Spring 2026

Please note that all sessions will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation.  Scroll down for links to prior speaker's presentations.

DATE ACCESS SPEAKERS
  Join us in the Fall for a new lineup.

 

 

 

Cybersecurity Speakers From Prior Sessions

Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with Kennesaw State University credentials:

Date Speaker Topic
2026

 

Gideon Rasmussen

Prompt Engineering - Produce Breakthrough Results

 

Stephen Omorogbe

Cybersecurity and Model-Based Engineering

 

Samson Adewale

Detection Engineering in Today's Threat Landscape

April 28

 

Stephen Omorogbe

Cybersecurity and Model-Based Engineering

Samson Adewale

Detection Engineering in Today's Threat Landscape

Gideon Rasmussen

Prompt Engineering - Produce Breakthrough Results

April 15

Areejit Banerjee

Defending the Digital Soul: Data Integrity, Global Bias, and a Three‑Pillar Defense Against AI Scraping

Lee Pace

March 31

Ward Pyles Security that Touches Everything
Kyle Smith Phishing Response
Joseph Leffew Securing the Engineered Nervous System

March 18

Richard Austin Cybered War and Cyber Weapons
Emmanuel Nwajiaku The Psychology of Phishing: Designing Human Centered Security Awareness Programs
Maytha Nassor An Illustrated Introduction to Modern Security Operations
February 24 Samuel Aiello Governing the Ghost in the Machine: RMF Strategies for the Agentic AI Era
Stephen Brown Cybersecurity Incident Response
February 11 Phillip Mahan Topic TBD
Ahmed Awad Preparing for Quantum Computing
Matthew Larson Privacy in a Data-Driven AI World
January 27 Juan Villareal Mitigating the Cyber Risks of Battery Energy Storage Systems Supplied from China
 Jeff Apolis Security from the Start: Maximizing Business Value Through Secure Software Development Strategies
Malcolm Harkins Economic Impact of Securing AI
January 14 Jermaine Green Keeping The Lights On: Auditing Critical Infrastructure
Kyle Meyer I suck at coding. Claude senpai, make me malware
Nidhi Srivastava GRC and GRC Engineering -  Transforming Governance, Risk, and Compliance
2025

December 2 Matt Somerlott The Psychology of Cyber Risk: How Cyber Insurance Shapes Security Behavior
Morgan Hague Cyber Strategy Development
Gideon Rasmussen Crisis Communications - In the Gravest Extreme
November 19 Joy Toney Ethical Use of AI
Brian Albertson Trends and Predictions of Cyber & GRC for 2026
Phil Plantamura Enterprise Security Monitoring using Open Security Onion
Brettina Browder Building a Cyber Champion Program
November 4 Dusty Thibodeaux What would you say you do here – closing the gap of class and real-world work
Nick Corn Soft skills for information security professionals
Shannon McKenzie SIEM/SOAR Overview and Transforming Security Operations
October 22 Sam Aiello AI in Cybersecurity - The Future of Intelligent Threat Defense
Stephen Omorogbe Managing the Secure Systems Development Lice Cycle
Pete Smith Preparing Your Cybersecurity Org for M&A
October 20 Herb Mattord How to Stay Safe Online - Spotting and Avoiding Scams
October 7 Yugandhar Suthari Shift-Left Security in Action: Automating Cloud Compliance with Open Source Tools
Mike Mcgannon Protecting Your Digital Identity"

September 24

Jeff Apolis Operationalizing AI: A CISO’s Guide to Strategic Adoption and Risk Management
Richard Austin Ghosts of Data Past
September 9 Onyekachi Okereke Building a Cybersecurity Program from Scratch: Real Life Lessons
Brent Holt Offensive Security Testing
August 27 Kyle Smith Wielding the Power of the Tabletop
James Grisham AI: Impacts to Cybersecurity and the Future of the CISO
Ahmed Awad Data Protection Using NIST CSF 2.0
April 16 Donna Gallaher  Working in your own business - Being your own boss
Joy Toney The Power of Policies:
Cybersecurity’s Silent Muscle in Defending Organizations
April 1 Michael Barker Complying with CMMC
Onyekachi Okereke Supply Chain Risks & Third-party Risk Management
Mark Reardon Use of an Enclave to Support Unique Security Requirements
March 19 Kyle Smith “Wielding the Power of the Tabletop”
Keyaan Williams “Perspectives on Cybersecurity Management”
Alan Greenber “Managing an MSPP”
February 25 Nick Mullen “Human Risk Management”
Jason Lapene “Real World Incident Response from a Technical Perspective”
Larry Holt “Threat Modeling with CARVER”
February 12 Brian Albertson “GRC Done Right”
R. Tombari Sibe “What, Where, When, Who, and How: Reconstructing Events with Digital Forensics”
James Baird “Generative AI: Balancing Business Benefit Against Security Risk”
January 28 Kyle Meyer “Hacking Is My Job, Bro”
Arun Mamgai “Privacy in the Age of AI”
Pete Smith “The Power of Partnerships: Cybersecurity is a Team Sport”
 January 15 Ahmed Awad “IT Audit, Governance, Strategy, Data Protection”
Nia Luckey “Cybersecurity Management”
Ariel Robles “Secure Access Service Edge (SASE) in Corporate America”

