2021 National Cyber Summit
The NCS planning committee has been faced with making difficult decisions as it pertains to the 2021 event. It is our ultimate goal to produce an in-person event. Therefore, we are excited to announce that the Summit will take place on September 28-30, 2021. We will continue to monitor COVID-19 conditions and take necessary action if needed to transition to a hybrid or virtual format.
skip navigation

2019 Presentations

Presentation Presenter Location Date
Blockchain and Cryptocurrency Strategic Initiatives Jonathan Hard
Sonia Mundra
Von Braun Center - North Hall Salon 2 Wednesday 2:15 p.m. - 3:00 p.m.
Practical Regulatory-Focused DevSecOps Trevor Vaughan Von Braun Center - South Hall | Ballroom 2 Thursday 3:15 p.m. - 4:00 p.m.
Automated Compliance with the System Integrity Management Platform Trevor Vaughan Von Braun Center - South Hall | Stage 2 Wednesday 10:45 a.m. - 11:00 a.m.
True Cyber Crime Story: Blocking a Nation-State Attack Byron DeLoach Von Braun Center - South Hall | Ballroom 1 Wednesday 1:15 p.m. - 2:00 p.m.
Phishing Naked – Merging Big Data and Behavioral Risk Analysis to Demystify Phishing and Derive Actional Behavioral Risk Intelligence Joshua Crumbaugh Von Braun Center - North Hall | Salon 3 Wednesday 1:15 p.m. - 2:00 p.m.
UAV Assisted RF Spectrum Analysis Randall Cottrell Von Braun Center - North Hall Salon 2 Wednesday 3:15 p.m. - 4:00 p.m.
SS7 for INFOSEC Paul Coggin Von Braun Center - South Hall | Ballroom 1 Wednesday 2:15 p.m. - 3:00 p.m.
Rise of the Virtual CISO Greg Schaffer Von Braun Center - North Hall Salon 2 Wednesday 1:15 p.m. - 2:00 p.m.
Privacy Developments for the Security Professional Paige Boshell Von Braun Center - South Hall | Ballroom 2 Wednesday 3:15 p.m. - 4:00 p.m.
Cyber Securing ICS - Architecture-Based Approaches that Preserve Operational Integrity Chris Guo Ph.D. Von Braun Center - South Hall | Meeting Room 2 Wednesday 1:15 p.m. - 2:00 p.m.
Fact vs Fiction ICS Cyber Attacks Rob Lee
Getting Rural Students ExCIITED About Cybersecurity SueAnne Griffith Von Braun Center - South Hall | Stage 1 Wednesday 10:15 a.m. - 10:30 a.m.
Exploiting COM for Advanced Persistence Shawn Edwards
Sean Hopkins
Von Braun Center - North Hall | Salon 3 Thursday 2:15 p.m. - 3:00 p.m.
.NET Hacking and In-Memory Malware Shawn Edwards Von Braun Center - North Hall | Salon 3 Thursday 3:15 p.m. - 4:00 p.m.
Urban Engine Toni Eberhart Von Braun Center - South Hall | Stage 1 Wednesday 10:45 a.m. - 11:00 a.m.
Threat Hunting using Open Source Tools
Rita Edwards
Embassy Suites - Redstone Boardroom Tuesday 9:00 a.m. - 4:00 p.m.
4 Ways to Assess Device Integrity Robert Rounsavall Von Braun Center - North Hall Salon 2 Thursday 2:15 p.m. - 3:00 p.m.
RF Hacking an "Amazon's Choice" Security System Tom Sutherland
Hans Schantz
Jake Schneider
Von Braun Center - North Hall | Salon 3 Wednesday 4:15 p.m. - 5:00 p.m.
The Cyber Challenge - Keeping Skills Up to Date Peter Weishaar Von Braun Center - South Hall | Stage 2 Thursday 2:30 p.m. - 2:45 p.m.
Agile Cybersecurity Education: Evolving Demands in the Cyber Landscape Dr. David Schippers Von Braun Center - South Hall | Meeting Room 2 Thursday 1:15 p.m. - 2:00 p.m.


