Loading…
Welcome to the third annual Cybersecurity Across Disciplines (CyAD) Conference hosted by the National Cybersecurity Training & Education Center (NCyTE)! 
  • The schedule is tentative and subject to change.  Please check back regularly for the most current version.
  • Important Notice: All sessions are first-come, first-served. While you can plan your schedule in Sched, it does not guarantee a seat in any session. CyAD registrants check your email inbox or junk folder for Sched invite.
Venue: BLDG T-403 clear filter
Wednesday, June 25
 

8:45am CDT

5G Networks Architecture, Complexities and Vulnerabilities: Simulation and Visualization
Wednesday June 25, 2025 8:45am - 9:30am CDT
5G networks will support billions of IoT devices, enabling Industry 4.0, smart infrastructure, connected cars, and public safety. IoT introduces new security risks due to device scale and attack surfaces. A strong IoT security approach requires zero trust and defense-in-depth strategies. Some of the Key risks: supply chain compromises, weak authentication, DDoS, malware, botnets, and data breaches.

This study will showcase access to 5G network, discovery of KPI of a 5 network, the simulation of 3 different attacks on 5G networks including:

1- Jamming 5G network: A 5G jamming attack is a type of denial-of-service (DoS) attack that disrupts wireless communication by overwhelming a 5G network with interference, preventing devices from transmitting or receiving signals effectively
2- Bidding 5G network: A 5G bidding attack is a type of downgrade attack where an attacker forces a device to connect to a lower-generation network (e.g., 4G, 3G) instead of the more secure 5G network. This allows the attacker to exploit weaker security protocols and intercept or manipulate communications.
3- A man in the middle attack: A Man-in-the-Middle (MitM) attack in a 5G network occurs when an attacker intercepts, alters, or relays communication between a user and the network without their knowledge. Despite 5G’s enhanced security, sophisticated MitM attacks can still exploit vulnerabilities in network authentication, encryption, and signaling protocols.
Each one of the attacks will be showcased, simulated, and visualized.
Speakers
avatar for George Meghabghab

George Meghabghab

Professor/Director of Cyber Defense / Networking / Programming, Roane State CC
Computer Science/Computer Information Technology Educator with over 30 years of teaching and training in IT, Cyber defense, information assurance, and digital forensics.  Passion for teaching and training students to strengthen the IT and cybersecurity disciplines by developing dynamic... Read More →
Wednesday June 25, 2025 8:45am - 9:30am CDT
BLDG T-403

11:15am CDT

Securing Smart Agriculture: Robotics, Cybersecurity, and Sustainable Farming
Wednesday June 25, 2025 11:15am - 12:00pm CDT
As agriculture becomes increasingly automated, the adoption of robotics, IoT, and geospatial technologies has transformed food production, making farming more efficient and precise. However, these advancements also expose critical vulnerabilities, as cyber threats targeting automated machinery, smart irrigation systems, and agricultural data networks pose serious risks to food security. This session will explore the intersection of robotics, cybersecurity, and precision agriculture, discussing real-world cyberattacks on farm infrastructure and demonstrating key defense strategies. Participants will gain insights into protecting smart farming systems, mitigating risks in advanced manufacturing and bio-chemical technologies, and ensuring the security of food production in an increasingly digital world.
Speakers
avatar for Stephanie Wascher

Stephanie Wascher

Professor, Computers & Information Systems, Rock Valley College
Stephanie E. Wascher is an experienced educator and cybersecurity professional with a strong background in computer networking, information security, and instructional technology. She currently serves as the Computer Information Systems Academic Chair and Associate Professor at Rock... Read More →
Wednesday June 25, 2025 11:15am - 12:00pm CDT
BLDG T-403

1:45pm CDT

Critical Connections: Integrating Critical Infrastructure into Cybersecurity Education for New and Early Career Faculty
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
As cyber threats to critical infrastructure grow, cybersecurity education must evolve. New and early career faculty are key to preparing the future workforce, but integrating critical infrastructure topics into courses can feel overwhelming. This session offers practical strategies for embedding these concepts into introductory cybersecurity courses. Through interactive discussion, participants will explore ways to incorporate the 16 critical infrastructure sectors, align content with workforce frameworks like NICE and DCWF, and use hands-on resources from Try Cyber, CLARK, Security Injections, and Immersive Labs. The session will also cover collaboration with industry  partners to develop timely, real-world examples. Attendees will leave with  actionable ideas to enhance their curriculum and build a network of peers and  professionals committed to protecting critical infrastructure.
Speakers
avatar for Gretchen Bliss

Gretchen Bliss

Director of Cybersecurity Programs, University of Colorado, Colorado Springs
Gretchen is the Director of Cybersecurity Programs at UCCS and leads national efforts to support early-career faculty through mentorship and collaboration.
avatar for Paige Zaleppa Flores

Paige Zaleppa Flores

Adjunct Professor, Towson University
Paige supports early-career cybersecurity faculty with AI-driven curriculum tools, workforce-aligned resources, and mentorship opportunities.
Wednesday June 25, 2025 1:45pm - 2:30pm CDT
BLDG T-403

2:45pm CDT

The Importance of Faculty Externships and Community Engagement
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
This session explores how collaboration between academia, industry, and the cybersecurity community strengthens workforce development and enhances critical infrastructure security. Learn how Sinclair Community College partnered with Secure Defense in Moraine, Ohio, through the Externship Program, allowing faculty to gain hands-on industry experience. We’ll also discuss the G0-Cyber Collective, a nonprofit initiative that brings cybersecurity professionals together to address emerging threats. Attendees will gain insights into bridging skill gaps, fostering industry-academic partnerships, and building stronger cybersecurity networks.
Speakers
avatar for Shawn Waldman

Shawn Waldman

CEO & Founder, SecureCyber
As the CEO and Founder of Secure Cyber Defense, Shawn leads a dedicated team committed to safeguarding organizations across the entire spectrum of cybersecurity needs. From perimeter defense to secure network design, and vulnerability discovery to intrusion detection systems, Secure... Read More →
avatar for Kyle Jones

Kyle Jones

Assistant Dean of Technology, Grants, and External Partnerships & Professor, Sinclair Community College (OH)
Kyle Jones, a professor and the Information Technology Chair at Sinclair, serves as the lead of NITIC’s AI, Operational Technology, and externship initiatives. He is also a CAE2Y Principal Investigator, the Principal Investigator for the Community College Scholar for Service Program... Read More →
Wednesday June 25, 2025 2:45pm - 3:30pm CDT
BLDG T-403
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone


Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.