Schedule

Day 1 Schedule

08:00am-09:30am: Registration/Breakfast

Location: David Student Union Ballroom/Lobby

Start your day by checking in at our registration desk. Our friendly team will be on hand to assist you with any queries, provide conference materials, and ensure a smooth start to your experience.

08:45am-09:00am: opening remarks

Speaker: Jonathan Kaufman, Cyberforge Committee Chair and Jacob Slone, CVCSA President

Location: David Student Union Ballroom

Be greeted by our distinguished host who will officially welcome you to the conference. Gain insights into the overarching theme and objectives that shape the day's proceedings.

09:00am-09:50am: opening Keynote

Title: The Real NCIS: Mission/Functions & Cybercrime Case Study

Speaker: Cliff Everton

Location: David Student Union Ballroom

Within the Department of the Navy, the Naval Criminal Investigative Service (NCIS) is the civilian federal law enforcement agency uniquely responsible for investigating felony crime, preventing terrorism and protecting secrets for the Navy and Marine Corps.

NCIS defeats threats from across the foreign intelligence, terrorist and criminal spectrum by conducting operations and investigations ashore, afloat, and in cyberspace, in order to protect and preserve the superiority of the Navy and Marine Corps warfighters.

Comprised of approximately 2,400 personnel, with more than 1,250 serving as Special Agents, NCIS operates globally in approximately 191 locations, in more than 41 countries. NCIS also conducts protective service operations for senior naval officials and visiting dignitaries. NCIS Executive Assistant Director (EAD) Clifton Everton, NCIS Global & Atlantic Operations, will brief the mission and functions of NCIS. Additionally, EAD Everton will highlight the diverse career opportunities with NCIS to include Special Agents, analysts, investigators, cyber specialists, computer scientists, forensics examiners and honors internships.

EAD Laukik Suthar, NCIS Cyber Directorate, will detail a case study on NCIS’s Redline investigation with the Department of Justice. NCIS, the FBI and other national and international law enforcement partners collaborated on Operation Magnus to disrupt the RedLine and META Infostealers, seizing domains, servers, and Telegram accounts used to steal sensitive data from millions of victims worldwide. A criminal complaint was also unsealed against Maxim Rudometov, a key developer of RedLine, charging him with fraud, conspiracy, and money laundering.

09:50am-10:00am: Break

Location: David Student Union Ballroom Lobby

Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.

10:00am-10:50am: Session 1a

Title: Finding Your Way in Cybersecurity: A Personal Journey

Speaker: Sebastien Arseneault

Location: David Student Union Ballroom

In this presentation I will be highlighting my journey into the world of "cybersecurity" and how I was able to find a path that resonated with me. It can be a lot when you are first starting out, it feels as if you have been thrown to the wolves. But rest assure, I will aim to tackle the same questions I once had. The goal of this presentation is to give a simple approach to the different career paths one can take in this constant evolving field. I will cover different topics such as Offensive Security, Defensive Security, GRC, Computer Science Versus Computer Engineering, and ultimately what it takes to find a solid footing in this field. I will also aim to answer questions like: Do I need a degree? What is the earning potential? Do I need to know how to code?, etc...

10:00am-10:50am: Session 1b

Title: Career Workshop

Speaker: Karen Etulle

Location: TBD

Navigating the job market in cybersecurity can feel like trying to find your way through a digital maze. But what if you had a guide? That's where "Winning Strategies for Cybersecurity Interviews" comes in. It is led by Karen Ann Etulle, a seasoned professional not only in the cybersecurity landscape but also in the public, private, and international sectors. This workshop will help enhance your skills in the interview process for cybersecurity roles across the board.

In just less than an hour, we'll dive into everything from crafting your cybersecurity resume with a punch to answering those tricky interview questions that always seem to come up. We're talking about real, actionable strategies that you can use to showcase your skills, experience, and passion for cybersecurity.


What You'll Learn:

• The ins and outs of cybersecurity interviews. 

• Quick tips for making your resume pop into a pile of cybersecurity hopefuls.

• How to sell your tech skills and projects in interviews in a way that's both genuine and impressive.

