Keynote Speaker

Gina Yacone
Gina Yacone

Gina Yacone
Regional, Advisory and Virtual Cheif Information Security Officer (CISO) at Trace3

As the CISO (Advisory) for Trace3's mountain state region, Gina Yacone is responsible for developing and implementing internal cybersecurity processes and solutions, as well as advising our clients on how to safeguard their digital assets from cyber threats. She has experience as a cybersecurity consultant and vCISO, working with various industries and sectors to assess risks, design security programs, and deploy security technologies.

Gina's certifications and designations include ISACA, HITRUST, (ISC)2, and CompTIA, and she's been a subject matter expert for multiple CompTIA exams, including Security+, CASP+, and CySA+. She holds a Master of Science in Cybersecurity Policy and Risk Management from the University of New Hampshire.

Gina's mission is to help organizations protect their data, assets, and reputation from cyber threats, and to empower them with the best practices, tools, and frameworks to achieve their security and privacy goals. She's always seeking new challenges and opportunities to learn and grow, and enjoys sharing her knowledge and insights as a keynote speaker, moderator, and investor.

Speakers

Dr. Arsh Arora, Ph. D.

Dr. Arsh Arora is a cybersecurity expert with over a decade of experience in threat intelligence, incident response, and digital forensics. He holds a Ph.D. in Cyber Security and has led investigations with the FBI, dismantled major botnets, and driven security innovation at companies like McKesson, Visa, and Neustar. Arsh is passionate about educating others and advancing cyber resilience through research, teaching, and public engagement.

Carmen Estela

Carmen Estela is a graduate student in Digital Forensics at the University of Central Florida. She holds a B.A. in Criminology from the University of Florida with certifications in Data Analytics and AI Fundamentals. Carmen has attended and been awarded scholarships to HackSpaceCon 2024 and 2025, where she participated in hands-on cybersecurity workshops including adversarial machine learning and physical penetration testing. At Hack Red Con 2025 in Louisville, Kentucky, Carmen presented "Social Engineering Your Network: Hacking Human Connections". She also presented "Credential Not Found: Imposter Syndrome in Cyber" at BSides Orlando 2025 in Orlando, Florida. She has also served as an adult protective investigator, police communications operator, legal intern, and research assistant, applying investigative skills across law enforcement, academic, and public service settings.

Christian McLaughlin

Christian McLaughlin is an Information Security Professional with over 13 years of combined professional experience in IT systems and avionics. Throughout his career, he has demonstrated expertise in offensive and defensive security, computer networking, automation, avionics, and aviation safety and maintenance.
After spending 8 years in the Naval Aviation, he transitioned to a civilian career in Information Security where he continued his passion for knowledge holding roles as a SOC Analyst, Security Researcher, Security Consultant and Security Engineer.
He is an advocate for teaching others about the awesome world of selfhosting. He advocates teaching others how to build homelabs for themselves and learning enterprise skills with free and open source software (FOSS).

Eyal Wirsansky

Eyal Wirsansky is a Staff AI Engineer, a seasoned software developer, and a recognized leader in the AI community. He currently designs and implements agentic AI applications in the healthcare space, with a focus on explainability, safety, and real-world decision support.
Eyal’s graduate research focused on genetic algorithms and neural networks, culminating in a novel supervised learning method that fuses the strengths of both. Over the past 25+ years, he has contributed to breakthroughs in Voice over IP, healthcare systems, developer tooling, and drone technologies.
He is the author of Hands-On Genetic Algorithms with Python (Second Edition), a comprehensive guide to applying evolutionary strategies to modern machine learning problems.
In addition to his professional work, Eyal teaches AI as an adjunct professor at Jacksonville University, leads the Jacksonville Java User Group and the AI for Enterprise Virtual User Group, and writes the AI4Java blog to help developers bridge the gap between software engineering and artificial intelligence.

https://www.linkedin.com/in/eyal-ai/

George Raileanu

Cybersecurity executive with 15+ years of experience leading offensive security, incident response, and digital forensics across critical industries worldwide. Proven track record in building elite technical teams, delivering thousands of high-impact security assessments, and guiding organizations through complex cyber threats. Passionate about bridging the gap between technical depth and business strategy to strengthen security posture and develop the next generation of industry leaders.

