Secure WV: Things That Keep You Up At Night – Track 2
Day - 01
10 26 25
|
Enhancing Cyber Defense Readiness with Satellite Digital Twins |
10:00 AM - 10:50 AM
|
|
---|---|---|---|
Day - 01
10 26 25
|
Phishwalker: How Hackers Evade Detection Like the Cryptids of Cyberspace |
11:00 AM - 11:50 AM
|
|
Day - 01
10 26 25
|
Lunch |
12:00 PM - 12:59 PM
|
Chris Griffin
|
Day - 01
10 26 25
|
Power Up Your Career Through Community and Public Learning |
1:00 PM - 1:50 PM
|
|
Day - 01
10 26 25
|
Lessons in Cyber Insecurity |
2:00 PM - 2:50 PM
|
|
Day - 01
10 26 25
|
The Recon Mixtape: Greatest Hits from Project Discovery |
3:00 PM - 3:50 PM
|
|
Day - 01
10 26 25
|
Building the Future IT Workforce Through Career Technical Education |
4:00 PM - 4:50 PM
|
|
Day - 02
10 27 25
|
An Old Hillbillys Guide to BASH for Pentests: Automating, Logging, and Covering your Butt |
10:00 AM - 10:50 AM
|
|
---|---|---|---|
Day - 02
10 27 25
|
What Keeps me up at Night? ... Lack of Security Controls! |
11:00 AM - 11:50 AM
|
|
Day - 02
10 27 25
|
Lunch |
12:00 PM - 12:59 PM
|
Chris Griffin
|
Day - 02
10 27 25
|
Superpowers in Action: How Neurodivergent Minds Excel in Cybersecurity |
1:00 PM - 1:50 PM
|
|
Day - 02
10 27 25
|
From Prompts to Purpose: Navigating Cybersecuirty in the Age of Agentic AI |
2:00 PM - 2:50 PM
|
|
Day - 02
10 27 25
|
How to Hack an Election |
3:00 PM - 3:50 PM
|
|
Day - 02
10 27 25
|
Why Do Security Professionals Keep Doing Things They See Don't Work |
4:00 PM - 4:50 PM
|
|
Secure WV: Things That Keep You Up At Night
Day - 02
10 25 25
|
|
8:45 AM - 9:00 AM
|
Joshua Marpet
|
---|---|---|---|
Day - 02
10 25 25
|
The Human + Machine Playbook: From Cyber Competitions to Real-World Security |
9:00 AM - 9:50 AM
|
|
Day - 02
10 25 25
|
The Drone Renaissance - The Attack Surface Now Includes the Sky |
10:00 AM - 10:50 AM
|
|
Day - 02
10 25 25
|
Cybersecurity & Leadership: The Opportunity & Growth vs The Problem & Vulnerability |
11:00 AM - 11:50 AM
|
|
Day - 02
10 25 25
|
Lunch |
12:00 PM - 12:59 PM
|
Joshua Marpet
|
Day - 02
10 25 25
|
AI Gets Turnt |
1:00 PM - 1:50 PM
|
|
Day - 02
10 25 25
|
Bootstrapping a Basic GRC Tool for Your Organization |
2:00 PM - 2:50 PM
|
|
Day - 02
10 25 25
|
CTF Ends |
3:00 PM -
|
|
Day - 02
10 25 25
|
Is your Printer Haunted and your Laptop Possessed? |
3:00 PM - 3:50 PM
|
|
Day - 02
10 25 25
|
Continuous Compliance & Multicellular Security |
4:00 PM - 4:50 PM
|
|
Secure WV: Wild & Weird West Virginia – Track 2
Day - 01
10 27 24
|
I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity |
11:00 AM - 11:50 AM
|
|
---|---|---|---|
Day - 01
10 27 24
|
Lunch |
12:00 PM - 12:59 PM
|
Joshua Gilliland
|
Day - 01
10 27 24
|
Who Goes There? Actively Detecting Intruders With Cyber Deception Tools |
