Spring 2025
Please note that the session will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation. Scroll down for links to prior speaker's presentations.
Please note that the session will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation. Scroll down for links to prior speaker's presentations.
Cybersecurity Speakers From Prior Sessions
Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with Kennesaw State University credentials:
Fall
2024
August 21,
Dustin Sachs, "The Importance of Community Building in Cybersecurity", Fred Roth, "After the Breach: What CEOs and Legal Departments Worry About"
September 3, Nia Luckey, "Building a Multi-Year Strategic Roadmap for Cybersecurity", Bryan Albertson, "https://mediaspace.kennesaw.edu/media/Bryan+Albertson%2C+%22GRC+Architecture%22/1_25rm350p/62130511", Patrick Sullivan, "Welcome to ISO42001"
September 18
Sundari Parekh, "Control Rationalization to Manage Audit Fatigue", Alan Greenberg, " Cyber Security in the Public Sector", Morgan Hague, "Fundamentals of AI Security"
October 1,
Jack Healey, "The Role of GRC in Disruptive Technology Adoption- How to keep your AI program on
the Road and Out of the Ditch", Mollie Cavenaugh, "Cybersecurity Imposter Syndrome", Yosef Beck, "Business Analysis for Cybersecurity"
October 16, Tim Cullen, "News from the Front Lines: The Crowdstrike Outage", Chris Silvers, "CMMC Who? The Basics of New DoD Cybersecurity Compliance", James Grisham, "Breaking into Cybersecurity: Navigating Post-Degree Paths and Avoiding Common Pitfalls"
October 29, Stephen Omorogbe and Michael MacDonald, "Managing Security & Privacy Risks with RMF", Kyle Smith, "Cybersecurity as a Brand", Stephen Gay, "Cybersecurity Program Management and Continuous Improvement"
November 13, Dusty Thibodeaux, "Vulnerability Management", Greg Schaffer, "Security Needs for the Small to Midsized Business", Joy Toney, "Cybersecurity Unit’s Role in Responsible Use of AI in Organizations"
2023
Tue, August 22, 2023, Dustin Sachs, WFS, “How to Leverage Behavioral Science to Enhance Cybersecurity” and S. Subramanian, Industry Professional, “Developing Secure Software”
Tue, September 19, 2023, Greg Aitken, Regional Director, Intaso, Inc, "Resume -> Applications -> Interview ->Job" and James Baird, Focus Brands, “Web Application Security Program – Strategies and Tools”
Wed, October 4, 2023, James Venezia, CPCU, CCIS, CCIC, Phoenix Insurance Group, “Cyber Insurance – Basics for Cybersecurity Pros” and Phillip Mahan, Industry Professional, “Privacy and Cybersecurity”
Wed, October 18, 2023, Yosef Beck, IHG, “Anatomy of a Breach”, and Jake Bulim, Industry Professional, “SOC Structures, Leading Analysts and Making an Effective Team”
Tue, October 24, 2023, Chris Silvers. Industry Professional, “The Long and Winding Alley: Social Engineering Parables”
Tue, October 31, KSU Cybersecurity Awareness Day
Wed, November 8, 2023, Stephen Omorogbe, GTRI, “Engineering Secure Systems: Cyber and National Defense” and Stephen McCamy, Aflac, “Staying on the Technical Track”
Tue, November 14, 2023, Wes Knight, Needling Worldwide, “Effective Communications Is Critical To Your Success” and David Benton, CHOA, “Incident Response Field Practices”
2022
Tue., August 23, 2022, Jacob Lovell, Solutions Engineer at Akamai, "Denial of Service: Taxonomy and Vocabulary" and Aldo Febro, Ph.D., CISO at Continuant, "DDoS against VoIP Services: Threat & Career Opportunities"
Wed., September 7, 2022, Yosef Beck, Director of Security Architecture at IHG, "Network Security for Smarties"
Tue., September 20, 2022, Jon Anderson, "Overview of Changes in PCI DSS 4.0" and Brent Holt, Edge Solutions
Wed., October 5, 2022, Kaustubh Kubde, Equifax, "How to break into Cybersecurity & Essential Tips for a Strong Foundation" and Sam Leonard, Veeam, "Disaster Recovery After Cyberattack"
Tue., October 18, 2022, Charles Herring, Witfoo, "Federating Cybersecurity Operations", and Phillip Mahan, Chief Risk Officer for Code Named Projects, LLC., "It's a Matter of Trust" ¤