Jennifer Shannon, Kathy Collins, and Kelly Cornell

Jennifer Shannon, Kathy Collins, and Kelly Cornell are three VERY driven Security experts brought together by Secure Ideas. All motivated for different reasons, but share the same passion for Cybersecurity.

Kyle

Data Scientist / Machine Learning Engineer

Madeline Sedgwick

Madeline Sedgwick is a Principal Threat Researcher at Palo Alto Networks Unit 42's National Security Team, focusing on South Asian threat actors and covert networks. In her 13 years of professional experience, Madeline has worked on all sides of the cyber front: military, government, and private sector. Her mission, inspired by years of ruined holiday weekends at the Department of Defense, is to make the other guys work the weekend.

https://www.linkedin.com/in/mesedgwick/

Nathan Hamiel

Senior Director of Research, Kudelski Security
Nathan Hamiel is Senior Director of Research at Kudelski Security, where he leads the fundamental and applied research team, part of the Innovation group working to define the future of the company’s products and services. He focuses on emerging and disruptive technologies and their intersection with information security. This research includes new approaches to difficult security problems and the safety, security, and privacy of artificial intelligence. Nathan is passionate about risks at the intersection of technology and humanity and shares his thoughts on his blog, Perilous.tech. During his 25 years in cybersecurity, he has been a regular public speaker, presenting his research at global security events, including Black Hat, DEF CON, HOPE, ShmooCon, SecTor, ToorCon, and many others. He is also a veteran member of the Black Hat review board, serving as the AI, ML, and Data Science track lead.

https://www.linkedin.com/in/nathanhamiel/

Souryadip Sengupta

Product security engineer with over six and a half years of experience working in cybersecurity, solving problems in Manufacturing and Banking sector applications. My background includes secure coding, automation, pentesting, vulnerability assessment, cryptography, and privacy. Active in research and open-source projects where the focus is on building applications with zero trust, higher maturity of resiliency, and compliance.

https://www.linkedin.com/in/souryadipsengupta/

Spencer Hawkins

Spencer is a technical security leader focused on making architecture useful, not academic. He’s helped organizations define secure architecture practices, improve enterprise cloud postures, and build security programs that actually work. Spencer blends deep technical expertise with a strong focus on cross-functional partnerships, helping to translate risk into real design decisions teams can act on. His goal is to make security architecture approachable, practical, and a natural part of how teams build.

https://www.linkedin.com/in/spencerhawkins1/

TJ Zimmer

TJ Zimmer, Cyber Operations Manager at Optiv, is a security practitioner with over two decades of experience in Cyber Security & Information Technology, TJ has held roles in cybersecurity operations, operations management, network engineering, and security engineering with companies in telecommunications, government, and healthcare. In his current role, TJ focuses on early and accurate detection, response, and containment for threats directed against Optiv’s largest clients. Prior to joining Optiv, TJ was a Cybersecurity Engineering and Operations leader for a healthcare organization in Florida. TJ has a Masters in Information Technology and holds various certifications including the CISSP, CISM, & Associate C|CISO.



https://www.linkedin.com/in/tj-zimmer-cissp/
Timothy De Block

In the vast, uncharted expanse of the digital frontier, Timothy De Block holds the title of Head of Security Exploration at Exploring Information Security—think of him as the cybersecurity equivalent of an intergalactic explorer, but with fewer spaceships and more firewalls. My mission? To boldly go where no security program has gone before, mapping the hidden threats and uncovering innovative solutions to keep the cyberverse safe.

https://www.linkedin.com/in/timothy-deblock/

Trisha Stalnaker

Trisha Stalnaker has an extensive back ground in higher education, both as a student and administrator. Earning degrees in psychology, education leadership, and business she bring a unique perspective to process and operation decisions focused on the client perspective and bottom line. Trisha started her career in higher education in a niche division working with adults and primarily military students in recruitment at NAS Jax. Here she set the stage for her sales mindset, building a foundation of networking in Jacksonville and developing the importance finding the right fit client. She has since moved into the tech sphere working as a business growth consultant and now a client success coach at Thryv - giving her the inside scoop of nurturing your leads, clients, and establishing brand loyalty. She started a ran a residential and commercial construction company for 2 years and has recently launched a consulting company helping small business make sense of the everchanging marketing scape online. Trisha has made her name trying new trends in marketing and breaking them down in a way that makes sense for everyone.

https://www.linkedin.com/in/trishastalnaker/