Conference Schedule

Wednesday, September 8th




7:00am-7:00pm Badge Pick-Up Aurora 3
9:00am-3:30pm Leadership Summit (Invite Only) Aurora C; Summit 2-5
11:00am-7:00pm WiCyS Store Open Aurora Registration
12:00pm-1:30pm Senior Leadership Luncheon (Invite Only) Aurora B
12:30pm-1:30pm First Timer’s Guide for WiCyS Conference
Kaitlyn Carroll, Tennessee Technological University;  Elizabeth K. Hawthorne, Rider University;  Susan Jeziorowski, MITRE;  Lynne Miller, Raytheon; Susanne Wetzel, Stevens Institute of Technology
Summit 6/7
12:30pm-1:30pm Strategic Engagement with WiCyS Community for Hiring!
Dr. Ambareen Siraj, CEROC, WiCyS; Lynn Dohm, WiCyS
Summit 8
12:30pm-7:00pm CTF Coaching Aurora D
2:00pm-7:00pm Career Village Open Willow Lake 1/2/3/4/5
2:00pm-4:00pm Workshop Series (4 Concurrent)

Red Team/Blue Team: How to Think Like a Hacker

Marcelle Lee, Mari Galloway, Lisa Jiggetts and Vanessa Redman, Women’s Society of Cyberjutsu

Summit 9

The Hitchhiker’s Guide to the Home Network: Analyzing IoT Traffic

Maria Melchiorre, Alicia Ouyang, Kim Gavin, and Christopher Morris, Systems and Technology Research (STR)

Summit 6/7

Hacking Unconscious Biases for a More Inclusive Work Environment

Elena Peterson, Pacific Northwest National Laboratory; Manisha Kanodia, UC San Diego; Laura Murphy, IBM in support of Kyndryl; Deveeshree Nayak, University of Washington

Summit 8

A Close Look into WiCyS Veteran Apprenticeship Program

Martha Laughman, Smoothstack; Dr. Ambareen Siraj, CEROC, WiCyS; Lynn Dohm, WiCyS

Crest 3
4:00pm-4:30pm Break
4:00pm-7:00pm Poster Session Check-In EH 3 PreFunction
4:30pm-6:30pm Workshop Series (4 Concurrent)

Artificial Intelligence Assisted Malware Analysis

Maanak Gupta, Tennessee Tech University; Mahmoud Abdelsalam, Manhattan College; Sudip Mittal, University of North Carolina at Wilmington

Summit 6/7

Both Sides of a CTF: Compete and Create

Hugrun Hannesdottir, Sara Schwarz Iglesias and Dianelys Soto-Cruz, Carnegie Mellon University

Aurora B
Simulating Supply Chain Breaches with Arena
Elizabeth Rasnick and Chris Kadlec, Georgia Southern University
Summit 8

Measuring the Invisible: How Inclusion Impacts Employee Satisfaction and Company Performance (Invite Only)

Paolo Gaudiano, Aleria

Aurora C
6:30-7:30pm Student Scholarship Recipient Dinner Crest 4/5
7:00pm-9:00pm Raytheon Technologies Mentoring Social Homestead 1-4
7:00pm-8:00pm Educators Funding 1 on 1 Summit 3
7:00pm-8:00pm WiCyS 2022 Call for Participation Information Session Summit 5
Federal Scholarship (SFS/DoD) Scholars Meetup and Information Session
Summit 3


Thursday, September 9th





7:00am-6:00pm Badge Pick-Up Aurora 3
7:00am-8:00am Breakfast for Students and Fellowship Recipients Corridor next to Aurora ABC
7:00am-8:00am Military and Veteran Group Breakfast Summit 4/5
7:00am-8:30am Poster Session Check-In EH 3 PreFunction
7:00am-7:00pm Shared Interview Space Homestead 1

Conference Opening, and Keynote: “From Disruption to Opportunity Without Compromise” (doors open at 8:15am, coffee available before)


Keynote Introduction:
Divya Ghatak, SentinelOne
Debora A. Plunkett, Cybersecurity Leader

Aurora ABC
9:30am-6:00pm WiCyS Store Open Aurora Registration
9:45am-10:15am Refreshment Break Aurora B
9:45am-11:45am Career Fair and Career Village Open Aurora EH 3/
Willow Lake 1/2/3/4/5
9:45am-11:45am CTF Coaching Aurora D
9:45am-11:00am Student Poster Session and Networking Break EH 3 PreFunction
11:00am-11:45am Presentation Sessions (3 Concurrent) Various Rooms

PASTA and OCTIVE and STRIDE, Oh My! Bringing Threat Modeling Out of the Woods

Alyssa Miller, S&P Global

Summit 2/3

You’ve Got a Degree, You’ve Got Credentials, How Do You Get a Job in Cybersecurity?

