Spring 2026

Please note that all sessions will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation.  Scroll down for links to prior speaker's presentations.

DATE ACCESS SPEAKERS
Wednesday,
March 18

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr26

Guest Host: Yolanda Li

1. Richard Austin, "Cybered War and Cyber Weapons"

2. Emmanuel Nwajiaku, “The Psychology of Phishing: Designing Human Centered Security Awareness Programs”

3. Maytha Nassor, ”An Illustrated Introduction to Modern Security Operations”

Tuesday,
March 31

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr26

Guest Host: TBD

1. .Ward Pyles,”Topic TBD”

2. Kyle Smith, “Phishing Response”

3. Joseph Leffew, “Securing SCADA”

Wednesday,
Arpil 15

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr26

Guest Host: Darrin MOrrow

1. Keith Deininger. "Topic TBD"

2. Corey Hlavacek, “Managing Security Through M&A”

3.  Patrick Kelley, “The Ghost in the Machine: Managing Non-Human Identities and Agentic AI”

Tuesday,
April 28

Zoom Meeting
Meeting ID: 852 5476 3895
Passcode: KSUCybr26

Guest Host: Wes Rhea

1. Gideon Rasmussen, “Prompt Engineering - Produce Breakthrough Results”

2. Stephen Omorogbe, "Topic TBD"

3. Samson Adewale. “Detection Engineering in Today's Threat Landscape”

January 14, 2026

 

Jermaine Green, Keeping The Lights On: Auditing Critical Infrastructure

Kyle Meyer, I suck at coding. Claude senpai, make me malware

Nidhi Srivastava, GRC and GRC Engineering -  Transforming Governance, Risk, and Compliance

January 27

 

Juan Villareal,
Mitigating the Cyber Risks of Battery Energy Storage Systems Supplied from China

 Jeff Apolis,
Security from the Start: Maximizing Business Value Through Secure Software Development Strategies

Malcolm Harkins,
Economic Impact of Securing AI

February 11

 

Phillip Mahan, Topic TBD

Ahmed Awad, Preparing for Quantum Computing

Matthew Larson,
Privacy in a Data-Driven AI World

February 24

 

Samuel Aiello, Governing the Ghost in the Machine: RMF Strategies for the Agentic AI Era

Stephen Brown, Cybersecurity Incident Response

 

Cybersecurity Speakers From Prior Sessions

Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with Kennesaw State University credentials: