Fall 2025

Please note that the session will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation.  Scroll down for links to prior speaker's presentations.

DATE ACCESS SPEAKERS
Wednesday, November 19
7:00 PM EST

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

Guest Host: Darin Morrow

1. Joy Toney, “Ethical Use of AI”±±

2. Brian Albertson, “Trends and Predictions of Cyber & GRC for 2026"

3. Phil Plantamura, “Enterprise Security Monitoring using Open Security Onion”

4. Brettina Browder, “Building a Cyber Champion Program”

Tuesday, December 2
7:00 PM EST

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr25

 

Guest Host: Sanjay Bhardwaj

1. Matt Somerlott, “The Psychology of Cyber Risk: How Cyber Insurance Shapes Security Behavior”

2. Morgan Hague, “Cyber Strategy Development”

3. Gideon Rasmussen, “Crisis Communications - In the Gravest Extreme”

August 27

 

Kyle Smith, Wielding the Power of the Tabletop

James Grisham, AI: Impacts to Cybersecurity and the Future of the CISO

Ahmed Awad, Data Protection Using NIST CSF 2.0

September 9

 

Brent Holt, Offensive Security Testing

Onyekachi Okereke, Building a Cybersecurity Program from Scratch: Real Life Lessons

September 24

 

Jeff Apolis, Operationalizing AI: A CISO’s Guide to Strategic Adoption and Risk Management

Richard Austin, Ghosts of Data Past

October 7

 

Yugandhar Suthari, Shift-Left Security in Action: Automating Cloud Compliance with Open Source Tools

Mike Mcgannon, Protecting Your Digital Identity

October 22

 

Sam Aiello, “AI in Cybersecurity - The Future of Intelligent Threat Defense”

Stephen Omorogbe, "Managing the Secure Systems Development Lice Cycle"

Pete Smith, “Preparing Your Cybersecurity Org for M&A”

November 4

 

Dusty Thibodeaux, "What would you say you do here – closing the gap of class and real-world work"

Nick Corn, “Soft skills for information security professionals"

Shannon McKenzie, "SIEM/SOAR Overview and Transforming Security Operations"

 

Cybersecurity Speakers From Prior Sessions

Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with Kennesaw State University credentials: