Talk Schedule - November 15th 2025

:bangbang: NOTICE: All Talks and Events are at The University of North Florida, University Center, located at: 12000 Alumni Drive, Jacksonville, FL 32224
:star: Please check the posted schedule for updates. The schedule is subject to change.

Time Track 1 Track 2 Track 3 Events
09:00-09:50 Doors open at 9:00 for Check-In
09:50-10:00 Opening Ceremonies
10:00-11:00 Keynote Adress by Gina Yacone

11:00-12:00 How to build an effective phishing program

Timothy De Block
Unlocking the Secrets of then Mystery-Word Game: A Journey Through NLP and Genetic Algorithms

Eyal Wirsansky
AI at Altitude: How American Airlines AURA System is Rebooking Passengers with Predictive Automation

Dr. Arsh Arora, Ph.D. & Heather Papoulis
Capture The Flag

Lockpick Village

Soldering Village

Wireless Village

Ham Radio Testing
(13:30-15:30)
12:00-13:00 CISO Panel

Moderated by Taryn Swietek
You won't belive what the client said!

Jennifer Shannon, Kathy Collins, and Kelly Cornell
AI: Making Us Efficient, Lazy... or Just Efficiently Lazy?

Dr. Arsh Arora, Ph.D.
* This is a 30 minute talk
13:00-14:00 Lunch
14:00-15:00 Women In Technology (WIT) Pannel: Paranoia

Moderated by Brandi Kiehl
Building Better Security Tooling: Using Human Centered Design to Build and Deploy Effective Security Tools

Spence
Prompt Engineering 101: Practical AI Skills for the Security Professional

George Raileanu
15:00-16:00 Shifting Left and Right: A TMACApproach to Architects and Devs

Souryadip Sengupta
Making Your Analytics Make Sense

Trishatrying
Guardians of Tomorrow: AI, Risk, and The Human Element

Nathan Hamiel
16:00-17:00 The Puzzle with missing pieces: Fundamentals of Threat Intelligence

Madeline Sedgwick
People, Process, and Technology. What is Missing in Cybersecurity?

TJ Zimmer
TBD

TBD
17:00-18:00 Build it, Break it, Harden it, Repeat! Learning DevSecOps Skills at Home to Boost Your Resume!

Christian McLaughlin
3D Shader Programing on Shadertoy

Kyle Pena
The Algorithmic Self: Reclaiming Identity in an AI-Driven World

Carmen Estela
18:00-18:30 Closing Ceremonies

Talks

How to build an effective phishing program

Phishing attacks remain one of the most pervasive and successful tactics used by cybercriminals to get into organizations. But how do you create a phishing awareness program that goes beyond checking boxes and truly changes behavior? In this presentation, we’ll dive into the art and science of building an engaging, effective phishing program that empowers your workforce to recognize and respond to threats.
This session will blend actionable strategies with real-world stories, including insights from several years of crafting phishing simulations. You’ll discover how to design realistic campaigns, analyze results, and tailor training to address gaps—all while keeping employees motivated and engaged. Learn how to educate without alienating and evolve your program to ever-changing phishing tactics.
Whether you’re just starting your phishing awareness journey or looking to enhance an existing program, this presentation will equip you with the tools, best practices, and memorable anecdotes to hook your employees’ attention and build a better culture of security.

Speaker: Timothy De Block

Unlocking the Secrets of then Mystery-Word Game: A Journey Through NLP and Genetic Algorithms

This session introduces the basics of Natural Language Processing and word embeddings, highlighting their application in popular online games like Semantle. Discover how genetic algorithms can enhance game performance by creating an intelligent player that guesses the mystery word based on semantic similarity. We will explore the game's mechanics, learn the principles of genetic algorithms, and present a live demonstration of our AI player in action. Gain insights into the broader implications and future potential of integrating these advanced technologies. Join us to explore the innovative intersection of NLP, AI, and game design.

Key takeaways:

  • Gain a foundational understanding of NLP and the concept of word embeddings, with a focus on their application in semantic similarity tasks.
  • Discover how genetic algorithms can be employed to create a sophisticated player for the Mystery-Word game. Understand the principles behind genetic algorithms and their optimization capabilities.

Speaker: Eyal Wirsansky

AI at Altitude: How American Airlines AURA System is Rebooking Passengers with Predictive Automation

In 2023, American Airlines quietly deployed an AI-powered system called AURA (Automated ReAccommodation) to preemptively rebook passengers it predicted would miss connecting flights. Built on machine learning models that analyze real-time operational data, AURA acts autonomously rerouting travelers mid-flight, reallocating seats, and triggering downstream logistics, all before the passenger ever arrives at the gate.

But when predictive automation replaces human discretion, what happens to transparency, consent, and control? In this session, we’ll dissect the AURA system from an AI/infosec perspective:

  1. The real-world failures and ethical challenges it exposed
  2. What “human-in-the-loop” should actually mean in modern automation
  3. Why this case study matters for any industry implementing AI at scale

Attendees will leave with a high-level understanding of how AURA works, the implications of real-time automation, and what this could mean for future human-AI coordination. 