2024

November 13

Dusty Thibodeaux Vulnerability Management
Greg Schaffer Security Needs for the Small to Midsized Business
Joy Toney Cybersecurity Unit’s Role in Responsible Use of AI in Organizations

October 29

Stephen Omorogbe and Michael MacDonald Managing Security & Privacy Risks with RMF
Kyle Smith Cybersecurity as a Brand
Stephen Gay Cybersecurity Program Management and Continuous Improvement
October 16 Tim Cullen News from the Front Lines: The Crowdstrike Outage
Chris Silvers CMMC Who? The Basics of New DoD Cybersecurity Compliance
James Grisham Breaking into Cybersecurity: Navigating Post-Degree Paths and Avoiding Common Pitfalls
October 1 Jack Healey The Role of GRC in Disruptive Technology Adoption- How to keep your AI program on the Road and Out of the Ditch
Mollie Cavenaugh Cybersecurity Imposter Syndrome
Yosef Beck Business Analysis for Cybersecurity
September 18 Morgan Hague Fundamentals of AI Security
September 3 Nia Luckey Building a Multi-Year Strategic Roadmap for Cybersecurity
Bryan Albertson GRC Architecture
Patrick Sullivan Welcome to ISO42001
August 21 Dustin Sachs The Importance of Community Building in Cybersecurity
Fred Roth After the Breach: What CEOs and Legal Departments Worry About
April 17 Collin Parker Product Security and PSIRTs
Kent Bryan What is Web Cloud Filtering
April 2 Joy Toney The Value of Security Culture
Derrick Sturisky Quantum Cybersecurity
March 20 Philip Plantamura Security Onion: Peel Back the Layers of Your Enterprise
Keith Deininger Developing and Executing an Effective Third-Party Risk Management Program
February 27 Chris Silvers NIST SP 800-63
Stephen Omorogbe Supply Chain Risk Management and National Security
Shannon Garcia Elevating Your Application Security Program
February 14 Nia Luckey Leveraging Federal Compliance Best Practices To Protect AI Data
Galina Shelest Art of Threat Modeling

January 30

Phillip Mahan How is a raven like a writing desk?
Katherine Fithen Creating Effective Policy
January 17 Pete Smith Managing Threat Analysis
Kyle Smith Cybersecurity as a Brand

2023

November 15

David Benton

Incident Response Field Practices

Wes Knight

Effective Communication is Critical to Your Success

November 8

Stephen Omorogbe

Engineering Secure Systems: Cyber and National Defen 

Stephen McCamy

Staying on the Technical Track

October 26

Jake Bulim

New Attack Vector: SIM Swap Attacks

October 24

Chris Silvers

The Long and Winding Alley: Social Engineering Parables

October 18


 

Yosef Beck

Anatomy of a Breach

Jake Bulim

SOC Structures, Leading Analysts and Making an Effective Team

October 4

 

James Venezia

Cyber Insurance – Basics for Cybersecurity Pros

Phillip Mahan

Privacy and Cybersecurity

September 19

James Baird

Web Application Security Program – Strategies and Tools

August 22

 

Dustin Sachs How to Leverage Behavioral Science to Enhance Cybersecurity
Subramanian Developing Secure Software

April 18

Greg Aitken

Resume -> Applications -> Interview ->Job

 Chris Silvers

Freelance Cybersecurity Trends and Techniques

April 12

Dave Croasdell & Jim Elste

Cyber Teaching Hospitals and Cyber Clinics: Extending cybersecurity support to the community