Using Threat Intelligence to Augment your SOC Security Stack Eric Monterastelli Von Braun Center - South Hall | Stage 2 Wednesday 1:30 p.m. - 1:45 p.m.
Plant Floor Cybersecurity Challenges Chris McLain Von Braun Center - South Hall | Stage 1 Thursday 3:15 p.m. - 4:00 p.m.
Cybersecurity Breach Trends Jason Asbury Von Braun Center - South Hall | Stage 2 Wednesday 4:00 p.m. - 4:15 p.m.
Redstone Test Center’s Weapon Centric Cyber Test Capability David Elkins Von Braun Center - South Hall | Meeting Room 2 Wednesday 4:15 p.m. - 5:00 p.m.
Keynote Presentation by Naomi Lefkovitz Naomi Lefkovitz Von Braun Center - North Hall 2-3 Thursday 11:45 a.m. - 1:00 p.m.
Keynote Presentation by Vicki Michetti Vicki Michetti Von Braun Center - South Hall | Ballroom 3 - 5 Thursday 9:00 a.m. - 9:45 a.m.
Secure and Assured Client to Cloud Solution Thomas Proue
Robby Ann Carter
Von Braun Center - South Hall | Stage 1 Wednesday 1:30 p.m. - 1:45 p.m.
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level Adam Alexander
Paul Graham
Eric Jackson
Bryant Johnson
Jaehong Park
Tania Williams
Von Braun Center - North Hall | Salon 1A Wednesday 3:15 p.m. - 3:35 p.m.




Improving the Efficiency of a Cyber Competition through Data Analysis Steven Day
Amanda Joyce
Von Braun Center - North Hall | Salon 1A Wednesday 4:15 p.m. - 4:35 p.m.
Developing and Implementing a Cybersecurity Course for Middle School Hillary Fleenor
Dr. Yesem Kurt Peker
Von Braun Center - North Hall | Salon 1A Thursday 1:15 p.m. - 1:35 p.m.
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions Bradford Love
Dan Kim
Sanghun Kim
Von Braun Center - North Hall | Salon 1A Thursday 1:35 p.m. - 2:00 p.m.
A Cloud Based Sandbox Entitlement Granting Engine Austin Cottrill
David Krovich
Daniel Mancini
Von Braun Center - North Hall | Salon 1A Thursday 2:15 p.m. - 2:35 p.m.
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory-based Mitigation Approach Professor Kim-Kwang Raymond Choo
Alan Roder
Von Braun Center - North Hall | Salon 1B Wednesday 2:15 p.m. - 2:35 p.m.
Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems SueAnne Griffith
Thomas Morris
Von Braun Center - North Hall | Salon 1B Wednesday 2:35 p.m. - 3:00 p.m.
An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units Xin Wang
Wei Zhang
Von Braun Center - North Hall | Salon 1B Wednesday 3:15 p.m. - 3:35 p.m.
A Specification-Based Intrusion Prevention System for Malicious Payloads Thomas Morris
Aaron Werth
Von Braun Center - North Hall | Salon 1B Wednesday 4:15 p.m. - 4:35 p.m.

Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks Rajendra Boppana
Rajasekhar Chaganti
Vasudha Vedula
Von Braun Center - North Hall | Salon 1B Wednesday 4:35 p.m. - 5:00 p.m.
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments Enis Golaszewski
Geoffrey Herman
Spencer Offenberger
Linda Oliva
Peter Peterson
Travis Scheponik
Alan Sherman
Von Braun Center - North Hall | Salon 1B Thursday 1:15 p.m. - 1:35 p.m.
Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM Michael Anderson
Letha Etzkorn
Mohammad Shojaeshafiei
Von Braun Center - North Hall | Salon 1B Thursday 2:35 p.m. - 3:00 p.m.
The impossibility of Security in I.A.M. Without Knowledge Based Input Steven Bryant Von Braun Center - South Hall | Stage 2 Wednesday 3:45 p.m. - 4:00 p.m.
SADD: Scalable Anonymous Disposable Desktops Desmond Jackson Von Braun Center - South Hall | Stage 1 Thursday 2:30 p.m. - 3:00 p.m.
Stopping The Click - How PeopleSec's AI Driven Security Awareness Training can Stop Phish Clicks Joshua Crumbaugh Von Braun Center - South Hall | Stage 1 Thursday 10:15 a.m. - 10:30 a.m.
How to Build a World-Class Cybersecurity Program in the Face of Continuously Evolving Threats and a Cyber Talent Shortage Jerry Jenkins Von Braun Center - South Hall | Stage 2 Wednesday 4:15 p.m. - 4:30 p.m.
Healthcare as a Cyber-Contested Environment Jeremy Blevins Von Braun Center - South Hall | Stage 1 Wednesday 4:15 p.m. - 4:30 p.m.