• Strategies for tackling both the expected and the curveball questions in interviews like the Case Base, Technical, Behavioral, Cybersecurity, and “Microsoft” questions.

• Practice makes perfect: participate in our mock interview activity and get feedback right on the spot.


10:00am-10:50am: Session 1C

Title: Network Traffic Analysis Using Security Onion​

Speaker: Owen Tremblay

Location: TBD

The presentation will cover the role of network traffic analysis in safeguarding data systems. It will explore various facets of defensive cyber operations, emphasizing the integration of cyber threat intelligence, Security Information and Event Management (SIEM) systems, and tools like Security Onion to detect, analyze, and mitigate malicious cyber activity. Through a combination of a short powerpoint presentation and a practical application exercise, students will gain an introductory understanding of network traffic investigations. The powerpoint will include a short discussion about the role of cyber threat intelligence in identifying adversarial tactics, techniques, and procedures. Students will learn how SIEM platforms aggregate and analyze data to provide real-time alerts and actionable insights into potential threats. The presentation, demo, and short lab will focus on using Security Onion for intrusion detection, network traffic analysis, and threat hunting. The hands-on demo and lab will allow students to log into a Security Onion interface to hunt for malicious network traffic in a controlled environment. This interactive exercise will showcase key features such as alert management, packet capture analysis, and visualization dashboards. Participants will experience firsthand how to identify suspicious patterns, investigate anomalies, and respond to potential intrusions. Students will gain foundational knowledge about deploying robust network defense mechanisms that should assist them as they progress in their cybersecurity careers.

10:50am-11:00am: Break

Location: David Student Union Lobby

Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.

11:00am-11:50am: Session 2A

Title: Red Team Rising: Breaking Into Offensive Security - A Guide for Career Changers and New Entrants

Speaker: Steve Campbell

Location: David Student Union Ballroom

The field of offensive security offers exciting opportunities, but breaking into this career can be challenging, especially in today's competitive job market. This presentation aims to equip aspiring offensive security professionals with practical strategies to overcome these barriers and launch successful careers.

Drawing from personal experience as a career changer who became a Technical Lead in a large pentesting and red teaming group, the presenter will share insights gained from both sides of the hiring process. Attendees will learn:


Whether you're considering a career change or just starting in cybersecurity, this presentation will provide you with actionable advice to accelerate your journey into offensive security roles.

11:00am-11:50am: Session 2B

Title: WhiteRabbitNeo: Augmenting the Cybersecurity Student Experience with AI

Speaker: Bailey Williams

Location: TBD

No one expects university courses to prepare cybersecurity students for everything they will encounter in their careers, but university education especially struggles with teaching hands-on skills traditionally learned on the job with a mentor. 

Unfortunately, these days Cybersecurity is not a beginner-friendly industry, and finding a mentor in the field is not accessible to most students. In this talk, I will explain how students can use WhiteRabbitNeo, an open-source, uncensored AI model trained on red team and offensive cybersecurity data, to enhance their cybersecurity knowledge–and especially build hands-on skills by pair hacking with it for CTFs and Bug Bounty programs.

Since contributing to the open-source project, I have used WhiteRabbitNeo to work through problems the way I would with a mentor. It has distilled complex information into simple concepts and explained them with increasing complexity until I understood them. It has also helped me break down CTF problems when I am stuck. I will show you how to use it to support you in CTF challenges and more.

11:00am-11:50am: Session 2C

Title: Deloitte

Speaker: Rodney Hopkins

Location: TBD

There is a global shortage of cybersecurity professionals, with millions of unfilled jobs. This is due to a growing need to protect systems and a lack of skilled workers. 

According to a 2024 study undertaken by the National Center for Science and Engineering Statistics (NCSES) reports from CyberSeek and ISC2 in 2023 came to similar estimates of the size of the existing workforce and workforce gap: between 1,180,000 and 1,340,000 current cybersecurity workers and between 480,000 and 570,000 unfilled cybersecurity jobs in the United States.

Key issues 

To pursue a career in cybersecurity, you should: gain a solid foundation in computer systems and networks, develop skills in areas like programming, risk management, and information security, pursue degrees in computer science, information assurance, and cybersecurity and earn relevant certifications like ISC2 CISSP, CompTIA Security+, and seek practical experience through internships or entry-level roles; continuously update your knowledge as the field evolves, demonstrating strong analytical and problem-solving abilities are crucial. 