Patrick Sullivan

Importance of Professional Communication

April 4

George Garza

Securing the Cloud: Reports from the Field

March 28

Ward Pyles

Starting your Career in Cyber Security, Not Just a Job

Sethuraman Srinivas

Enterprise Security Metrics - Relevance and Application

March 15

Kyle Smith

 Cybersecurity as a Brand

February 21

Yosef Beck

Vendor Requests for Proposals

Chris Black

SOAR: Automate All the SecOps Things

February 8

Brian Albertson

IT Risk Trends and Impact to Cybersecuri

Ian Kahn

Privileged Access Management – An Introduction

2022

November 15

Asher Andree Pathway to Being a Pentester
Jake Bulim SOC Structures and How to Lead Analysts to Make an Effective Team

November 2

Ryan Basden Technical Security Career Paths

October 31

Patrick Jenkins Threat-Based Approaches to Security Risk Assessment and Risk Management
Amanda Charter, Lyndsey Lieb, and Tobias Simpson Practicing the Basics of Cybersecurity
Derrick Sturisky Proposed SEC Cyber Disclosure Rules

October 30

Marianne Bailey The State of Cybersecurity
Herb Mattord Five Ways to Stay Safe(r) Online

October 18

Charles Herring Federating Cybersecurity Operations

Phillip Mahan

It's a Matter of Trust

October 5

Kaustubh Kubde

How to break into Cybersecurity & Essential Tips for a Strong Foundation

Sam Leonard

Disaster Recovery After Cyberattack

September 20

Jon Anderson

Overview of Changes in PCI DSS 4.0

Brent Holt

Edge Solutions

September 7

Yosef Beck

Network Security for Smarties

August 23

Jacob Lovell

Denial of Service: Taxonomy and Vocabulary

Aldo Febro

DDoS against VoIP Services: Threat & Career Opportunities

April 13

Keyaan Williams Mastering Cybersecurity Metrics

Anne-Marie Colombo

Zero Trust Without the Hype

March 30

Zola Maswanganye

Who is responsible for Security

Jade West

Essential API Security

March 28

Betty DuBois

Malware Analysis
Threat Hunting

March 16

Yosef Beck

Cybersecurity as a Competitive Advantage

Mike Rothman

Evolution of the SOC

March 2

Bernard Barnes

How to Sell Cybersecurity Services

J. David Quilter

How to Build a Smart Security Program

February 16

Christian Hyatt

The 5 CISO Archetypes

February 10

Betty DuBois

Capturing with Wireshark & its Command Line Friends
Display Filters
TCP Vulnerabilities

January 19

Jacob Lovell

Containing the Breach: The Evolution of Microsegmentation

2021

October 27

Brandy Griffin

The Incident Response Lifecycle

Betty DuBois

Network Reconnaissance with Open Source Tools

October 12

Maryann Douglass & Sherri Collis

Personal Security Awareness for Online Presence

Ward Pyles

 Security Teams are Over Staffed

September 29

 

Jacob Lovell

MFA is broken: How recent developments in FIDO2 fixes it

Dan Smith

Recovering from Ransomware and Other Disasters

September 14

Yosef Beck

 Designing an effective Security Metrics and Reporting Program

Christian Hyatt

Results and trends from 1000 security assessments 

September 1

Brian Albertson

Define, Drive, Share... Network
June 23

Robert Roberts

Contingency Planning

June 21

Anne Marie Colombo

Risk Management Framework

June 16

Debra Oglesby

Staffing Planning

June 14

Jeff Jones

Security Operations Design

June 9

Yosef Beck

Policy Design 

June 7

Taiye Lambo

Governance Design

June 2

Gordon Shenkle

Security Services Master Plan

April 13

Anne Marie Columbo Risk Management Framework Overview

March 31

Jack Healy Risk Management: Deep Thoughts and Better Results

March 16

Yosef Beck Network Security Monitoring: Process & Tools Overview
Matthew Dobbs Leveraging Zero Trust Architecture

February 16

Nat Prakongpan Ox Response, Incident Response Preparedness for Business

February 3

Ward Pyles Driving security teams to be more effective
Jacob Lovell Web Application Security at the Edge

January 19

Brian Albertson Building Compliance into Business Operations
Adam Kehler Cybersecurity in Healthcare

