Schedule
Day 1 Schedule
08:00am-09:30am: Registration/Breakfast
Location: David Student Union Ballroom/Lobby
Start your day by checking in at our registration desk. Our friendly team will be on hand to assist you with any queries, provide conference materials, and ensure a smooth start to your experience.
08:45am-09:00am: opening remarks
Speaker: Jonathan Kaufman, Cyberforge Committee Chair and Jacob Slone, CVCSA President
Location: David Student Union Ballroom
Be greeted by our distinguished host who will officially welcome you to the conference. Gain insights into the overarching theme and objectives that shape the day's proceedings.
09:00am-09:50am: opening Keynote
Title: The Real NCIS: Mission/Functions & Cybercrime Case Study
Speaker: Cliff Everton
Location: David Student Union Ballroom
Within the Department of the Navy, the Naval Criminal Investigative Service (NCIS) is the civilian federal law enforcement agency uniquely responsible for investigating felony crime, preventing terrorism and protecting secrets for the Navy and Marine Corps.
NCIS defeats threats from across the foreign intelligence, terrorist and criminal spectrum by conducting operations and investigations ashore, afloat, and in cyberspace, in order to protect and preserve the superiority of the Navy and Marine Corps warfighters.
Comprised of approximately 2,400 personnel, with more than 1,250 serving as Special Agents, NCIS operates globally in approximately 191 locations, in more than 41 countries. NCIS also conducts protective service operations for senior naval officials and visiting dignitaries. NCIS Executive Assistant Director (EAD) Clifton Everton, NCIS Global & Atlantic Operations, will brief the mission and functions of NCIS. Additionally, EAD Everton will highlight the diverse career opportunities with NCIS to include Special Agents, analysts, investigators, cyber specialists, computer scientists, forensics examiners and honors internships.
EAD Laukik Suthar, NCIS Cyber Directorate, will detail a case study on NCIS’s Redline investigation with the Department of Justice. NCIS, the FBI and other national and international law enforcement partners collaborated on Operation Magnus to disrupt the RedLine and META Infostealers, seizing domains, servers, and Telegram accounts used to steal sensitive data from millions of victims worldwide. A criminal complaint was also unsealed against Maxim Rudometov, a key developer of RedLine, charging him with fraud, conspiracy, and money laundering.
09:50am-10:00am: Break
Location: David Student Union Ballroom Lobby
Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.
10:00am-10:50am: Session 1a
Title: Finding Your Way in Cybersecurity: A Personal Journey
Speaker: Sebastien Arseneault
Location: David Student Union Ballroom
In this presentation I will be highlighting my journey into the world of "cybersecurity" and how I was able to find a path that resonated with me. It can be a lot when you are first starting out, it feels as if you have been thrown to the wolves. But rest assure, I will aim to tackle the same questions I once had. The goal of this presentation is to give a simple approach to the different career paths one can take in this constant evolving field. I will cover different topics such as Offensive Security, Defensive Security, GRC, Computer Science Versus Computer Engineering, and ultimately what it takes to find a solid footing in this field. I will also aim to answer questions like: Do I need a degree? What is the earning potential? Do I need to know how to code?, etc...
10:00am-10:50am: Session 1b
Title: Career Workshop
Speaker: Karen Etulle
Location: TBD
Navigating the job market in cybersecurity can feel like trying to find your way through a digital maze. But what if you had a guide? That's where "Winning Strategies for Cybersecurity Interviews" comes in. It is led by Karen Ann Etulle, a seasoned professional not only in the cybersecurity landscape but also in the public, private, and international sectors. This workshop will help enhance your skills in the interview process for cybersecurity roles across the board.
In just less than an hour, we'll dive into everything from crafting your cybersecurity resume with a punch to answering those tricky interview questions that always seem to come up. We're talking about real, actionable strategies that you can use to showcase your skills, experience, and passion for cybersecurity.
What You'll Learn:
• The ins and outs of cybersecurity interviews.Â
• Quick tips for making your resume pop into a pile of cybersecurity hopefuls.
• How to sell your tech skills and projects in interviews in a way that's both genuine and impressive.
• Strategies for tackling both the expected and the curveball questions in interviews like the Case Base, Technical, Behavioral, Cybersecurity, and “Microsoft” questions.
• Practice makes perfect: participate in our mock interview activity and get feedback right on the spot.
