certifications in the IT field, including A+, Arduino, CASP+, CEH, CISSP, Cloud+, CTT+, CYSA+, iNet+, Linux+, Net+, Pentest+, Security+, Server+ . He passed his first certification exam in 2000 and his last one in 2023. Jesse has spoken at several conferences including... Read More →
Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-404

11:15am CDT

Insights and Strategies for Cybersecurity Education Programs to Fortify Critical Sectors (REPEAT SESSION)
Wednesday June 25, 2025 11:15am - 12:00pm CDT
This presentation will provide an exploration of interdisciplinary approaches to cybersecurity, focusing on two critical sectors: Water Treatment Plants (primary) and Agriculture (secondary). Drawing on insights from the Cybersecurity Innovation Center (CIC) at West Virginia State University, this session will share practical applications, case studies, and lessons learned to help faculty, college administrators, and industry leaders integrate core cybersecurity concepts into their disciplines. Attendees will gain actionable strategies for teaching, research engagement, and developing grant opportunities to enhance interdisciplinary cybersecurity education.  

  1. Introduction to Critical Infrastructure Cybersecurity
  2.  Safeguarding Water Treatment Plants: Practical Insights and Emerging Threats
    1. Teaching PLC/SCADA Security with Portable Learning Kits
    2. Emerging Threats:
  3.  Addressing Cybersecurity in Agriculture: Opportunities and Challenges
  4. Engaging Research Teams and Faculty for Collaborative Success
    1. CIC’s strategy for fostering a high-performing research team
    2. Guidance for faculty
  5.  Takeaways and Future Directions 
Speakers
avatar for Dr. Ali Alsinayyid

Dr. Ali Alsinayyid

Director of Cybersecurity Innovation Center, West Virginia State University
Dr. Ali Al-Sinayyid, Ph.D., is an Assistant Professor and Director of the Cybersecurity Innovation Center at West Virginia State University. With over 17 years of experience in academia and industry, he has secured significant funding, including a $1 million Google grant, and developed... Read More →
avatar for Naveed Zaman

Naveed Zaman

Dean, College of Natural Sciences and Mathematics, West Virginia State University
Dr. Naveed Zaman is a Professor of Mathematics and Dean of the College of Natural Sciences and Mathematics at West Virginia State University (WVSU). He has extensive experience in higher education administration, academic program development, and strategic planning. He has spearheaded... Read More →

Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-101/102

11:15am CDT

Securing Smart Agriculture: Robotics, Cybersecurity, and Sustainable Farming
Wednesday June 25, 2025 11:15am - 12:00pm CDT
As agriculture becomes increasingly automated, the adoption of robotics, IoT, and geospatial technologies has transformed food production, making farming more efficient and precise. However, these advancements also expose critical vulnerabilities, as cyber threats targeting automated machinery, smart irrigation systems, and agricultural data networks pose serious risks to food security. This session will explore the intersection of robotics, cybersecurity, and precision agriculture, discussing real-world cyberattacks on farm infrastructure and demonstrating key defense strategies. Participants will gain insights into protecting smart farming systems, mitigating risks in advanced manufacturing and bio-chemical technologies, and ensuring the security of food production in an increasingly digital world.
Speakers
avatar for Stephanie Wascher

Stephanie Wascher

Professor, Computers & Information Systems, Rock Valley College
Stephanie E. Wascher is an experienced educator and cybersecurity professional with a strong background in computer networking, information security, and instructional technology. She currently serves as the Computer Information Systems Academic Chair and Associate Professor at Rock... Read More →
Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-403

12:15pm CDT

Working Lunch (Panel/Presentation & Discussion)
Wednesday June 25, 2025 12:15pm - 12:45pm CDT
Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
Wednesday June 25, 2025 12:15pm - 12:45pm CDT
BLDG M Moraine Foyer

12:30pm CDT

Lunch Panel Presentation: More Than Technical Prowess: Soft Skills Every Cybersecurity Graduate Needs - Insights from the NCyTE industry advisory board.
Wednesday June 25, 2025 12:30pm - 1:30pm CDT
In today's rapidly evolving cybersecurity landscape, technical expertise is no longer sufficient for success. Employers increasingly seek graduates with a strong foundation of "soft skills" to complement their technical abilities. This dynamic panel, comprised of industry experts from the NCyTE Industry Advisory Board, will delve into the critical soft skills that cybersecurity graduates must cultivate to thrive in their careers.