Ronda Henning, L3Harris Technologies

Summit 6/7

Understanding the Phenomenon of Vulnerability Chaining Blindness

Dr. Nikki Robinson, IBM

Summit 4/5
11:00am-11:45am Lightning Talks (all talks are in the same room) Summit 8/9
Community Crowd Sourcing for WiCyS Cybersecurity Resource Library
Meghan Jacquot, WiCyS Resource Committee

A Strategic Approach to IoT Security: How an Organization Can Work Toward a Secure Future

M’Kaila Clark, Empire State College

Effectiveness of Threat Mitigation in Layers of the Open Systems Interconnection Model

Olivia A. Gallucci and Sylvia Perez-Hardy, Rochester Institute of Technology

A Department of Defense Conference on Re-Entry for Women Veterans into Cybersecurity Careers

Rachelle Heller, George Washington University; Costis Toregas, George Washington University and WiCyS Board Member

Demystifying Cyber Risk Metrics and Reporting

Priya Mouli, LTI- Larsen and Toubro Infotech

The Future of Ethical Hacking

Lauren Provost, Norwich University

Unmasking Cyber Command’s Protections for the 2020 Election

Diana Parr, SAIC

Last Mile Education Fund: Investing in the Next Generation of Tech Talent

Ruthe Farmer, Last Mile Education Fund


Lunch, Networking, and Keynote: “The Courage to Succeed: The Door is Open (For A Change)” (must be seated by noon to eat)

Keynote Introduction:                          Ruchi Shah, Google and Morgan Adamski, NSA
Aimee Cardwell, Optum

Aurora ABC
1:55pm-2:40pm Presentation Sessions (3 Concurrent) Various Rooms

A Framework for Identifying Host-Based Artifacts in Dark Web Investigations

Dr. Arica Kulm, Dakota State University

Summit 2/3

Do Developers Write SUPER Secure Code?

Mary Anne Waddick, Raytheon Technologies

Summit 6/7

Understanding Privacy through Computational Social Science over Twitter and Reddit

Jayati Dev, Indiana University Bloomington

Summit 4/5
1:55pm-2:40pm Lightning Talks (all talks are in the same room) Summit 8/9

Improving Cybersecurity Field Preparedness by Gamification and Scenario-Based Activities

Molly Cooper, Ferris State University

Highlights of Mainframe Security

Elizabeth Schweinsberg, US Digital Service

Crowd-Sourced Vulnerability Disclosure Program Working to Keep the DOD “Left of Boom”

Melissa S. Vice, DoD Cyber Crime Center (DC3), VDP

Communities Within WiCyS Community: Special Interest Groups
Rian Sondag, WiCyS

2021 Executive Orders and What They Mean for the Software Supply Chain

Megan Moloney, Guidehouse, National Security Segment

Experience Leading a Deployed USMC Cyber Team

Svetla Walsh, United States Marine Corps

NICE Workforce Framework for Cybersecurity WiCyS Video Album

Dr. Ambareen Siraj, CEROC, WiCyS; Mimi Vertrees, Tennessee Technological University; Rian Sondag, WiCyS

1:55pm-5:30pm Career Fair and Career Village Open (Break w/ Refreshments in Career Fair from 2:45pm-3:15pm) Aurora EH 3/
Willow Lake 1/2/3/4/5
1:55pm-5:30pm CTF Coaching Aurora D
2:40pm-4:40pm Workshop Series (4 Concurrent Sessions) Various Rooms

Leaders, Equity and Influence: Creating a Culture of Self-Accountability

Jessica Robinson, Kelli Hudson, Sofia Martinez, Alyssa Miller, Jennifer Munoz, Noureen Njoroge, Quintana Patterson, and Mona-Lisa Pinkney, WiCyS Racial Equity Committee

Summit 2/3

How to Show Work (in Documentation) to Auditors and Regulating Bodies

Krystal Gabel, Bank of the West

Summit 4/5

Personal Branding in Cybersecurity and Privacy

Barbra Mooneyhan, BrightInsight;  Janice Reese, Network PDF Cloud

Summit 8/9

Build an Attack: Why Tabletop Exercises are for Everyone

Remi Cohen, F5; Sayako Quinlan, CrowdStrike

Summit 6/7
4:45pm-5:30pm Birds of a Feather (4 Concurrent Sessions)

Things We Wish We Knew Before Starting Our Careers in Cybersecurity

Maggie Marxen and Bailey Bercik, Microsoft

Summit 6/7

The Not-So-Well-Talked-About Topic: Fostering Allyship

Han Thazin (Hannah) Tun, OmniSOC, Indiana University; Amy Starzynski Coddens, REN-ISAC

Summit 8/9

Not Everyone Starts in Technology, Where Did Your Journey Start?