Wed., November 2, 2022, Ryan Basden, risk3sixty, "Technical Security Career Paths" ¤
Tue., November 15, 2022, Asher Andree, Mandiant, "Pathway to Being a Pentester" and Jake Bulim, "SOC Structures and How to Lead Analysts to Make an Effective Team"
2021
Wednesday, September 1, 2021, Brian Albertson, State Farm Insurance, "Enterprise Data Enablement Risks, Controls and Vulnerabilities"
Tuesday, September 14, 2021, 19:00 - 21:00, Virtual Session
Yosef Beck, IHG, "Designing an effective Security Metrics and Reporting Program"
Christian Hyatt, risk3sixty, "Results and trends from 1000 security assessments"
Wednesday, September 29, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
Jacob Lovell, Akamai, “MFA is broken: How recent developments in FIDO2 fixes it”
Dan Smith, Industry Expert, "Recovering from Ransomware and Other Disasters"
Tuesday, October 12, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
Maryann Douglass & Sherri Collis, Online Business Systems, "Personal Security Awareness
for Online Presence"
Ward Pyles, Kids2
Wednesday, October 27, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
Brandy Griffin, Avalon Cyber, "The Incident Response Lifecycle"
Betty DuBois, Independent Security Consultant, "Network Reconnaissance with Open Source
Tools"
Tuesday, November 9, 2021, 19:00 - 21:00 via Zoom
Jack Healey, BHA Group, "Impact of Bias on Risk Appetite and Tolerance"
Phillip Mahan, Industry Professional
2020
Jacob Lovell, Solutions Engineer, Akamai, “Securing the Enterprise: Application Access and its Challenges”
Sarah Beck, State Farm, “Behavior Analytics for Security”
Vinton Cerf, The Early Internet
Mike Rothman, “The future of security operations in a DevOps world”
Chris Silvers, “Freelance cybersecurity trends and techniques”
Anne Marie Colombo, SAP America, “Securing the Cloud”
Nick Travis Palo Alto Networks, “Defending Against Data Exfiltration via DNS”
Tim Callahan, AFLAC
Maryann Douglas, Online Business Systems, “You CAN Get There from Here – Women in Cybersecurity”
Jack Healey, “Cyber Incident Communication Strategies”
James Blanton, Security Professional
Nick Corn, Ionic Security, “Application-level Denial of Service”
Joe DiBiase, Interface, “Things we learned and adjusted to deal with Covid-19”
Kevin & Garrett Beaver, “Security from a Teenager’s Perspective…And what businesses need to be on the lookout for among their rising workforce”
2019
Tim O'Neill, Network Forensics
Joseph DiBiase, Director of Information Security, Interface, The horse has left the barn and we have the saddle!: Our journey into the cloud
Tim Cullen, Adapture, Incident Response
Jeff Jones, Threat Hunter, Low Knowledge Authentication
Moazzam Khan, Security Researcher, IBM, Watson Security Research, Next Generation SIEM: Qradar and its Applications
Jacob Lovell, Security Solutions Architect, Akamai Technologies, Fighting Armies of Zombie Robots with a Giant Robot
Rashed Chowdhury, Principle Enterprise Applications, Infosys, Salesforce as a Platform for Innovation
Debra Oglesby, , FIS Worldpay, Project Management
Tate Ferguson, Service Transition Manager, FIS Worldpay, Technical Writing
Corey Bingham, Nathan Raymer, A Primer on Georgia Payment Processing Tech Companies
Brian Albertson , IT Control Product Owner, State Farm, Automating IT Compliance
Jack Healey, Founder/CEO, Bear Hill Advisory Group, Baking Risk into Your Information System Soufflé
Daniel Williams, Matt Crane, Payment Card Industry Data Security Standard
2018
Walter Tong, GA Technology Authority, Incident Management
Ward Pyles, IHG, Career Tracks in ISA Management
Sherron Burgess, BCD Travel, Launching an ISA Career
Brian Albertson, State Farm, REAL IT Controls
Tim O’Neal, Industry Professional, Why the Physical Layer Still Matters
Debby Briggs, NetScout, What is your Security’s Weakest Link? The Human Firewall!