This session will provide cybersecurity faculty with actionable insights on better preparing their students for the demands of the modern workforce. Panelists will share real-world experiences and perspectives on the soft skills most valued in new hires.

Speakers
avatar for Kristopher Rides

Kristopher Rides

CEO, Tiro Security
Kris Rides is the CEO and Founder of Tiro Security - a Cybersecurity professional services and staffing firm. He is one of the original founding Board Members of the Southern California Cloud Security Alliance Chapter, the previous President, and an honorary board member. He chairs... Read More →
avatar for Stephen Miller

Stephen Miller

Consultant, NCyTE
Mr. Miller is a Professor Emeritus ENMU-Ruidoso (non-Native American Serving Institution), CAE Peer Review National Center (CNC) Director and NSF ATE National Cybersecurity Training and Education Center (NCyTE) Leadership Team Member contracted through Whatcom Community College.He... Read More →
avatar for Jennifer Kennedy

Jennifer Kennedy

Boeing
Jennifer Kennedy is responsible for Product Security Engineering (PSE) talent management across Boeing. In this role, Jennifer collaborates with Enterprise partners to develop the Workforce tasked with developing, designing, and delivering secure and resilient products. Jennifer also... Read More →
avatar for Chris Carter

Chris Carter

CISO Partner, Infinite Partners
Chris Carter is a seasoned Cyber Risk Advisor and Certified Chief Information Security Officer, currently serving as CISO Partner at Infinite Partners. In this role, he collaborates with executive teams to develop and implement robust cybersecurity strategies that help organizations... Read More →
Wednesday June 25, 2025 12:30pm - 1:30pm CDT
BLDG M Moraine Rooms

1:45pm CDT

Critical Connections: Integrating Critical Infrastructure into Cybersecurity Education for New and Early Career Faculty
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
As cyber threats to critical infrastructure grow, cybersecurity education must evolve. New and early career faculty are key to preparing the future workforce, but integrating critical infrastructure topics into courses can feel overwhelming. This session offers practical strategies for embedding these concepts into introductory cybersecurity courses. Through interactive discussion, participants will explore ways to incorporate the 16 critical infrastructure sectors, align content with workforce frameworks like NICE and DCWF, and use hands-on resources from Try Cyber, CLARK, Security Injections, and Immersive Labs. The session will also cover collaboration with industry  partners to develop timely, real-world examples. Attendees will leave with  actionable ideas to enhance their curriculum and build a network of peers and  professionals committed to protecting critical infrastructure.
Speakers
avatar for Gretchen Bliss

Gretchen Bliss

Director of Cybersecurity Programs, University of Colorado, Colorado Springs
Gretchen is the Director of Cybersecurity Programs at UCCS and leads national efforts to support early-career faculty through mentorship and collaboration.
avatar for Paige Zaleppa Flores

Paige Zaleppa Flores

Adjunct Professor, Towson University
Paige supports early-career cybersecurity faculty with AI-driven curriculum tools, workforce-aligned resources, and mentorship opportunities.
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
BLDG T-403

1:45pm CDT

NCyTE and NCAE Resource for Non-Cybersecurity Academic Programs
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
The National Centers of Academic Excellence in Cybersecurity (NCAE-C) program and the National Cybersecurity Training & Education (NCyTE) Center provide valuable resources traditionally utilized within cybersecurity programs. However, these resources offer significant benefits to disciplines across the academic spectrum. This presentation highlights how faculty and students in non-cybersecurity fields can leverage these resources to enhance their programs and career preparedness.