Speaker: Dr. Arsh Arora, Ph.D. and Heather Papoulis

Shifting Left and Right: A TMACApproach to Architects and Devs

Traditional threat modeling is confined to either high-level design documents using tools with reports, providing friction between development lifecycle and security assessment. This talk presents a novel, integrated Threat Modeling as Code (TMAC) approach that combines the OWASP pytm and Threatspec to achieve Secure by Design. Proposed method establishes a single, version-controlled source of truth by analyzing a system's architectural design via pytm and capturing feature-specific threats directly in source code annotations via Threatspec. This dual-layered strategy automates threat identification across design and implementation, generating detailed threat reports and contextual misuse cases that serve as actionable security requirements for developers. The demo will show an integrated framework that not only shifts security left but also provides a full-stack threat model that scales with modern development, enabling integrated communications between architects and developers to build more resilient software. Attendees will learn how to implement this hybrid TMAC model, moving beyond theoretical exercises to create continuous, contextual, and impactful security practices.

 

Speaker: Souryadip Sengupta

You won't belive what the client said!

Secure Ideas consultants Jennifer, Kathy, and Kelly will share real-world experiences that highlight both the serious lessons and the lighter side of working in security consulting. Attendees will gain practical insights into best practice and learn how to navigate unexpected situations.

Speaker: Jennifer, Kathy, and Kelly

AI: Making Us Efficient, Lazy... or Just Efficiently Lazy?

AI is everywhere—writing our texts, planning our days, even thinking ahead for us. But is it making us productivity pros or just really good at doing nothing? This session takes a fun, insightful look at how AI is changing our habits, helping us work smarter… and maybe slack smarter too. Let’s find out if we’re winning with AI—or just letting it win for us.

Speaker: Dr. Arsh Arora, Ph.D.

Women In Technology (WIT) Pannel

Paranoia. Just saying those words gives me chills and probably you as well. It is something we deal with every day in the IT industry, but like all of the other elephants in the room, we do not discuss it. Let’s explore healthy levels, pros and cons of paranoia with a panel of IT Security Ladies!

Paranoia is both good and bad. However it is not something we like to discuss. The word paranoia has such a negative stigma attached to it. Yet day after day we deal with it. The idea is scary, but it does not have to be. The word paranoia gives most people chills and possibly for good reason. Let’s hash out paranoia with an expert panel of women and get their take on the good, the bad and the ugly of paranoia in the IT industry and more specifically IT security as a whole. Because we need to face and in some ways it can be healthy.

We will start by introducing the panel and then explore paranoia from the following perspectives: Paranoia with clients and vendors (* may add subtopics) Paranoia, what's a healthy level Databasing, Data analytics, and security of Data Our social media accounts Questions you have been asked by your clients, vendors, coworkers, etc. Cybersecurity training, vigilance, and the importance of the role paranoia plays in them

Let our expert panel of 5 women help you understand the advantages and disadvantages of paranoia as well as determining a healthy level for all of the people in our daily lives like our vendors, customers, co-workers, clients, family, etc. And let’s build better relationships both because and with it.

Panelists:

  • Taryn Swietek, Executive Cybersecurity & Risk Leader, Google)
  • Rebecca Hughes, VyStar
  • Vanessa, Microsoft
  • Dawn Carrie, CISO, Purecyber
  • Erika

Moderator: Brandi Kiehl

Building Better Security Tooling: Using Human Centered Design to Build and Deploy Effective Security Tools

This topic is about improving the effectiveness of security tools by putting the end users at the center of the design process. Too often, security tooling is built around technology capabilities or compliance requirements, which can result in tools that are technically powerful but difficult to adopt, disruptive to workflows, or ignored by teams.

Key Ideas: Using human centered design to reduce risks

Speaker: Spencer Hawkins

Prompt Engineering 101: Practical AI Skills for the Security Professional

As generative AI continues to reshape workflows across the tech landscape, information security professionals are uniquely positioned to benefit from, and defend against, its capabilities. This talk demystifies the fundamentals of prompt engineering, offering attendees a practical understanding of how large language models interpret input, why prompt phrasing matters, and how different models (GPT, Claude, LLaMA, etc.) behave under varied conditions.

Designed for security practitioners, this session bridges technical curiosity with hands-on utility. Attendees will explore prompt engineering use cases across various disciplines. We'll even touch on personal productivity examples. The session includes a live demonstration and takeaway resources to help attendees start experimenting right away whether in offensive, defensive, or compliance roles. No AI experience necessary; curiosity required.

Speaker: George Raileanu

CISO Panel

Topic to be announced closr to the conference.

Panelists:

  • Greg Udell, CISO, Duval County Clerk of Courts
  • Jon West, CISO, Guidewell Source
  • Mike Green, CISO, Availity
  • Richard Richison, CISO, Repligen
  • Chris Gay, CISO, Acosta Group

Moderator: Taryn Swietek, Executive Cybersecurity & Risk Leader, Google

Making Your Analytics Make Sense

Helping small business owners understand their social analytics in a way that let's them tell and story and attract customers that are looking for businesses like them.

