REGISTER NOW: Sponsors Exhibitors Attendees

Do You Have What It Takes

to Become A Cyber Sleuth?

The Women and Minorities in Cybersecurity Working Group, will host a half-day workshop on Tuesday, June 7th, from 12 Noon-4:30 pm at the Springhill Suites. The goal of the workshop is to contribute towards increasing the number of qualified cybersecurity workers produced by community colleges by targeting women and minorities in cybersecurity recruitment.

About 50 participants will attend the workshop. The participants are women and minorities: students currently enrolled in cybersecurity programs (including those participating in NSF SFS programs,) undecided majors from community colleges and 4-year institutions as well as graduate IT programs who have declared interest in cybersecurity, and role models currently working/practicing in Cybersecurity related fields. Student participants will be exposed to a wide range of practical aspects of cyber security through selected hands-on exercises. Students will also have the opportunity to interact with cybersecurity role models and to learn about cybersecurity professions, career paths and jobs, specific skills needed to be competent and the kind of problems the professionals solve on a daily basis.


This workshop will provide a great social networking/sharing opportunity for students from different institutions to form career-spanning relationships, thus helping build a community of support for aspiring cybersecurity professionals.

Faculty and students from the following universities will participate: Indiana University of  PA, Whatcom Community College, University of Alabama at Birmingham, University of South Alabama, Bowie State University, University of Albany, Dakota State University, Norfolk State University, Howard Community College, Ferris State University, University of California, Berkeley , Drexel University, Forsyth Technical Community College, Walden University, University of Georgia, Western Washington University, University of Illinois at Champaign-Urbana, Purdue University, University of South Carolina, Towson University, Harvey Mudd College, State University of New York at Albany, Walters State Community College, Walden University, Drexel University, and Community College of Allegheny County.


rose_shumbaRose Shumba, Ph.D

Dr. Rose Shumba is the Associate Vice-Dean for the Cybersecurity and Information Assurance Department and Program Chair for the Digital Forensics program at the University of Maryland University College. Before joining UMUC in June 2012, she was a Professor of Computer Science and Director of the Indiana University of Pennsylvania (IUP) NSA Institute of Information Assurance education.

carol_taylorCarol Taylor, Ph.D.

Dr. Carol Taylor is the department chair of the Computer Science Department at Eastern Washington University in Cheney, Washington. She has been with EWU for the past 9 years after earning her Masters and PhD in Computer Science (with security emphasis) from the University of Idaho. Dr. Taylor has taught undergraduate and graduate Computer Security courses as well as networking courses at both EWU and the University of Idaho. She has developed several security courses, including one in Digital Forensics, during her time at EWU and is currently tenured in the department.

rebecca_baceRebecca Bace

Becky Bace is an internationally recognized expert in network security and intrusion detection. She is Chief Strategist for the Center for Forensics, Information Technology and Security (CFITS) at the University of South Alabama, and President / CEO of Infidel, Inc. She has been honored as one of the most influential women in IT security on numerous occasions over the last decade (most recently as one of the “Five Most Influential Women in Security” by SC Magazine in 2014.) Before joining the University of South Alabama, Ms. Bace served as Technical VP of the Cyber Security Practice for In-Q-Tel, the investment arm of the U.S. Intelligence Community, Venture Consultant for Trident Capital, where she served as resident cyber security technologist, and as a program director and senior engineer for the National Security Agency.

Kkarlyn_barilovitsarlyn Barilovits, Ph.D.

Dr. Karlyn Barilovits has the following educational background: Ph.D. Computer Science University of Tennessee, MS Computer Science Clemson University, BS Computer Information Systems University of North Carolina at Asheville. Dr. Barilovits has worked as a programmer for NASA’s Jet Propulsion Laboratory and a system’s administrator. In addition, Dr. Barilovits has 25 years of teaching and leadership experience in higher education. Dr. Barilovits currently serves as Associate Dean for the School of Information Systems and Technology at Walden University as well as the Program Director for the Doctor of Information Technology program there.

corrine_sandeCorrinne Sande

Corrinne Sande, Whatcom Community College’s Computer Information Systems Program Coordinator, has extensive experience in the field of information security.