Cross-Disciplinary Applications Faculty Development Opportunities
  • Interdisciplinary Workshops: NCAE-C community offers workshops where business, healthcare, and STEM faculty can integrate cybersecurity principles into existing curricula
  • Summer Faculty Programs: NCyTE provides opportunities for non-cybersecurity faculty to participate in paid professional development focused on industry-relevant security practices applicable to their fields
  • Virtual Communities of Practice: Connect with subject matter experts across disciplines to develop innovative approaches to teaching cybersecurity concepts within specific fields
Curriculum Resources
  • Modular Course Content: Adaptable learning modules that can be incorporated into business ethics, healthcare administration, engineering, and liberal arts programs
  • Case Studies Library: Real-world scenarios demonstrating cybersecurity implications within various professional contexts
  • Assessment Tools: Ready-to-use evaluation instruments to measure student understanding of security principles relevant to their discipline
Student Resources and Mentoring
  • Cross-Disciplinary Mentorship Program: Students in fields like business, healthcare, and public administration can connect with cybersecurity professionals to understand security implications in their chosen careers
  • Career Exploration Materials: Resources highlighting how cybersecurity skills enhance employability across sectors
  • Interdisciplinary Competitions: Opportunities for mixed teams to solve complex problems requiring both domain expertise and security awareness
Frameworks and Standards Integration
  • Cybersecurity Auditing Framework: Simplified tools for non-technical disciplines to understand compliance requirements
  • CMMC (Cybersecurity Maturity Model Certification): Resources helping students across disciplines understand federal contracting requirements, particularly valuable for business, public administration, and supply chain programs
  • Ethics Integration: Materials connecting discipline-specific ethical frameworks with information security principles
Institutional Benefits
  • Enhanced program relevance through security integration
  • Improved graduate preparedness for security-conscious workplace environments
  • Strengthened partnerships with industry requiring cross-disciplinary security awareness
  • Potential for new funding opportunities through interdisciplinary initiatives
Getting Started
  1. Connect with your regional NCAE-C institution
  2. Explore the NCyTE resource library for discipline-specific materials
  3. Identify subject matter experts available for consultation
  4. Develop an integration roadmap for your specific program
Speakers
avatar for Stanley Kostka

Stanley Kostka

CAE MW Hub Manager, Moraine Valley Community College
Stanley Kostka Moraine Valley Community CollegePROFESSIONAL EXPERIENCE: NSA/DHS Centers for Academic Excellence (CAE) MW Hub Manager 2017 to Present Certifications: ISACA CISAManage the communications with CAE-CD Institutions in the Midwest region of the United States. Serve as... Read More →
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
BLDG T-701

1:45pm CDT

Teaching Electronics Using Existing Cybersecurity/AI Content
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
This workshop will teach participants how to use AI to generate content, animations, and projects for teaching electronics and cybersecurity using AI. The activities will include online tools, programming examples, data analysis, and generating exams and quizzes. 

Through hands-on activities, collaborative projects, and real-world examples, participants will gain a deeper understanding of how AI can transform teaching basic electronics concepts. They will also develop strategies for implementing AI-generated content that enhances student comprehension of fundamental electronics principles while ensuring responsible AI use in both teaching and learning environments.
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
BLDG T-404

1:45pm CDT

Vibe Coding the Edge: Harnessing Frontier and Local LLMs for Cybersecurity and Critical Infrastructure Protection
Wednesday June 25, 2025 1:45pm - 3:30pm CDT
This hands-on workshop presents a dual approach to AI implementation for cybersecurity applications, demonstrating both cloud-based frontier models and self-hosted local alternatives.
Part 1: Vibe Coding with Frontier Models
Experience the dynamic practice of "vibe coding" through live demonstrations using Cursor and Windsurf paired with leading cloud-based models (Claude Sonnet, ChatGPT, and Gemini). Participants will observe rapid prototyping techniques that leverage these powerful models to develop cybersecurity applications in real-time, showcasing how iterative, intuitive development approaches can quickly transform concepts into functional solutions.
Part 2: Deploying Local LLMs for Enhanced Security
Discover the advantages of running open-source models locally using Ollama with various front-ends (Open WebUI, MSTY.app, and LMStudio). We'll examine how models like Llama, Qwen, and Deepseek can serve various cybersecurity and critical infrastructure needs while providing enhanced privacy, offline capabilities, and freedom from usage restrictions.
Technical Foundations
Learn essential hardware requirements, setup procedures, and fundamental prompt engineering techniques for both development approaches. The workshop will showcase practical methods for creating custom knowledge bases by ingesting policy and technical documents, empowering participants to develop tailored solutions.
NAIRR Resources
Explore teaching and research resources available through the National AI Research Resource pilot program (nairrpilot.org) that complement both frontier and local model approaches.
Comparative Advantages
Understand when to leverage cloud-based frontier models versus local deployments, with special attention to considerations around data privacy, operational security, performance requirements, and implementation costs across various cybersecurity contexts.

