Spring 2025

Please note that the session will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation.

DATE ACCESS SPEAKERS
Wednesday, January 15

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: Herb Mattord

1.

Tuesday, January 28

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1.

Wednesday, February 12

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1. 

Tuesday, February 25

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1.
Wednesday, March 19

 

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1.

Tuesday April 1

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1.

Wednesday April 16

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Host: TBD

1.

Cybersecurity Speakers From Prior Sessions

Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with Kennesaw State University credentials:

    
    • January 17, Pete Smith, “Managing Threat Analysis”, Kyle Smith, “Cybersecurity as a Brand"

      January 30, 2024, Phillip Mahan, “How is a raven like a writing desk?”, Katherine Fithen, “Creating Effective Policy”

      February 14, 2024, Nia Luckey, “Leveraging Federal Compliance Best Practices To Protect AI Data”, Galina Shelest, “Art of Threat Modeling”

      February 27, 2024, Chris Silvers,
      “NIST SP 800-63”, Stephen Omorogbe,
      “Supply Chain Risk Management and National Security”, Shannon Garcia
      “Elevating Your Application Security Program”

      March 20, 2024, Philip Plantamura, "Security Onion: Peel Back the Layers of Your Enterprise”, Keith Deininger
      “Developing and Executing an Effective Third-Party Risk Management Program”

      April 2, 2024, Joy Toney
      “The Value of Security Culture”, Derrick Sturisky, "Quantum Cybersecurity"

      April 17, 2024, Collin Parker
      “Product Security and PSIRTs”, Kent Bryan
      “What is Web Cloud Filtering”

    • February 8, 2023, Brian Albertson, State Farm, "IT Risk Trends and Impact to Cybersecurity" and Ian Kahn, Children’s Healthcare of Atlanta, "Privileged Access Management – An Introduction

      February 21, 2023, Yosef Beck, Director of Security Architecture at IHG, "Vendor Requests for Proposals" and Chris Black, Warner Media, "SOAR: Automate All the SecOps Things

      March 15, 2023, Kyle Smith, Children’s Healthcare of Atlanta, "Cybersecurity as a Brand"

      March 28, 2023, Ward Pyles, Kids2, "Starting your Career in Cyber Security, Not Just a Job" and Sethuraman Srinivas, "Enterprise Security Metrics - Relevance and Application"

      April 4, 2023, Manhattan Associates, George Garza √, Director for Risk & Scott Perales ×, Director of Security Architecture Cloud Operations, "Securing the Cloud: Reports from the Field"

      April 12, 2023, Dave Croasdell & Jim Elste, Cyberworkerz, "Cyber Teaching Hospitals and Cyber Clinics: Extending cybersecurity support to the community" and Patrick Sullivan, a-lign.com, "Importance of Professional Communication"

      April 18, 2023, Greg Aitken, Intaso Inc., "Resume -> Applications -> Interview ->Job" and Chris Silvers, Industry Professional, "Freelance Cybersecurity Trends and Techniques

    • January 19, 2022, Jacob Lovell, Solutions Engineer at Akamai, "Containing the Breach: The Evolution of Microsegmentation"

      February 2, 2022, Ben McInnis, Technical Marketing Engineer at Palo Alto Networks, "State of Cloud-native Security in 2022 and Nick Corn, Penetration Tester at CodeMettle, "Effective Communication to Executives for Cyber Security Professionals"

      Wednesday, February 16, 20221, Ward Pyles at Kids2 and Christian Hyatt, CEO and Founder at risk3sixty, "The 5 CISO Archetypes"

      Wednesday, March 2, 2022, Bernard Barnes, Client Executive at Kyndryl, Inc. -- State of Georgia SLED, "How to Sell Cybersecurity Services" and J. David Quilter, Coach and Author for Security Leaders, "How to Build a Smart Security Program"

      Wednesday, March 16, 2022, Yosef Beck, Director of Security Architecture at IHG, "Cybersecurity as a Competitive Advantage" and Mike Rothman at Securosis, "Evolution of the SOC"

      Wednesday, March 30, 2022, Zola Maswanganye, Information Security Engineer, "Who is responsible for Security" and Jade West, Cybersecurity Engineer at The Home Depot, "Essential API Security"

      Wednesday, April 13, 2022, Keyaan Williams, Managing Director at Class-LLC, "Mastering Cybersecurity Metrics" and Anne-Marie Colombo at SAP America, "Zero Trust Without the Hype"

    • Anne Marie Columbo, SAP America, Inc., Risk Management Framework Overview

      Jack Healy, CPA, CFF, CFE, CRISC, Chief Executive Officer, Bear Hill Advisory Group, LLCCPA, Risk Management: Deep Thoughts and Better Results

      Yosef Beck, Principal Security Architect, IHG, Network Security Monitoring: Process & Tools Overview

      Alain Espinosa, Director of Security Operations, MSS at Online Business Systems, Preparing for your career in cybersecurity (from student to professional)

