2019 Presentations | 2023 National Cyber Summit
2023 National Cyber Summit

2019 Presentations

Presentation Presenter Location Date
Blockchain and Cryptocurrency Strategic Initiatives Jonathan Hard
Sonia Mundra
Von Braun Center - North Hall Salon 2 Wednesday 2:15 p.m. - 3:00 p.m.
Practical Regulatory-Focused DevSecOps Trevor Vaughan Von Braun Center - South Hall | Ballroom 2 Thursday 3:15 p.m. - 4:00 p.m.
Automated Compliance with the System Integrity Management Platform Trevor Vaughan Von Braun Center - South Hall | Stage 2 Wednesday 10:45 a.m. - 11:00 a.m.
True Cyber Crime Story: Blocking a Nation-State Attack Byron DeLoach Von Braun Center - South Hall | Ballroom 1 Wednesday 1:15 p.m. - 2:00 p.m.
Phishing Naked – Merging Big Data and Behavioral Risk Analysis to Demystify Phishing and Derive Actional Behavioral Risk Intelligence Joshua Crumbaugh Von Braun Center - North Hall | Salon 3 Wednesday 1:15 p.m. - 2:00 p.m.
UAV Assisted RF Spectrum Analysis Randall Cottrell Von Braun Center - North Hall Salon 2 Wednesday 3:15 p.m. - 4:00 p.m.
SS7 for INFOSEC Paul Coggin Von Braun Center - South Hall | Ballroom 1 Wednesday 2:15 p.m. - 3:00 p.m.
Rise of the Virtual CISO Greg Schaffer Von Braun Center - North Hall Salon 2 Wednesday 1:15 p.m. - 2:00 p.m.
Privacy Developments for the Security Professional Paige Boshell Von Braun Center - South Hall | Ballroom 2 Wednesday 3:15 p.m. - 4:00 p.m.
Cyber Securing ICS - Architecture-Based Approaches that Preserve Operational Integrity Chris Guo Ph.D. Von Braun Center - South Hall | Meeting Room 2 Wednesday 1:15 p.m. - 2:00 p.m.
Fact vs Fiction ICS Cyber Attacks Rob Lee
Getting Rural Students ExCIITED About Cybersecurity SueAnne Griffith Von Braun Center - South Hall | Stage 1 Wednesday 10:15 a.m. - 10:30 a.m.
Exploiting COM for Advanced Persistence Shawn Edwards
Sean Hopkins
Von Braun Center - North Hall | Salon 3 Thursday 2:15 p.m. - 3:00 p.m.
.NET Hacking and In-Memory Malware Shawn Edwards Von Braun Center - North Hall | Salon 3 Thursday 3:15 p.m. - 4:00 p.m.
Urban Engine Toni Eberhart Von Braun Center - South Hall | Stage 1 Wednesday 10:45 a.m. - 11:00 a.m.
Threat Hunting using Open Source Tools
Rita Edwards
Embassy Suites - Redstone Boardroom Tuesday 9:00 a.m. - 4:00 p.m.
4 Ways to Assess Device Integrity Robert Rounsavall Von Braun Center - North Hall Salon 2 Thursday 2:15 p.m. - 3:00 p.m.
RF Hacking an "Amazon's Choice" Security System Tom Sutherland
Hans Schantz
Jake Schneider
Von Braun Center - North Hall | Salon 3 Wednesday 4:15 p.m. - 5:00 p.m.
The Cyber Challenge - Keeping Skills Up to Date Peter Weishaar Von Braun Center - South Hall | Stage 2 Thursday 2:30 p.m. - 2:45 p.m.
Agile Cybersecurity Education: Evolving Demands in the Cyber Landscape Dr. David Schippers Von Braun Center - South Hall | Meeting Room 2 Thursday 1:15 p.m. - 2:00 p.m.