11:50am-01:00pm: Lunch

Location: Lobby/Rooms

Take a breather and rejuvenate during lunch. Use this time to enjoy lunch, network with participants and sponsor representatives, and speakers.

01:00pm-01:50pm: Session 3A

Title: Build Your Legacy In Cybersecurity

Speaker: Greg Tomchick

Location: David Student Union Ballroom

In an era where cybersecurity stands as one of the hottest and most impactful fields in the global economy, the opportunity to create your legacy has never been greater. Build Your Legacy in Cybersecurity is designed for passionate experts ready to take the leap into entrepreneurship and transform their skills into a meaningful business that protects their communities and empowers others.<br/><br/>Drawing from the principles of Greg Tomchick's award-winning course, Build Your Legacy in Cybersecurity, this session equips you with the mindset, strategies, and insights to establish yourself as a leader in this vital industry. Learn how to identify opportunities, align your business with a mission-driven purpose, and navigate the challenges of building a company that not only succeeds but leaves a lasting impact.<br/><br/>Whether you're just starting out or seeking to level up, this talk will inspire and guide you to build a legacy in cybersecurity that safeguards the present and shapes the future.

01:00pm-01:50pm: Session 3B

Title: TBD

Speaker: TBD

Location: TBD

Abstract Coming Soon.

01:00pm-01:50pm: Session 3C

Title: CTF Practice Session

Speaker: TBD

Location: TBD

Abstract Coming Soon...

01:50pm-02:00pm: Break

Location: Lobby

Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.

02:00pm-02:50pm: Panel Session

Title: TBD

Speakers:

Location: DSU Ballroom


Abstract Coming Soon...

02:50pm-03:00pm: Break

Location: Lobby

Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.

03:00pm-03:50pm: Closing Keynote

Title: TBD

Speaker: Darren Spencer

Location: David Student Union Ballroom

Abstract Coming Soon...

03:50pm-04:00pm: Closing Remarks

Speaker: Jonthan Kaufman, Cyberforge Committee Chair

Location: Auditorium

Gather one last time as we reflect on the day's highlights, express gratitude, and share insights gained from the diverse sessions and interactions.

Day 2 Schedule

08:00am-09:30am: Registration/Breakfast

Location: Lobby/Auditorium

Start your day by checking in at our registration desk. Our friendly team will be on hand to assist you with any queries, provide conference materials, and ensure a smooth start to your experience.

09:00am-09:30am: opening remarks

Speaker: Jonathan Kaufman, CyberForge Committee Chair; Jacob Slone, CVCSA President; Deloitte

Location: David Student Union Ballroom

Be greeted by our distinguished host who will officially welcome you to the conference. Gain insights into the overarching theme and objectives that shape the day's proceedings.

09:30am-10:00am: Team Preparation

Location: David Student Union Ballroom

Use this time to meet up with your team members to get set-up for the CTF competition. Staff will be on-hand to answer questions or concerns.

10:00am-03:00Pm: CTF Competition

Host: Meta CTF

Location: David Student Union Ballroom

Work with your team to solve the challenges for the chance to earn prizes. Staff will be available for questions.

12:00Pm-01:00pm: Lunch

Location: Lobby/David Student Union Ballroom

Take a breather and rejuvenate during lunch. Use this time to enjoy lunch, network with participants and sponsor representatives, and speakers.

03:00pm-03:15pm: Break

Location: Lobby/David Student Union Ballroom

Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.

03:15pm-04:00pm: Winner Annoucements

Location: David Student Union Ballroom

The spotlight is on as we announce and celebrate the winners of the CTF Competition Discover who has emerged victorious in the various categories, from top-performing teams in competitions to standout individuals who have showcased exceptional skills and contributions.

04:00pm-04:15pm: Closing Remarks

Speaker: Jonathan Kaufman, CyberForge Committee Chair; Jacob Slone, CVCSA President

Location: David Student Union Ballroom

Gather one last time as we reflect on the day's highlights, express gratitude, and share insights gained from the diverse sessions and interactions.