2020

November 17

Joe DiBiase Things We Learned and Adjusted to Deal with COVID-19

November 4

James Blanton
Nick Corn

October 20

Maryann Douglas
Jack Healey

October 7

Nick Travis
Tim Callahan
Anna Marie Colombo
Chris Silvers

September 9

Mike Rothman
Vinton Cerf

Lessons Learned While Creating the Internet

August 25

Jacob Lovell Securing the Enterprise: Application Access and its Challenges 

Sarah Beck

Behavior Analytics for Security

March 10

Mike Rothman Advancing Cloud Security: The Next Phase
Tim Callahan The Value of Threat Intelligence

February 26

Jeff Jones Threat Intelligence Brief
Jacob Lovell Incident Response
Mitch Moosbrugger The Challenges of Remote Vendor Access

February 11

Phillip Mahan Communicating Risk Appetite and Tolerance
Sasi Pulipaka

Data Privacy and Corporate Responsibility

January 29

Bob Varnadoe Techniques for Detecting a Cyber Attack
Jacob Lovell Third Party Scripts: Magecart & Other Threats
Adi Wong Cloud Security/Akamai 101

January 22

John Traino What it Takes to Innovate

January 14

David Allen Managing Cyber Risk for the Enterprise
David Anderson Planning and Executing Continuity Plans

2019

November 12

Brian Albertson Automating IT Compliance
Jack Healey Baking Risk into Your Information System Soufflé
Daniel Williams & Matt Crane Payment Card Industry Data Security Standard

October 18

Corey Bingham & Nathan Raymer A Primer on Georgia Payment Processing Tech Companies

October 1

Rashed Chowdhury Salesforce as a Platform for Innovation
Debra Oglesby Project Management
Tate Ferguson Technical Writing

September 17

Jeff Jones Low Knowledge Authentication
Moazzam Khan Next Generation SIEM: Qradar and its Applications
Jacob Lovell Fighting Armies of Zombie Robots with a Giant Robot

August 30

Tim Cullen Incident Response

August 28

 

Tim O'Neill Network Forensics
Joseph DiBiase The Horse Has Left the Barn and We Have the Saddle!: Our Journey into the Cloud

April 17

Dan Schroeder The Role of External Attestations
Bill Morrison Philosophy from the Security Trenches: The Management Schizophrenia Continues
Carlos Batista Building Secure Software

March 19

Tim O'Neill Attacking the Internet of Things
Jack Healey Security and the Role of Risk Assessment 
Danny Wasserman

Defending Crediential from Automated Attack Tools

February 27

Frank Rietta Applying Agile and Security in Software Development
Philip Andreae Payment Card Security
Dennis Kosmetatos Business Value of Identity and Access Management

February 5

Jeff Jones Cyber Threat Brief
Mitch Moosberger Cloud-Based Credential Management

January 23

Phillip Mahan I am the LAW: Statutory Compliance in Corporate Cyber Security
Tim O'Neill Managing Criminal CYBER Investigations

2018

November 28

Philip Mahan

Security Privacy and Governance for Business Majors

Mark German

Kill Chain / Threat Intelligence
Philip Andreae FIDO: The Case for Better Authentication

November 1

Jack Healey

Management Role in a CyberSecurity Incident Response Plan

Philip Mahan

Time Travel, Defense in Width, and CyberSecurity

October 23

Will Alexander

Beyond the Classroom: What Students Need to Know

Tim O'Neill

Why Networks Still Matter

Brian Albertson

Six Things I Wish New Employees Knew

Keith Deininger

Why Managing 3rd Party Cybersecurity Risk is a Matter of National Security

Philipe Andreae

Four Words and Three Concerns as We Think About the Issue of Digital Identity

Jeff Jones

Integrating SecDevOps into Developer Agile Deployments

October 18

Chris Farris

Hacking the Cloud

Alex Kirk

A Day in the Life of an InfoSec Pro

October 8

Jeff Jones

The State of Insecurity in the World Today

Mitch Moosbrugger

Emerging Threats to Privileged Account Security and Privileged Access Management

Mike Rothman

DevSecOps

September 13

Tim O'Neill

Being an Expert Witness
Why the Physical Layer Still Matters

September 6

Ward Pyles

Career Tracks in ISA Management

Brian Albertson

REAL IT Controls

Sherron Burgess

Launching an ISA Career

Walter Tong

Incident Management

March 27

Benjamin McInnis

Compliance and Incident Response... How it is Connected

March 26

Brian Albertson

Staying Current in the Field... Connecting the Dots

March 23

Scott Baker

Data Loss Prevention: What It Is and Why I Should Care?

