2025
4th Annual.
North Carolina Cybersecurity Symposium
Speakers wall
JEFF CRUME
IBM Distinguished Engineer, CTO IBM Security - Americas, NCSU Assistant Teaching Professor
​
2/20
THURSDAY
Lunchtime
Maria Thompson
AWS SLG Executive Government Advisor
​
​
​
2/20
THURSDAY
AFTERNOON
The Intersection of Cybersecurity and AI: How to Make It Work
Deepfakes and Synthetic Reality: Blurring the Lines
DAY ONE SESSIONS
​​
• The Role of Community Colleges and Certifications in Building a Skilled Cyber Workforce
– Dr. Al Leaston - Durham Technical Community College
• Beyond IT: Introduction to Information Security Governance. Elevating Information Security
– David Rankin - DBR Cybersecurity, LLC
• Building On Success: What’s the Future of Open Source?
– Ruth Suehle - SAS
• IoT Security Unlocked: Strategies to Defend using MITRE Framework
– Krishna Chaitanya Rudraraju - Microsoft
• Godfather Security: How Security Can Make an Offer that Development Can't Refuse
– Larry Maccherone - Contrast
• The Paradox of Secure and Private By Design
– Chris Romeo - Kerr Ventures
• Forging Ahead in Cybersecurity: Vision, Diversity, and the Power of Purpose
– Stanford Oliver - Camelot Secure
• The New Frontier: AI Vulnerabilities and Their Impact on Security Response
– Lisa Bradley - Dell, Josh Dembling - Intel
• Quantifying Cyber Risk & Elevating Your Cyber Program
– Jon Sternstein - Stern Security
• Advanced Techniques for Securing Modern Applications
– Eric Hart - MetLife
•The Power of Your Data: Turning Metadata into Actionable Fraud Insights
– Chad Rychlewski - Accenture
• Guardians of the Neural Network: Safeguarding AI Training Environments
– Sushma Mahadevaswamy - Cisco
• The Importance of CREATIVE LEADERSHIP
– Mardecia Bell, Donna Petherbridge, Jennifer Domnick, Jill Sexton - NC State University
• Actions Speak Louder Than Passwords
– Michael Roman - OOKOS
• The 5 Stages of Cyber Grief
– Tom Scott - CyberSherpas
• Open Source Intelligence (OSINT)
– Samuel Carter, Amir Lawrence - Friday Institute
• "Ethical Considerations in AI Development for Cybersecurity"
– Anthony Gitalado - Entrepreneur
• Breach Happens! What’s Next? – Intro to Digital Forensics, Evidence Gathering, and Incident Response
– Lisa Cook, Luke Stephens - SAS
• Proactive Software Supply Chain Risk Management
– Dr. Laurie Williams - NC State University