Using Threat Intelligence to Augment your SOC Security Stack Eric Monterastelli Von Braun Center - South Hall | Stage 2 Wednesday 1:30 p.m. - 1:45 p.m.
Plant Floor Cybersecurity Challenges Chris McLain Von Braun Center - South Hall | Stage 1 Thursday 3:15 p.m. - 4:00 p.m.
Cybersecurity Breach Trends Jason Asbury Von Braun Center - South Hall | Stage 2 Wednesday 4:00 p.m. - 4:15 p.m.
Redstone Test Center’s Weapon Centric Cyber Test Capability David Elkins Von Braun Center - South Hall | Meeting Room 2 Wednesday 4:15 p.m. - 5:00 p.m.
Keynote Presentation by Naomi Lefkovitz Naomi Lefkovitz Von Braun Center - North Hall 2-3 Thursday 11:45 a.m. - 1:00 p.m.
Keynote Presentation by Vicki Michetti Vicki Michetti Von Braun Center - South Hall | Ballroom 3 - 5 Thursday 9:00 a.m. - 9:45 a.m.
Secure and Assured Client to Cloud Solution Thomas Proue
Robby Ann Carter
Von Braun Center - South Hall | Stage 1 Wednesday 1:30 p.m. - 1:45 p.m.
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level Adam Alexander
Paul Graham
Eric Jackson
Bryant Johnson
Jaehong Park
Tania Williams
Von Braun Center - North Hall | Salon 1A Wednesday 3:15 p.m. - 3:35 p.m.




Improving the Efficiency of a Cyber Competition through Data Analysis Steven Day
Amanda Joyce
Von Braun Center - North Hall | Salon 1A Wednesday 4:15 p.m. - 4:35 p.m.
Developing and Implementing a Cybersecurity Course for Middle School Hillary Fleenor
Dr. Yesem Kurt Peker
Von Braun Center - North Hall | Salon 1A Thursday 1:15 p.m. - 1:35 p.m.
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions Bradford Love
Dan Kim
Sanghun Kim
Von Braun Center - North Hall | Salon 1A Thursday 1:35 p.m. - 2:00 p.m.
A Cloud Based Sandbox Entitlement Granting Engine Austin Cottrill
David Krovich
Daniel Mancini
Von Braun Center - North Hall | Salon 1A Thursday 2:15 p.m. - 2:35 p.m.
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory-based Mitigation Approach Professor Kim-Kwang Raymond Choo
Alan Roder
Von Braun Center - North Hall | Salon 1B Wednesday 2:15 p.m. - 2:35 p.m.
Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems SueAnne Griffith
Thomas Morris
Von Braun Center - North Hall | Salon 1B Wednesday 2:35 p.m. - 3:00 p.m.
An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units Xin Wang
Wei Zhang
Von Braun Center - North Hall | Salon 1B Wednesday 3:15 p.m. - 3:35 p.m.
A Specification-Based Intrusion Prevention System for Malicious Payloads Thomas Morris
Aaron Werth
Von Braun Center - North Hall | Salon 1B Wednesday 4:15 p.m. - 4:35 p.m.

Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks Rajendra Boppana
Rajasekhar Chaganti
Vasudha Vedula
Von Braun Center - North Hall | Salon 1B Wednesday 4:35 p.m. - 5:00 p.m.
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments Enis Golaszewski
Geoffrey Herman
Spencer Offenberger
Linda Oliva
Peter Peterson
Travis Scheponik
Alan Sherman
Von Braun Center - North Hall | Salon 1B Thursday 1:15 p.m. - 1:35 p.m.
Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM Michael Anderson
Letha Etzkorn
Mohammad Shojaeshafiei
Von Braun Center - North Hall | Salon 1B Thursday 2:35 p.m. - 3:00 p.m.
The impossibility of Security in I.A.M. Without Knowledge Based Input Steven Bryant Von Braun Center - South Hall | Stage 2 Wednesday 3:45 p.m. - 4:00 p.m.
SADD: Scalable Anonymous Disposable Desktops Desmond Jackson Von Braun Center - South Hall | Stage 1 Thursday 2:30 p.m. - 3:00 p.m.
Stopping The Click - How PeopleSec's AI Driven Security Awareness Training can Stop Phish Clicks Joshua Crumbaugh Von Braun Center - South Hall | Stage 1 Thursday 10:15 a.m. - 10:30 a.m.
How to Build a World-Class Cybersecurity Program in the Face of Continuously Evolving Threats and a Cyber Talent Shortage Jerry Jenkins Von Braun Center - South Hall | Stage 2 Wednesday 4:15 p.m. - 4:30 p.m.
Healthcare as a Cyber-Contested Environment Jeremy Blevins Von Braun Center - South Hall | Stage 1 Wednesday 4:15 p.m. - 4:30 p.m.