Tickets on sale now!
LESS THAN 100 TICKETS LEFT!!!
SecureWV is committed to keeping our small conference look and feel, so accordingly we will be limiting ticket sales to 400. Be sure to get yours before they run out!
Our Sponsors
Top-Shelf Sponsors
Edu Sponsors
Apply to be a Sponsor
Capture the Flag
CTF is BACK!!!! Check out the Details for how to prepare and what it will contain.
LockPick Lair
THERE WILL BE LOCKS! The Lockpick Village is a physical security demonstration and participation area. Learn about the vulnerabilities of various locking devices and practice on locks of various levels of difficulty to try it yourself.
Resume Workshop
HEY YOU! YOUR RESUME SUCKS! Is your resume not getting noticed? Let our resident expert give you real world tips and advice on your resume. Click above to Register!
Talk Schedule
Schedule is subject to change and maybe without notice.
Track One
Matt ScheurerDon't Stop Believing on this Journey |
Time Schedule10:00 AM - 10:50 AM |
RoomRoom 217-215 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
James McQuigganAI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 217-215 |
Philip PolstraMore Forensics Fun with Bash |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 217-215 |
Hudson BushInforming Your Security Roadmap with Threat Modeling |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 217-215 |
Karinne BessetteEssential Microsoft 365 security features crash course |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 217-215 |
Adam ComptonHillbilly Storytime: Fails, Fumbles, and Finding a My Way in InfoSec |
Time Schedule9:00 AM - 9:50 AM |
RoomRoom 217-215 |
Brandon CurnutteAmateur Radio 101 |
Time Schedule10:00 AM - 10:50 AM |
RoomRoom 217-215 |
Branden MillerWhat Texas Urban Legends Taught Me About Information Security |
Time Schedule11:00 AM - 11:50 AM |
RoomRoom 217-215 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
Tuan PhanBecome Digital Forensic SuperStar |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 217-215 |
Matt ScheurerLies, Telephony, and Hacking History |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 217-215 |
Shane McCombsHelping Our Children Thrive on the Internet |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 217-215 |
Ryan AshleyAI Enhanced Hacks: Model in the Middle |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 217-215 |
Track Two
Nick KellyI CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity |
Time Schedule11:00 AM - 11:50 AM |
RoomRoom 214-213 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
Dwayne McDanielWho Goes There? Actively Detecting Intruders With Cyber Deception Tools |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 214-213 |
Micah BrownZero to GRC Hero |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 214-213 |
Jody Ogle & Brad McGeeCyber Security Convergence, Where IT and OT meet |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 214-213 |
Adam BeattyCybersecurity Certifications: Is that the Question, Vulnerability, or Exploit? |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 214-213 |
Erich KronCyber Warzone: Establishing Your First Line of Digital Defense |
Time Schedule10:00 AM - 10:50 AM |
RoomRoom 214-213 |
D. Cody CutrightIntroduction to Satellite Link Security Standards with CryptoLib |
Time Schedule11:00 AM - 11:50 AM |
RoomRoom 214-213 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
Dwayne McDanielChampioning Security: Scaling Security At Every Level |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 214-213 |
Bill GardnerLeveraging neurodiverse individuals to help fill the cyber skill shortage |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 214-213 |
Chris GriffinWhat is Trust? |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 214-213 |
Joshua GillilandComparing Machine Learning Algorithms for IoT Threat Detection and Prevention |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 214-213 |