Ms. Sande is the Principal Investigator for Cyberwatch West, an NSF funded ATE center designed to develop security awareness, career pathways, professional development, and dissemination of best practices related to cybersecurity. For over seven years Ms. Sande has co-organized the Pacific Rim Regional Cyber Defense Competition with the University of Washington and Highline Community College. Through Ms. Sande’s efforts, WCC is a Center of Academic Excellence in Information Assurance Education (CAE2Y). Ms. Sande has also successfully co-administered a $2 million computer forensic/border grant. She holds several industry certifications including the SANS certified incident handler (GCIH) and Cisco Certified Network Professional (CCNP) certifications.

Deanne_WesleyDeanne Wesley, Ph.D.

Dr. Deanne Cranford-Wesley is Department Coordinator in the Information System Security Program at Forsyth Technical Community College. She is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She teaches Information System Security, Computer Forensics and Networking courses in the Business Information Technology Department. Dr. Cranford-Wesley has also presented at various conferences including The Colloquium Information System Security Education Conference, the CompTIA Educators Conference and the North Carolina Computer Instructor Conference (NCCIA).

rhett_hernandezLieutenant General Rhett Hernandez, USA (ret.)

Lieutenant General Rhett Hernandez retired in September, 2013, following 39 years of distinguished service in the United States Army. He led key organizational transformation initiatives for the Army during periods of significant crisis. His last active duty assignment was as the first Commander of Army Cyber Command (ARCYBER), where he was responsible for the daily operations, defense and risk management of all Army networks. He was also charged with conducting, as directed, the full range of cyberspace operations. In addition to building a cyber force of more than 17,000 people, he led the development of a wide range of concepts, plans and programs to minimize cyber risk and ensure Army operations. As the Army’s lead for all cyberspace activity, he was responsible for cyber doctrine, training, leader development, organization, materiel and people. He developed strategic direction, requirements and an acquisition approach for all cyberspace operations in the Army. Previously he served as the Deputy Chief of Staff, Army Operations; Chief, U.S. Military Training Mission, Saudi Arabia; and Commanding General, Human Resources Command.

linda_mccarthyLinda McCarthy

Linda McCarthy has 20 years of executive-level security experience, identifying market opportunities, developing solutions, consulting, social media outreach, professional services, sales, writing, publishing, and education. Her executive leadership positions include Sr Director of Internet Safety, Symantec, VP of Systems Engineering, Recourse Technologies, and Manager of Security R&D, Sun Microsystems. Under the Office of the CTO at Symantec, McCarthy researched and developed new business opportunities and funded new initiatives such as the Internet Security Threat Report, Symantec Press, and Symantec’s Safety Outreach for Teens initiative. After leaving Symantec and noting that every family needs access to internet security information, McCarthy began partnering with industry leaders like Microsoft and Facebook to make expert internet security content she developed available for free on their sites. By 2013 McCarthy’s books and guides were translated into nine languages and have been downloaded over 3 million times. Microsoft has donated over one million dollars of McCarthy’s eBooks to the public, including Digital Drama and An Online Reputation that Counts.

veda_woodsVeda Woods

Veda Woods serves as the International Consortium for Minority Cybersecurity Professionals’(ICMCP) Executive Director and is currently the Director for Cybersecurity, Resilience and Strategy for a global Fortune 500 financial firm. Before assuming her current roles, Veda was the Chief Information Security Officer and Deputy CIO for the Recovery Accountability and Transparency Board, an independent bi-partisan federal agency with an accountability mission to help identify fraud, waste and abuse of data related to the $840 billion stimulus bill and the spending oversight of Hurricane Sandy funds.

kate_tweedyKate Tweedy

Kate Tweedy began her career defending the DoD’s networks at the National Security Agency, recruited through Indiana University of Pennsylvania’s National Center of Academic Excellence program.  She then worked in the manufacturing and financial sectors gathering experience in a variety of areas including cryptography, vulnerability management, firewalls, intrusion detection and incident analysis. Currently, Kate manages the Cryptographic Services and Integration team at PNC Bank.  She earned her BS degree in MIS/Information Assurance from IUP and her MS degree in Computer Systems Management from UMUC.  Kate holds several certifications, including CISSP, GPEN and GFWC, and is working toward her EC-Council Certified Encryption Specialist certificate.