Tim O’Neal, Being an Expert Witness
Mike Rothman, Securiosis, DevSecOps
Mitch Moosbrugger, CyberArk, Emerging Threats to Privileged Account Security and Privileged Access Management
Jeff Jones, Security Professional, The State of Insecurity in the World Today
Katie Greenfield, Brooksource
Alex Kirk, Tenable
Chris Farris, Turner Inc., Pen-testing AWS
Jack Healey, Bear Hill Advisory Group, Management Role in a Cybersecurity Incident Response Plan
Phillip Mahan, Ionic Security
Louis Kandel
Philip Andreae, FIDO: The case for better authentication
Mark German, KPMG
Philip Mahan, Ionic Security, Security Privacy and Governance for Business Majors
2017
Tim Cullen, Adapture, Dealing with Ransomware
Phillip Mahan, Ionic Security, Why GPDR Matters to You
Dan Streuber, Cisco, Analyzing Encrypted Network Traffic
Brad Stafford, Checkpoint, Securing the Cloud
Jeff Jones, Threat intelligence for the new security professional
JoEtta LeSueur, MSIS, CISSP, Product Security Manager, Ionic Security
Ward Pyles; CISSP, CRISC, NSA; BS IS, Masters of Law; Director Global Security and Assurance InterContinental Hotels Group
Kyle Waddle, Comcast, Managing Cyber Crisis Events Within Matrix Organizations
Walter Tong, Georgia Technology Authority, Managing Cyber Incidents
Nat Prakongan, IBM, The IBM Security Cyber Range
Ward Pyles, Intercontinental Hotels Group, ISA Careers and Advancement
Kevin Beaver, Principle Logic, Planning a Consulting Career in ISA
Robert Roberts, The Coca-Cola Company
Rafal Los, Seventy7 Consulting
Spring
2024
January 17, Pete Smith, “Managing Threat Analysis”, Kyle Smith, “Cybersecurity as a Brand"
January 30, 2024, Phillip Mahan, “How is a raven like a writing desk?”, Katherine Fithen, “Creating Effective Policy”
February 14, 2024, Nia Luckey, “Leveraging Federal Compliance Best Practices To Protect AI Data”, Galina Shelest, “Art of Threat Modeling”
February 27, 2024, Chris Silvers,
“NIST SP 800-63”, Stephen Omorogbe,
“Supply Chain Risk Management and National Security”, Shannon Garcia
“Elevating Your Application Security Program”
March 20, 2024, Philip Plantamura, "Security Onion: Peel Back the Layers of Your Enterprise”, Keith Deininger
“Developing and Executing an Effective Third-Party Risk Management Program”
April 2, 2024, Joy Toney
“The Value of Security Culture”, Derrick Sturisky, "Quantum Cybersecurity"
April 17, 2024, Collin Parker
“Product Security and PSIRTs”, Kent Bryan
“What is Web Cloud Filtering”
2023
February 8, 2023, Brian Albertson, State Farm, "IT Risk Trends and Impact to Cybersecurity" and Ian Kahn, Children’s Healthcare of Atlanta, "Privileged Access Management – An Introduction"
February 21, 2023, Yosef Beck, Director of Security Architecture at IHG, "Vendor Requests for Proposals" and Chris Black, Warner Media, "SOAR: Automate All the SecOps Things"
March 15, 2023, Kyle Smith, Children’s Healthcare of Atlanta, "Cybersecurity as a Brand"
March 28, 2023, Ward Pyles, Kids2, "Starting your Career in Cyber Security, Not Just a Job" and Sethuraman Srinivas, "Enterprise Security Metrics - Relevance and Application"
April 4, 2023, Manhattan Associates, George Garza √, Director for Risk & Scott Perales ×, Director of Security Architecture Cloud Operations, "Securing the Cloud: Reports from the Field"