This workshop delivers practical demonstrations and comprehensive resources for immediate implementation. Participants will gain the knowledge needed to select and deploy appropriate AI tools across educational, research, and industry contexts, with specific applications for critical infrastructure protection and cybersecurity education.
Speakers
avatar for Dr Vincent Nestler

Dr Vincent Nestler

Director of the Center for Cyber and AI and Associate Professor, California State University, San Bernardino
Dr. Vincent Nestler serves as Director of the Center for Cyber and AI and Associate Professor at California State University, San Bernardino. With over two decades of experience in network administration and security, he brings a wealth of practical and academic expertise to cybersecurity... Read More →
Wednesday June 25, 2025 1:45pm - 3:30pm CDT
BLDG T-101/102

1:45pm CDT

K12 and Collegiate Cybersecurity Education - Integrating K12 Cybersecurity Outreach Programs 
Wednesday June 25, 2025 1:45pm - 3:30pm CDT
Join us for an interactive session designed for post-secondary educators who want to collaborate with their local K -12 communities in delivering engaging cybersecurity workshops. This workshop will explore effective strategies for creating engaging and informative experiences for K -12 administrators, educators, and students. We will highlight resources such as the RING (Regions Investing in the Next Generation) curriculum, developed by the University of Alabama Huntsville and their CAE partners, to help integrate cybersecurity awareness into secondary education. The new RING Artificial Intelligence Ethics and Industrial Control System Security units will also be featured.  

During the session, participants will learn about successful K -12 outreach initiatives, including the key factors that made them effective, the logistics involved, the curriculum and resources used, and how to design their own outreach programs. The workshop will also feature hands-on activities, including physical and virtual escape challenges, as well as other engaging RING activities to enhance learning and collaboration.
Speakers
avatar for Jennifer Marden

Jennifer Marden

Research Scientist/ RING Cybersecurity Curriculum Instructor, University of Alabama Huntsville
Jennifer Marden is a distinguished trainer and research scientist with the Regions Investing in the Next Generation (RING) cybersecurity curriculum team at the Center for Cybersecurity Research and Education at the University of Alabama Huntsville. Her primary responsibilities include... Read More →
Wednesday June 25, 2025 1:45pm - 3:30pm CDT
BLDG T-953

2:45pm CDT

The Importance of Faculty Externships and Community Engagement
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
This session explores how collaboration between academia, industry, and the cybersecurity community strengthens workforce development and enhances critical infrastructure security. Learn how Sinclair Community College partnered with Secure Defense in Moraine, Ohio, through the Externship Program, allowing faculty to gain hands-on industry experience. We’ll also discuss the G0-Cyber Collective, a nonprofit initiative that brings cybersecurity professionals together to address emerging threats. Attendees will gain insights into bridging skill gaps, fostering industry-academic partnerships, and building stronger cybersecurity networks.
Speakers
avatar for Shawn Waldman

Shawn Waldman

CEO & Founder, SecureCyber
As the CEO and Founder of Secure Cyber Defense, Shawn leads a dedicated team committed to safeguarding organizations across the entire spectrum of cybersecurity needs. From perimeter defense to secure network design, and vulnerability discovery to intrusion detection systems, Secure... Read More →
avatar for Kyle Jones

Kyle Jones

Assistant Dean of Technology, Grants, and External Partnerships & Professor, Sinclair Community College (OH)
Kyle Jones, a professor and the Information Technology Chair at Sinclair, serves as the lead of NITIC’s AI, Operational Technology, and externship initiatives. He is also a CAE2Y Principal Investigator, the Principal Investigator for the Community College Scholar for Service Program... Read More →
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
BLDG T-403

2:45pm CDT

The Interplay between Cybersecurity, Artificial Intelligence, and Data Privacy Regulations & the Potential Implications for Cybersecurity Education
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
How are the concepts of deidentification and pseudonymization informed by data privacy regulations in different regions of the world, such as the United States and the European Union? What are the possible impacts of these regulatory requirements to the design, development, and deployment of artificial intelligence systems that are relevant to fields such as cybersecurity? And why are certain stakeholders asserting that it is key to ensure that cybersecurity education includes training related to data privacy?
Speakers
avatar for DeBrae Kennedy-Mayo