1:00 PM - 1:50 PM
|
|
Day - 01
10 27 24
|
Zero to GRC Hero |
2:00 PM - 2:50 PM
|
|
Day - 01
10 27 24
|
Cyber Security Convergence, Where IT and OT meet |
3:00 PM - 3:50 PM
|
|
Day - 01
10 27 24
|
Cybersecurity Certifications: Is that the Question, Vulnerability, or Exploit? |
4:00 PM - 4:50 PM
|
|
Day - 02
10 28 24
|
Cyber Warzone: Establishing Your First Line of Digital Defense |
10:00 AM - 10:50 AM
|
|
---|---|---|---|
Day - 02
10 28 24
|
Introduction to Satellite Link Security Standards with CryptoLib |
11:00 AM - 11:50 AM
|
|
Day - 02
10 28 24
|
Lunch |
12:00 PM - 12:59 PM
|
Joshua Gilliland
|
Day - 02
10 28 24
|
Championing Security: Scaling Security At Every Level |
1:00 PM - 1:50 PM
|
|
Day - 02
10 28 24
|
Leveraging neurodiverse individuals to help fill the cyber skill shortage |
2:00 PM - 2:50 PM
|
|
Day - 02
10 28 24
|
What is Trust? |
3:00 PM - 3:50 PM
|
|
Day - 02
10 28 24
|
Comparing Machine Learning Algorithms for IoT Threat Detection and Prevention |
4:00 PM - 4:50 PM
|
|
Secure WV: Wild & Weird West Virginia
Day - 01
10 25 24
|
|
8:00 AM -
|
Ryan Ashley
|
---|---|---|---|
Day - 01
10 25 24
|
Speakers need to see Matthew Perry at the registration desk. |
9:00 AM -
|
Ryan Ashley
|
Day - 01
10 25 24
|
|
9:40 AM - 10:00 AM
|
Ryan Ashley
|
Day - 01
10 25 24
|
Don't Stop Believing on this Journey |
10:00 AM - 10:50 AM
|
|
Day - 01
10 25 24
|
AI, Cyber, and Where We Really Are |
11:00 AM - 11:50 AM
|
|
Day - 01
10 25 24
|
Lunch |
12:00 PM - 12:59 PM
|
Ryan Ashley
|
Day - 01
10 25 24
|
AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals |
1:00 PM - 1:50 PM
|
|
Day - 01
10 25 24
|
More Forensics Fun with Bash |
2:00 PM - 2:50 PM
|
|
Day - 01
10 25 24
|
Informing Your Security Roadmap with Threat Modeling |
3:00 PM - 3:50 PM
|
|
Day - 01
10 25 24
|
Essential Microsoft 365 Security Features Crash Course |
4:00 PM - 4:50 PM
|
|
Day - 02
10 26 24
|
|
8:40 AM - 9:00 AM
|
Ryan Ashley
|
---|---|---|---|
Day - 02
10 26 24
|
Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec |
9:00 AM - 9:50 AM
|
|
Day - 02
10 26 24
|
Amateur Radio 101 |
10:00 AM - 10:50 AM
|
|
Day - 02
10 26 24
|
What Texas Urban Legends Taught Me About Information Security |
11:00 AM - 11:50 AM
|
|
Day - 02
10 26 24
|
Lunch |
12:00 PM - 12:59 PM
|
Ryan Ashley
|
Day - 02
10 26 24
|
Become Digital Forensic SuperStar |
1:00 PM - 1:50 PM
|
|
Day - 02
10 26 24
|
Lies, Telephony, and Hacking History |
2:00 PM - 2:50 PM
|
|
Day - 02
10 26 24
|
Helping Our Children Thrive on the Internet |
3:00 PM - 3:50 PM
|
|
Day - 02
10 26 24
|
AI Enhanced Hacks: Model in the Middle |
4:00 PM - 4:50 PM
|
|
Secure WV: Reboot
Day - 01
10 20 23
|
Old McHacker Had a Tool: AI, AI, Oh! |
9:00AM - 10:45AM
|
|
---|
Day - 02
10 21 23
|
ELK |
11:00AM - 12:45PM
|
|
---|