Speaker: Trishatrying

Guardians of Tomorrow: AI, Risk, and The Human Element

The world is fueled by vibes, filled with unknowns and uncertainties, putting everyone on edge. Everywhere you turn, people predict that we are six months away from major disruption and a year away from massive job losses, and yet, developers are churning out vulnerable applications at an alarming rate. Software is becoming increasingly manipulable with significantly reduced visibility, and developers may not know what code will execute at runtime. This is the environment in which modern security professionals find themselves.

Security professionals are equipped to handle these challenges, and their role will be increasingly important in the future. In this talk, we look to the future, examining how software and technology are evolving, and what we can do to succeed in the years ahead to secure the next generation of technology. The guardians of tomorrow are being forged today. Let’s not mess this up.

Speaker: Nathan Hamiel

The Puzzle with missing pieces: Fundamentals of Threat Intelligence

Using the investigative process, this talk will offer an overview of threat intelligence analysis fundamentals and tradecraft. I will emphasize the need for both technical and strategic thinking, checking bias, analysis considerations using an example investigation that takes listeners from an IOC to complete intelligence picture.

Speaker: Madeline Sedgwick

People, Process, and Technology. What is Missing in Cybersecurity?

In a world led by Information Technology setting the standard around People, Process, and Technology, where do organizations miss the mark when it comes to building their cybersecurity programs. We all think we know what we need but what are some areas that we didn't realize we needed. In this presentation we will explore the 3 main areas and identify some areas that could help enhance a cybersecurity program. This is a discussion that creates interaction from all levels of experience to create a collaborative session on how we can build a stronger cybersecurity program. The key is: there is no wrong answer. The audience will learn the core pillars that go into building a cybersecurity program. These are People, Process, & Technology. We will then delve into the areas that could strengthen programs through interaction with the audience from all experience levels. This will allow for a sense of community, learning, and enlightenment on what needs to be considered. The key topics are People, Process, & Technology. People - What does it take to build a team based on the organization and how budget plays into that. Process - a quick look into the important pieces of what a Policy, Standard, & Guideline are and why they are important. Technology - A cursory look into the most known technologies being used today for cybersecurity programs.

Speaker: TJ Zimmer

Build it, Break it, Harden it, Repeat! Learning DevSecOps Skills at Home to Boost Your Resume!

Hackers hack, defenders defend—but what is the role of InfoSec in a developer's world?

Today, securing code isn’t enough. With technologies like **Infrastructure as Code (IaC)**, entire production environments are deployed through **CI/CD pipelines**. One misconfigured pipeline can expose secrets, open networks, or deploy insecure containers—**at scale**. This is the world of **DevSecOps**: the intersection of development, operations, and security.

Never heard of DevSecOps—or maybe you have, but it still feels vague? You don’t need a degree, a job title, or a cert with a cool acronym to get started. You just need a **home lab**, the right mindset, and a little curiosity.

This talk covers hands-on, practical skills to get started from scratch, including:

  • What **DevSecOps** is (and is *not*)
  • Why **CI/CD pipelines** are high-value targets—and how to harden them
  • How to build your own secure pipelines using **GitLab CI**, **Jenkins**, **CircleCI**, etc.
  • Integrating free, powerful tools:
  • **Trivy** – container & IaC scanning
  • **Gitleaks** – secret detection
  • **Semgrep** – static analysis
  • **OWASP ZAP** – automated DAST
  • Creating your own tools and linters with **Python**, **Bash**, and **Go**
  • Managing secrets with **Vault**, **sops**, and **GitLab CI variables**
  • Enforcing policy-as-code with **OPA/Gatekeeper** in **Terraform** and **Ansible** workflows
  • Most importantly: **how to market these skills** through your resume, portfolio, and interviews

Whether you're a developer, sysadmin, SOC analyst, or infosec newcomer looking to break out of the “red team vs. blue team” mindset—this talk will show you how to build, break, and secure modern infrastructure *from your home lab*.

Speaker: Christian McLaughlin

3D Shader Programing on Shadertoy

Learn how to raymarch SDF (signed distance field) primitives to create sophisticated 3D visuals with very little code

Speaker: Kyle Pena

The Algorithmic Self: Reclaiming Identity in an AI-Driven World

When I first started speaking on social networking, I focused on the curated, often-unrealistic lives we project online. But something has changed. It's no longer just us doing the curating; it's the algorithm. And with the rise of AI, this has created a new, deeper kind of imposter syndrome—what I call the "Algorithmic Self." .

In this talk, I'll explore this new digital reality. We'll deconstruct the version of ourselves that AI has built for us—one optimized for engagement and clicks. This is a subtle but powerful shift, as we are constantly exposed to content designed to make us feel inadequate. A study by the Pew Research Center found that 25% of social media users feel that these platforms distract them from things that are important in their lives, which can lead to feelings of inadequacy. This talk will give the audience practical strategies to reclaim their agency. We'll talk about how to consciously curate a digital life that serves us, not the algorithm. This talk is about more than just managing a social media profile; it's about understanding that our worth, creativity, and identity are not metrics to be optimized, but unique human traits that are more valuable than ever.

Speaker: Carmen Estela