DeBrae Kennedy-Mayo

Faculty of Law & Ethics, Georgia Institute of Technology
DeBrae Kennedy-Mayo is Faculty of Law & Ethics at the Scheller College of Business at the Georgia Institute of Technology (Georgia Tech). She is an internationally recognized expert on privacy and cross-border data flows. Kennedy-Mayo researches and writes on legal and policy issues... Read More →
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
BLDG T Fogelson Theater

2:45pm CDT

Digital Forensics in the Modern World
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
Digital Forensics is an ever-evolving field. The advent of Artificial Intelligence(AI) and other technologies such as Cloud and IoT, new tools and techniques are necessary.  Traditional forensics methods are still valid, however, technologies are changing and the challenges in retrieving, analyzing, and detecting is on-going. The talk will discuss the traditional methods of digital forensics and move into the new ongoing challenges faced in the field good and bad.
Speakers
avatar for Kevin Vaccaro

Kevin Vaccaro

Associate Professor, Moraine Valley Community College
Associate professor of Cybersecurity. 20+ years of information technology experience and teaching.
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
BLDG T-404

3:45pm CDT

Student Spotlight: Zero Trust for Non-Terrestrial Networks
Wednesday June 25, 2025 3:45pm - 4:05pm CDT
Zero Trust Architecture is understood as the concept of eliminating implicit trust on networks by the implementation of continuous verification and authorization on all entities operating on those networks. However, implementing ZTA in networks that handle space communications, otherwise known as Non-Terrestrial Networks (NTNs), poses difficulties due to their natural constraints such as inconsistent connectivity due to short contact windows, long delays between those contact windows, and limited resources on nodes that handle these communications. These constraints make it difficult to implement a ZTA because they are against Zero Trust (ZT) principles such as continuous verification. This research opportunity was provided through the INSuRE program and had the aim of assessing the applicability of ZT to NTNs by comparing the capabilities of Delay Tolerant Networking (DTN) and its security extension, Bundle Protocol Security (BPSec), with the principles and guidelines of the CISA Zero Trust Maturity Model. The assessment revealed gaps within the current architecture and the creation of a Space Identity, Credential, Access Management (ICAM) framework could possibly address those gaps. The analysis highlights the current applicability of ZT within NTNs and the possible progressions needed to meet the ZT requirements.
Speakers
avatar for Nathan Calderon-Cano

Nathan Calderon-Cano

Student, California State University, San Bernardino
Graduate student and SOC analyst at California State University, San Bernardino. Providing information security monitoring and incident response across multiple California State University campuses. Currently conducting research for zero trust implementations for non-terrestrial systems... Read More →
avatar for Robert Martinez-Velasco

Robert Martinez-Velasco

Student, California State University, San Bernardino
I am a graduate student attending California State University, San Bernardino pursuing my Masters degree in Information Systems & Technology, concentrated in Cybersecurity. Currently, I am employed by the CAE in Cybersecurity Community National Center where I have gained experience... Read More →
Wednesday June 25, 2025 3:45pm - 4:05pm CDT
BLDG M Moraine Rooms

4:05pm CDT

Future Forward: Strategic Wrap Up
Wednesday June 25, 2025 4:05pm - 4:50pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Wednesday June 25, 2025 4:05pm - 4:50pm CDT
BLDG M Moraine Rooms

4:50pm CDT

Closing Remarks
Wednesday June 25, 2025 4:50pm - 5:00pm CDT
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
avatar for Michele Robinson

Michele Robinson

Senior Director and Principal Investigator, National Cybersecurity Centers National Cybersecurity Training & Education (, National Cybersecurity Training & Education (NCyTE) Center
Michele Robinson, CISSP, CISM, CISA, CDPSE, is the Senior Director and Principal Investigator for the National Cybersecurity Centers, leading NCyTE and CCNC initiatives to advance cybersecurity education and workforce development
Wednesday June 25, 2025 4:50pm - 5:00pm CDT
BLDG M Moraine Rooms
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone


Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.