      Michael Lockhart, Director of Compliance, Salesforce Mulesoft

      Brian Albertson, AWSCCP, CDPSE, CRISC, ITIL, POPM, IT Control Management Product Owner, State Farm® IT Risk & Compliance, TBuilding Compliance Into Business Operations

      Adam Kehler - Director, RSP Healthcare Services at Online Business Systems, Cybersecurity in Healthcare

      Ward Pyles, KidsII Inc., Driving security teams to be more effective

      Jacob Lovell, Akamai Technologies, Web Application Security at the Edge

      Nat Prakongpan, Technical Director, X-Force Threat Intelligence and Cyber Range Lab, IBM Security, Ox Response, Incident Response Preparedness for Business

      Chris Silvers, C G Silvers Consulting, Freelance Cybersecurity Trends and Techniques

      Matthew Dobbs, Chief Integration Architect, X-Force Threat Intelligence and Integration Lab, IBM Security, Leveraging Zero Trust Architecture

      Yosef Beck, Principal Security Architect, IHG

    • David Allen, CISO, Georgia Technology Authority, Managing Cyber Risk for the Enterprise

      David Anderson, Security Consultant, Akamai Technologies, Planning and Executing Continuity Plans

      John Traino, CIO, Aaron, What it Takes to Innovate

      Bob Varnadoe, CISO, NCR, Techniques for Detecting a Cyber Attack

      Jacob Lovell, Solutions Engineer, Akamai Technologies, Third Party Scripts: Magecart & Other Threats

      Adi Wong, Akamai Technologies, Cloud Security/Akamai 101

      Phillip Mahan, Communicating Risk Appetite and Tolerance

      Sasi Pulipaka, Risk Manager, Verizon, Data Privacy and Corporate Responsibility

      Jeff Jones, Threat Hunter, Threat Intelligence Brief

      Jacob Lovell, Technical Presales, Akamai Technologies, Incident Response

      Mitch Moosbrugger, Regional Directory, CyberArk Software, The Challenges of Remote Vendor Access

      Mike Rothman, President, Securosis, Advancing Cloud Security: The Next Phase

      Tim Callahan, Global Chief Security Officer, Aflac, The Value of Threat Intelligence

    • Phillip Mahan, Security & Compliance Manager, Calendly, I am the LAW: Statutory Compliance in Corporate Cyber Security

      Tim O'Neal, Managing Criminal CYBER Investigations

      Walter Tong, GTA, Cyber Intelligence Briefing

      Jeff Jones, Industry Professional Technical Threat Brief

      Mitch Moosberger, Cyberark

      Alex Edwards, Engineer, Cisco

       Joe Catron, Lead Automation Engineer, CelticQA Solutions

      Clarence Daniels, Lead QA Engineer, CelticQA Solutions

      Frank Rietta, Applying Agile and Security in Software Development

      Philip Andreae, Payment Card Security

      Dennis Kosmetatos, NCR, Business Value of Identity and Access Management

      Tim O’Neill, Attacking the Internet of Things

      Jack Healey, Bear Hill Advisory Group, Security and the Role of Risk Assessment

      Alex Edwards, Cisco

      Danny Wasserman, Akamai Technologies

      Katie Greenfield, Senior Technical Recruiter, Brooksource

      Dan Schroeder, Aprio, Information Assurance for Security and Compliance

      Bill Morrison, McKesson, SecOps Management & Planning

      Carlos Batista, BetterCloud, Software Security

      Louis Kandel, Interviewing for Success, Retired IBM Executive

    • Phillip Mahan, Ionic Security, Creating Effective Policy

      Damien Suggs, Saltworks, Application Security

      Dan Streuber, Cisco, Encrypted Traffic Analytics

      James Blanton, Winter Olympics Cyber Threats

      Jeff Jones, Threat Intelligence

      Tim O’Neill, Security Professional

      Preeti Ravinda, IBM Security, Watson for Cybersecurity. 

      Jeff Jones, Security Professional, Developing Threat Intelligence

      Tim Cullen, Adapture, Introduction to Block Chain Technology 

      Anne Marie Colombo, SAP America, Enterprise Resource Planning

      Katie Greenfield, Brooksource, Managing the Recruiting Process

      Shekesa McLaurin, Macy’s, Information Systems and Entrepreneurship

      Brian Albertson, State Farm, Staying Current in the Field

      Ben Mcinnis, Cisco, Compliance Role in Incident Response

      Scott Baker, The Coca-Cola Company, Data Loss Prevention

      Ward Pyles, IHG, Preparing for your ISA Career 

      Andrew Hamilton, Cybiant, Do what works, not what’s flashy

      Walter Tong, Georgia Technology Authority

      Anne Marie Colombo, SAP America, SAP & Threat Intelligence

    • Gordon Shenkle, Security Services Master Plan, June 2

      Taiye Lambo, Governance Design, June 7

      Yosef Beck, Policy Design, June 9

      Jeff Jones, Security Operations Design, June 14

      Debra Oglesby, Staffing Planning, June 16

      Anne Marie Colombo, Risk Management Framework, June 21

      Robert Roberts, Contingency Planning, June 23