top of page
2025_background.png

2025
4th Annual.

North Carolina Cybersecurity Symposium

 

Speakers wall

KEYNOTE SPEAKERS

vecteezy_white-gray-background-with-beautiful-stars-sparkle-made-from_10742703.jpg

JEFF CRUME

IBM Distinguished Engineer, CTO IBM Security - Americas, NCSU Assistant Teaching Professor

​

2/20

THURSDAY

Lunchtime

Maria Thompson

AWS SLG Executive Government Advisor

​

​

​

2/20

THURSDAY

AFTERNOON

The Intersection of Cybersecurity and AI: How to Make It Work

Deepfakes and Synthetic Reality: Blurring the Lines

MariaThompson_edited.jpg

DAY ONE SESSIONS

​​

• The Role of Community Colleges and Certifications in Building a Skilled Cyber Workforce

– Dr. Al Leaston - Durham Technical Community College

• Beyond IT: Introduction to Information Security Governance. Elevating Information Security

– David Rankin - DBR Cybersecurity, LLC

• Building On Success: What’s the Future of Open Source?

– Ruth Suehle - SAS

IoT Security Unlocked: Strategies to Defend using MITRE Framework

– Krishna Chaitanya Rudraraju - Microsoft

• Godfather Security: How Security Can Make an Offer that Development Can't Refuse

– Larry Maccherone - Contrast

• The Paradox of Secure and Private By Design

– Chris Romeo - Kerr Ventures

• Forging Ahead in Cybersecurity: Vision, Diversity, and the Power of Purpose

– Stanford Oliver - Camelot Secure

• The New Frontier: AI Vulnerabilities and Their Impact on Security Response

– Lisa Bradley - Dell, Josh Dembling - Intel

• Quantifying Cyber Risk & Elevating Your Cyber Program

– Jon Sternstein - Stern Security

• Advanced Techniques for Securing Modern Applications

– Eric Hart - MetLife

•The Power of Your Data: Turning Metadata into Actionable Fraud Insights

– Chad Rychlewski - Accenture

• Guardians of the Neural Network: Safeguarding AI Training Environments

– Sushma Mahadevaswamy - Cisco

• The Importance of CREATIVE LEADERSHIP

– Mardecia Bell, Donna Petherbridge, Jennifer Domnick, Jill Sexton - NC State University

• Actions Speak Louder Than Passwords

– Michael Roman - OOKOS

• The 5 Stages of Cyber Grief

– Tom Scott - CyberSherpas

• Open Source Intelligence (OSINT)

– Samuel Carter, Amir Lawrence - Friday Institute

• "Ethical Considerations in AI Development for Cybersecurity"

– Anthony Gitalado - Entrepreneur

• Breach Happens! What’s Next? – Intro to Digital Forensics, Evidence Gathering, and Incident Response

– Lisa Cook, Luke Stephens - SAS

• Proactive Software Supply Chain Risk Management

– Dr. Laurie Williams - NC State University

bottom of page