Dr. Kelley Misata, Sightline Security; Deborah Kariuki, University of Maryland Baltimore County (UMBC)

Summit 2/3

Fostering a Transparent Security Culture to Reduce Insider Threat

Chrysa Freeman, Code42

Summit 4/5

Dinner, Networking, and Keynote: Failing your Way Forward: How Failure is a Critical Component to Success” (must be seated by 6:15pm to eat)

Keynote Introduction: Shannon Lietz, Adobe
Keynote: Ashley Podhradsky, Dakota State University

Aurora ABC
8:30pm-9:30pm WiCyS Racial Equity Committee Meet and Greet Aurora D PreFunction
8:30pm-Midnight CTF Coaching Aurora D
9:00 pm-Midnight CTF After Dark Party Aurora D


Friday, September 10th




7:00am-9:00am Badge Pick-Up Aurora 3
7:00am-10:00am Shared Interview Space Homestead 1
7:00am-Sell Out WiCyS Store Open Aurora Registration
7:30am-8:30am Breakfast Available for Students and Fellowship Recipients Corridor next to Aurora ABC
8:00am-5:00pm Luggage Storage Available Aurora D

Keynote: “Securing a Path for Success” (doors open at 8:30am, coffee available before)

Keynote Introduction: Helen Patton, Cisco
Keynote: Leslie Burns, Alexandra Heckler, and Tina Oberai, Raytheon Technologies

Aurora ABC
9:45am-10:15am Group Picture and Break w/ Refreshments EH 3 or Outside
10:15am-11:00am Presentation Sessions (3 Concurrent Sessions) Various Rooms

Cybersecurity for Aviation Requires a Different Perspective

Amanda Buchanan, Raytheon Technologies

Summit 4/5

Hack the Farm Today; Own the Grid Tomorrow!

Mary Ann Hoppa, Norfolk State University

Summit 6/7

Above Our Heads – How Attackers are Leveraging the Cloud

Elif Kaya and Kim Huynh, Microsoft; Remi Cohen, F5

Summit 8/9
10:15am-11:00am Affiliate MeetUp Summit 2/3
11:15am-12:00pm Presentation Sessions (3 concurrent sessions) Various Rooms

How to Train Your Operator: Observations of a “Charming” Adversarial Group

Allison Wikoff, IBM X-Force

Summit 6/7

AI and Cybersecurity: What is Our Role?

Shafia Zubair, Morningstar

Summit 8/9

Cybersecurity Partnerships – Leaning Forward to Prevent Threats

Morgan Adamski, NSA

Summit 4/5
11:15am-12:00pm Student Chapter MeetUp Summit 2/3
12:00pm-12:45pm Panel Sessions (4 Concurrent)

Securing the Supply Chain: When Every Step is a New Weak Link

Bianca Steele and Jess Smith, Pacific Northwest National Laboratory; Bob Hanson, Lawrence Livermore National Laboratory; Greg Shannon, Carnegie Mellon University; Cheri Caddy, U.S. Department of Energy

Summit 2/3

The New Threat Landscape in a Post Pandemic World

Priyam Biswas, Intel; Awalin Sopan, Sophos; Abhilasha Bhargav-Spantzel and Michele Myauo, Microsoft; and Reshma Shahabuddin, Sophos

Summit 4/5

Acquire the Right Cybersecurity Competencies to Be More Prepared for a Job

Susanne Wetzel, Stevens Institute of Technology; Dr. Sharon R. Hamilton and Zoe Fowler, Norwich University; Karen Wetzel, National Initiative for Cybersecurity Education (NICE)

Summit 6/7

Overcoming Imposter Syndrome in Cybersecurity

Noureen Njoroge and Dr. Mona-Lisa Pinkney, Nike; Reena Madan, Verizon; and Latisha Scarborough, Microsoft

Summit 8/9

Lunch, Closing Remarks, and Awards (Must be seated by 1pm to eat)

Closing Remarks: Alissa “Dr. Jay” Abdullah, Mastercard

Aurora ABC
2:00pm-2:30pm Travel Stipend Verification Outside of Aurora ABC
2:30pm-4:30pm Workshop Series (3 Concurrent sessions)

Fellowship of the RING: Experience Cybersecurity Curriculum and Resources for K-12

Tania Williams, Jesse Hairston and Benjamin Cummins, The University of Alabama in Huntsville

Summit 2/3

Android Reverse Engineering

Aisha Ali-Gombe, Oluwasetemi Owoeye and Ramyapandian Vijayakanthan, Towson University

Summit 4/5

Threat Hunting Using MITRE ATT&CK for Inspiration

Lily Lee and John Stoner, Splunk Inc.

Summit 8/9