10:00am-10:50am: Session 1C
Title: Network Traffic Analysis Using Security Onion​
Speaker: Owen Tremblay
Location: TBD
The presentation will cover the role of network traffic analysis in safeguarding data systems. It will explore various facets of defensive cyber operations, emphasizing the integration of cyber threat intelligence, Security Information and Event Management (SIEM) systems, and tools like Security Onion to detect, analyze, and mitigate malicious cyber activity. Through a combination of a short powerpoint presentation and a practical application exercise, students will gain an introductory understanding of network traffic investigations. The powerpoint will include a short discussion about the role of cyber threat intelligence in identifying adversarial tactics, techniques, and procedures. Students will learn how SIEM platforms aggregate and analyze data to provide real-time alerts and actionable insights into potential threats. The presentation, demo, and short lab will focus on using Security Onion for intrusion detection, network traffic analysis, and threat hunting. The hands-on demo and lab will allow students to log into a Security Onion interface to hunt for malicious network traffic in a controlled environment. This interactive exercise will showcase key features such as alert management, packet capture analysis, and visualization dashboards. Participants will experience firsthand how to identify suspicious patterns, investigate anomalies, and respond to potential intrusions. Students will gain foundational knowledge about deploying robust network defense mechanisms that should assist them as they progress in their cybersecurity careers.
10:50am-11:00am: Break
Location: David Student Union Lobby
Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.
11:00am-11:50am: Session 2A
Title: Red Team Rising: Breaking Into Offensive Security - A Guide for Career Changers and New Entrants
Speaker: Steve Campbell
Location: David Student Union Ballroom
The field of offensive security offers exciting opportunities, but breaking into this career can be challenging, especially in today's competitive job market. This presentation aims to equip aspiring offensive security professionals with practical strategies to overcome these barriers and launch successful careers.
Drawing from personal experience as a career changer who became a Technical Lead in a large pentesting and red teaming group, the presenter will share insights gained from both sides of the hiring process. Attendees will learn:
How to develop the mindset of a successful offensive security professional
Critical skills and knowledge areas to focus on for maximum impact
Navigating the evolving landscape of training and certifications
Strategies for standing out in job interviews and on resumes
Leveraging AI tools in skills development
Insider tips for moving to the top of the candidate pool
Whether you're considering a career change or just starting in cybersecurity, this presentation will provide you with actionable advice to accelerate your journey into offensive security roles.
11:00am-11:50am: Session 2B
Title: WhiteRabbitNeo: Augmenting the Cybersecurity Student Experience with AI
Speaker: Bailey Williams
Location: TBD
No one expects university courses to prepare cybersecurity students for everything they will encounter in their careers, but university education especially struggles with teaching hands-on skills traditionally learned on the job with a mentor.Â
Unfortunately, these days Cybersecurity is not a beginner-friendly industry, and finding a mentor in the field is not accessible to most students. In this talk, I will explain how students can use WhiteRabbitNeo, an open-source, uncensored AI model trained on red team and offensive cybersecurity data, to enhance their cybersecurity knowledge–and especially build hands-on skills by pair hacking with it for CTFs and Bug Bounty programs.
Since contributing to the open-source project, I have used WhiteRabbitNeo to work through problems the way I would with a mentor. It has distilled complex information into simple concepts and explained them with increasing complexity until I understood them. It has also helped me break down CTF problems when I am stuck. I will show you how to use it to support you in CTF challenges and more.
11:00am-11:50am: Session 2C
Title: Deloitte
Speaker: Rodney Hopkins
Location: TBD
There is a global shortage of cybersecurity professionals, with millions of unfilled jobs. This is due to a growing need to protect systems and a lack of skilled workers.Â
According to a 2024 study undertaken by the National Center for Science and Engineering Statistics (NCSES) reports from CyberSeek and ISC2 in 2023 came to similar estimates of the size of the existing workforce and workforce gap: between 1,180,000 and 1,340,000 current cybersecurity workers and between 480,000 and 570,000 unfilled cybersecurity jobs in the United States.
Key issuesÂ
Skills gap: There is a growing skills gap in areas like cloud security and artificial intelligence.Â
Budget constraints: Organizations struggle to fill roles due to budget constraints.Â
Competitive market: It's a competitive market for specialized skills.Â
To pursue a career in cybersecurity, you should: gain a solid foundation in computer systems and networks, develop skills in areas like programming, risk management, and information security, pursue degrees in computer science, information assurance, and cybersecurity and earn relevant certifications like ISC2 CISSP, CompTIA Security+, and seek practical experience through internships or entry-level roles; continuously update your knowledge as the field evolves, demonstrating strong analytical and problem-solving abilities are crucial.Â
11:50am-01:00pm: Lunch
Location: Lobby/Rooms
Take a breather and rejuvenate during lunch. Use this time to enjoy lunch, network with participants and sponsor representatives, and speakers.