March 12

Shekesa McLaurin

How to Survive Corporate and Become an Entrepreneur

Katie Greenfield

Navigating the Recruiting Process

Tim Cullen

The Rise of the BlockChain

February 16

 

Jeff Jones

2018 Threat Intelligence Briefing

Preeti Ravinda

How Watson for Cyber Security Thinks

Tim O'Neill

Defending WiFi Hacks

February 7

Jeff Jones

General Threat Briefing

Dan Streuber

Threat Analysis on Encrypted Network Activity

January 12

Phillip Mahan

Creating Effective Policy

Tim O'Neill

Managing Security Compliance

Damien Suggs

Application Security

January 11

Herb Mattord

Study Abroad with EC London 2018
Security Careers and You

2017

November 29

Ward Pyles

ISA Careers and Advancement

Kevin Beaver

Planning a Consulting Career in ISA

Robert Roberts

Business Resiliency

November 15

Walter Tong

Cyber Incident Management

Nat Prakongan

IBM Security Cyber Range: Driving Innovation Through Immersive Experience

October 27

Cybersecurity Speaker Series

Informal Roundtable Discussion

October 26

Phillip Mahan

Communications in Information Security & Business: A Study in Love, Hate, and Apathy
Tim Cullen The Current State of the Union for IoT

 Panel Discussion

Higher Education and the Cybersecurity Workforce Imperative

October 25

 

 

Bryan Sheppard

Don't Be Responsible for an ID10T Issue: Cybersecurity is not a Technical Problem

Keith Deininger

Updating Enterprise IT Governance, Compliance, and Risk

Mike Rothman

Tidal Forces: The Changes Ripping Apart Security as We Know It

October 4

Jeff Jones

Threat Intelligence for the New Security Professional

Eric Meadows

A Safe Journey to the Cloud

Dan Mares

Expert Witness

September 7

Phillip Mahan

GDPR & Data Protection

Tim Cullen

Ransomware: Dealing with the Attack and Afterwards

August 31

 Johathan Steenland

Cyber Security Speaker Series

April 19

Walter Tong

Starting Your Cyber Career

Jeff Jones

Threat Intelligence and Open Source Information

March 31

Tim O'Neill

IPv6 Challenges and Opportunities

Keith Deininger

Firewall Configuration and Testing with Open Source Tools

March 16

Blake Penn

Information Security Policy

Walter Tong

Incident Response

Ward Pyles

Value Based Security via Big Data

March 6

 Keith Deininger

Governance and Risk Compliance: The Four Major Areas of Risk

February 17

 

 Frank Rietta

Breach Prevention for Developers

 Taiye Lambo

Cloud Security Technologies

 Nick Corn

Social Engineering Healthcare

February 3

Taiye Lambo

Managing Cloud Security

Phillip Mahan

Real-world Business Continuity

Bob Long

Governance, Change Management & Project Management Office 

January 20

Michael Carroll

Securing a Data Lake

Dan Schroeder

Defining the Information Assurance Mindset

2016

December 11

Ward Pyles

International Hotel Group

Walter Tong

Georgia Technology Authority

November 29

Carlos Batista

Building Security in Software Security 101

Alex Kirkland

Incident Response Forensics

Jeremiah Warren

Cyber Security Analyst, SunTrust

April 29

Phillip Mahan

Vendor Security Programs - Open Access Version

April 25

Phillip Mahan

Vendor Security Programs

2015

November 19

Mike Rothman

Inflection: Security's Next 10 Years

Charles Hoff

PCI Compliance

November 2

Dan Streuber

Cisco

Michael Fabian

Embedded Systems

October 7

James Blanton

Digital Forensics

Ward Pyles

Event Response

September 17

Mark Ray

Cyber Division, FBI

TEKsystem

Recruiting Tips for ISA Job Seekers

April 29

Tim O'Neill

IPv6

April 25

Jon Anderson & Zack Tisher

Third Party Information Security Risk

April 24

Jarra Keskessa

First Data

April 16

Walter Tong

Georgia Technology Authority

March 30

Jeff Jones

Cyber Attack Trends

March 20

Keith Deininger

Social Engineering: Getting Past the Gatekeepers

March 18

Ward Pyles

Report form the Front Lines

March 14

James Blanton

Lessons on Incident Response

February 18

Trent Reeves

Software Security in the Enterprise

February 9

Michael Fabian

Introduction to Embedded Systems Security