April 12, 2023, Dave Croasdell & Jim Elste, Cyberworkerz, "Cyber Teaching Hospitals and Cyber Clinics: Extending cybersecurity support to the community" and Patrick Sullivan, a-lign.com, "Importance of Professional Communication"
April 18, 2023, Greg Aitken, Intaso Inc., "Resume -> Applications -> Interview ->Job" and Chris Silvers, Industry Professional, "Freelance Cybersecurity Trends and Techniques"
2022
January 19, 2022, Jacob Lovell, Solutions Engineer at Akamai, "Containing the Breach: The Evolution of Microsegmentation"
February 2, 2022, Ben McInnis, Technical Marketing Engineer at Palo Alto Networks, "State of Cloud-native Security in 2022 and Nick Corn, Penetration Tester at CodeMettle, "Effective Communication to Executives for Cyber Security Professionals"
Wednesday, February 16, 20221, Ward Pyles at Kids2 and Christian Hyatt, CEO and Founder at risk3sixty, "The 5 CISO Archetypes"
Wednesday, March 2, 2022, Bernard Barnes, Client Executive at Kyndryl, Inc. -- State of Georgia SLED, "How to Sell Cybersecurity Services" and J. David Quilter, Coach and Author for Security Leaders, "How to Build a Smart Security Program"
Wednesday, March 16, 2022, Yosef Beck, Director of Security Architecture at IHG, "Cybersecurity as a Competitive Advantage" and Mike Rothman at Securosis, "Evolution of the SOC"
Wednesday, March 30, 2022, Zola Maswanganye, Information Security Engineer, "Who is responsible for Security" and Jade West, Cybersecurity Engineer at The Home Depot, "Essential API Security"
Wednesday, April 13, 2022, Keyaan Williams, Managing Director at Class-LLC, "Mastering Cybersecurity Metrics" and Anne-Marie Colombo at SAP America, "Zero Trust Without the Hype"
2021
Anne Marie Columbo, SAP America, Inc., Risk Management Framework Overview
Jack Healy, CPA, CFF, CFE, CRISC, Chief Executive Officer, Bear Hill Advisory Group, LLCCPA, Risk Management: Deep Thoughts and Better Results
Yosef Beck, Principal Security Architect, IHG, Network Security Monitoring: Process & Tools Overview
Alain Espinosa, Director of Security Operations, MSS at Online Business Systems, Preparing for your career in cybersecurity (from student to professional)
Michael Lockhart, Director of Compliance, Salesforce Mulesoft
Brian Albertson, AWSCCP, CDPSE, CRISC, ITIL, POPM, IT Control Management Product Owner, State Farm® IT Risk & Compliance, TBuilding Compliance Into Business Operations
Adam Kehler - Director, RSP Healthcare Services at Online Business Systems, Cybersecurity in Healthcare
Ward Pyles, KidsII Inc., Driving security teams to be more effective
Jacob Lovell, Akamai Technologies, Web Application Security at the Edge
Nat Prakongpan, Technical Director, X-Force Threat Intelligence and Cyber Range Lab, IBM Security, Ox Response, Incident Response Preparedness for Business
Chris Silvers, C G Silvers Consulting, Freelance Cybersecurity Trends and Techniques
Matthew Dobbs, Chief Integration Architect, X-Force Threat Intelligence and Integration Lab, IBM Security, Leveraging Zero Trust Architecture
Yosef Beck, Principal Security Architect, IHG
2020
David Allen, CISO, Georgia Technology Authority, Managing Cyber Risk for the Enterprise
David Anderson, Security Consultant, Akamai Technologies, Planning and Executing Continuity Plans