01:00pm-01:50pm: Session 3A
Title: Build Your Legacy In Cybersecurity
Speaker: Greg Tomchick
Location: David Student Union Ballroom
In an era where cybersecurity stands as one of the hottest and most impactful fields in the global economy, the opportunity to create your legacy has never been greater. Build Your Legacy in Cybersecurity is designed for passionate experts ready to take the leap into entrepreneurship and transform their skills into a meaningful business that protects their communities and empowers others.<br/><br/>Drawing from the principles of Greg Tomchick's award-winning course, Build Your Legacy in Cybersecurity, this session equips you with the mindset, strategies, and insights to establish yourself as a leader in this vital industry. Learn how to identify opportunities, align your business with a mission-driven purpose, and navigate the challenges of building a company that not only succeeds but leaves a lasting impact.<br/><br/>Whether you're just starting out or seeking to level up, this talk will inspire and guide you to build a legacy in cybersecurity that safeguards the present and shapes the future.
01:00pm-01:50pm: Session 3B
Title: TBD
Speaker: TBD
Location: TBD
Abstract Coming Soon.
01:00pm-01:50pm: Session 3C
Title: CTF Practice Session
Speaker: TBD
Location: TBD
Abstract Coming Soon...
01:50pm-02:00pm: Break
Location: Lobby
Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.
02:00pm-02:50pm: Panel Session
Title: TBD
Speakers:
MC: TBD
Panelist 1: MITRE Rep
Panelist 2: Cliff Everton, NCIS
Panelist 3: Deloitte Rep
Panelist 4: TBD
Location: DSU Ballroom
Abstract Coming Soon...
02:50pm-03:00pm: Break
Location: Lobby
Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.
03:00pm-03:50pm: Closing Keynote
Title: TBD
Speaker: Darren Spencer
Location: David Student Union Ballroom
Abstract Coming Soon...
03:50pm-04:00pm: Closing Remarks
Speaker: Jonthan Kaufman, Cyberforge Committee Chair
Location: Auditorium
Gather one last time as we reflect on the day's highlights, express gratitude, and share insights gained from the diverse sessions and interactions.
Day 2 Schedule
08:00am-09:30am: Registration/Breakfast
Location: Lobby/Auditorium
Start your day by checking in at our registration desk. Our friendly team will be on hand to assist you with any queries, provide conference materials, and ensure a smooth start to your experience.
09:00am-09:30am: opening remarks
Speaker: Jonathan Kaufman, CyberForge Committee Chair; Jacob Slone, CVCSA President; Deloitte
Location: David Student Union Ballroom
Be greeted by our distinguished host who will officially welcome you to the conference. Gain insights into the overarching theme and objectives that shape the day's proceedings.
09:30am-10:00am: Team Preparation
Location: David Student Union Ballroom
Use this time to meet up with your team members to get set-up for the CTF competition. Staff will be on-hand to answer questions or concerns.
10:00am-03:00Pm: CTF Competition
Host: Meta CTF
Location: David Student Union Ballroom
Work with your team to solve the challenges for the chance to earn prizes. Staff will be available for questions.
12:00Pm-01:00pm: Lunch
Location: Lobby/David Student Union Ballroom
Take a breather and rejuvenate during lunch. Use this time to enjoy lunch, network with participants and sponsor representatives, and speakers.
03:00pm-03:15pm: Break
Location: Lobby/David Student Union Ballroom
Take a breather and rejuvenate during this scheduled break. Whether you choose to mingle with fellow attendees, explore sponsor exhibits, or simply recharge with a cup of coffee, this is your time to reset and prepare for the next wave of inspiration.
03:15pm-04:00pm: Winner Annoucements
Location: David Student Union Ballroom
The spotlight is on as we announce and celebrate the winners of the CTF Competition Discover who has emerged victorious in the various categories, from top-performing teams in competitions to standout individuals who have showcased exceptional skills and contributions.
04:00pm-04:15pm: Closing Remarks
Speaker: Jonathan Kaufman, CyberForge Committee Chair; Jacob Slone, CVCSA President
Location: David Student Union Ballroom
Gather one last time as we reflect on the day's highlights, express gratitude, and share insights gained from the diverse sessions and interactions.