tina_williamsTina C. Williams

TCecure’s Founder and President, Tina C. Williams – Esq., CISSP, PMP, is a long-time participant in, and advocate of, the security and intelligence industry. She was a Meyerhoff Scholar and a University Scholar at the University of Maryland Baltimore County (UMBC), receiving a B.S. in Computer Science. Ms. Williams also holds a M.S. in Management from Rensselaer Polytechnic Institute, and a J.D. from the University Of Maryland School Of Law. In addition to her role as TCecure’s Founder and President, Ms. Williams is an Adjunct Instructor for UMBC’s Master of Professional Studies in Cybersecurity program, a member of the Maryland Bar, and a member of the NICE365 Industry Advisory Board of Directors.


brent_chapmanCPT Brent Chapman

CPT Brent Chapman is Chief Technology Officer, Army Element of the Defense Innovation Unit Experimental (DIUx) in Silicon Valley, California.  Prior to joining DIUx, he was a Research Scientist at the Army Cyber Institute and Instructor in the Department of Electrical Engineering and Computer Science at West Point.  A former Signals Intelligence Analyst and Network Engineer, he is currently a member of the United States Army Cyber branch. Brent has industry certifications in incident handling, computer forensics, and network security, and is also an Amateur Radio Technician Class licensee. He holds a BS from West Point and MS from Carnegie Mellon University, both in the fields of information technology and security.  A mixed-race professional of Indo- and Afro-Guyanese descent, Brent was active in the National Society of Black Engineers and Cultural Affairs Seminar while in college and is a current Association for Computing Machinery Professional Member.


ira_lacyIra Lacy

Ira Lacy is the Lead Cyber Security Instructor for the Huntsville City School System.  In addition to his teaching duties, he handles a wide array of duties critical to Huntsville’s celebrated Cyber Education program for 9-12th grade. Ira holds multiple industry-recognized certifications such as Cisco CCNP, CCNP Security, CCNA, CompTIA IT Fundamentals, Network+ and Security+.

Prior to teaching, Ira spent nearly 20 years as a Network Security Engineering contractor supporting NASA’s LAN, WAN, Data Center, and IT Security services, where he continues to be well-respected.


meera_subbaraoMeera Subbarao

Ms. Meera Subbarao is the Director of Secure Development Practice and also a Principal Consultant at Cigital who has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has worked with a number of Fortune 500 companies and various government organizations. Meera has overseen and performed secure code reviews, static analysis implementations, architectural risk analysis, secure design reviews and threat modeling of systems built from a few thousand lines of code to systems containing tens of millions of lines of code (Java, JEE, .Net, Rails, and C/C++). Meera has authored OWASP Top Ten, C# Defensive Programming, Java/JEE Defensive Programming classes taught by Cigital. She is a certified instructor in Architectural Risk Analysis, Threat Modeling, Defensive Programming Generic, Defensive Programming Java EE, and Defensive Programming C#.

Student Facilitators

elixabeth_hernandezElizabeth Hernandez

Elizabeth Hernandez is a non-traditional student, pursuing a Bachelor’s of Computer Science degree in cyber security with the University of Idaho. She also has a BFA in sculpture and two young children. She applies the processes of logical thought, executing to design principles, and understanding higher level interactions of systems to her current studies in cybersecurity, noting that these area all processes she first learned as a sculptor.

joshua_sherfieldJoshua Sherfield

Joshua Sherfield is a Computer Science Master’s student at Norfolk State University, having received his B.S. in Computer Sciences from Norfolk State in 2014. A native of West Chester, PA, he is slated to receive his M.S. in May, 2016.  After graduation, Joshua will work for Lawrence Livermore National Laboratory. His hobbies are tinkering with operating systems, casual bike riding, and playing video games.

Jinfang Xu

Jinfang Xu is pursuing a Masters degree in Computer Science with security focus, at the University of Alabama in Birmingham. She earned her first undergraduate and Master’s degrees in Veterinary Medicine, where she became interested in computing advances related to gene sequencing and associated bioinformatics topics. Her current technical interests include location provenance, ATM security, and application security design. Besides coding, she enjoys hiking and sci-fi movies.’

atimise_omobolanleAtimise Omobolanle

Bola Atimise is a junior at Dakota State University, majoring in Network and Security Administration. She earned her first degree in IT from the University of Phoenix, and has studied computer engineering at the New York Institute of Technology, where she earned industry certifications (CompTIA Networking and CCNA.) At this point she relocated to South Dakota to fulfill her goal of becoming a Network Security Engineer. She is currently employed as a Penetration Tester at CAHIT, a Health IT company affiliated with Dakota State University.

Contact information:




Be Sure to Visit Our Amazing Sponsors!

Booz Allen Hamilton
All Points

Brought to You By...