John Traino, CIO, Aaron, What it Takes to Innovate
Bob Varnadoe, CISO, NCR, Techniques for Detecting a Cyber Attack
Jacob Lovell, Solutions Engineer, Akamai Technologies, Third Party Scripts: Magecart & Other Threats
Adi Wong, Akamai Technologies, Cloud Security/Akamai 101
Phillip Mahan, Communicating Risk Appetite and Tolerance
Sasi Pulipaka, Risk Manager, Verizon, Data Privacy and Corporate Responsibility
Jeff Jones, Threat Hunter, Threat Intelligence Brief
Jacob Lovell, Technical Presales, Akamai Technologies, Incident Response
Mitch Moosbrugger, Regional Directory, CyberArk Software, The Challenges of Remote Vendor Access
Mike Rothman, President, Securosis, Advancing Cloud Security: The Next Phase
Tim Callahan, Global Chief Security Officer, Aflac, The Value of Threat Intelligence
2019
Phillip Mahan, Security & Compliance Manager, Calendly, I am the LAW: Statutory Compliance in Corporate Cyber Security
Tim O'Neal, Managing Criminal CYBER Investigations
Walter Tong, GTA, Cyber Intelligence Briefing
Jeff Jones, Industry Professional Technical Threat Brief
Mitch Moosberger, Cyberark
Alex Edwards, Engineer, Cisco
Joe Catron, Lead Automation Engineer, CelticQA Solutions
Clarence Daniels, Lead QA Engineer, CelticQA Solutions
Frank Rietta, Applying Agile and Security in Software Development
Philip Andreae, Payment Card Security
Dennis Kosmetatos, NCR, Business Value of Identity and Access Management
Tim O’Neill, Attacking the Internet of Things
Jack Healey, Bear Hill Advisory Group, Security and the Role of Risk Assessment
Alex Edwards, Cisco
Danny Wasserman, Akamai Technologies
Katie Greenfield, Senior Technical Recruiter, Brooksource
Dan Schroeder, Aprio, Information Assurance for Security and Compliance
Bill Morrison, McKesson, SecOps Management & Planning
Carlos Batista, BetterCloud, Software Security
Louis Kandel, Interviewing for Success, Retired IBM Executive
2018
Phillip Mahan, Ionic Security, Creating Effective Policy
Damien Suggs, Saltworks, Application Security
Dan Streuber, Cisco, Encrypted Traffic Analytics
James Blanton, Winter Olympics Cyber Threats
Jeff Jones, Threat Intelligence
Tim O’Neill, Security Professional
Preeti Ravinda, IBM Security, Watson for Cybersecurity.
Jeff Jones, Security Professional, Developing Threat Intelligence
Tim Cullen, Adapture, Introduction to Block Chain Technology
Anne Marie Colombo, SAP America, Enterprise Resource Planning
Katie Greenfield, Brooksource, Managing the Recruiting Process
Shekesa McLaurin, Macy’s, Information Systems and Entrepreneurship
Brian Albertson, State Farm, Staying Current in the Field
Ben Mcinnis, Cisco, Compliance Role in Incident Response
Scott Baker, The Coca-Cola Company, Data Loss Prevention
Ward Pyles, IHG, Preparing for your ISA Career
Andrew Hamilton, Cybiant, Do what works, not what’s flashy
Walter Tong, Georgia Technology Authority
Anne Marie Colombo, SAP America, SAP & Threat Intelligence
Summer
2021
Gordon Shenkle, Security Services Master Plan, June 2
Taiye Lambo, Governance Design, June 7
Yosef Beck, Policy Design, June 9
Jeff Jones, Security Operations Design, June 14
Debra Oglesby, Staffing Planning, June 16
Anne Marie Colombo, Risk Management Framework, June 21
Robert Roberts, Contingency Planning, June 23