PAST CONFERENCE ATTENDEES
A dynamic and growing number of organizations have contributed to the success of this conference, including AccessData, Argonne National Laboratory, Authentify, the Chicago Police Department, Cisco, CompTIA, Computer Associates, the FBI, Fermilab, Fortinet, Guidance Software, IBM, IEEE, KPMG, Microsoft, Motorola, Sungard, UniForum, U.S. Army, X-Ways Forensics, and many others. Speakers and participants continue to represent local, regional, national, and international organizations and universities.
MISSION OF CHICYBERCON
This conference aims to be a source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology (Illinois Tech) as a National Center of Academic Excellence in Cyber Defense Education. The university’s Center for Cyber Security and Forensics Education (C2SAFE) is at the core of Illinois Tech’s designation.
Visit llinois Tech’s C2SAFE
Meet the ChiCyberCon Speakers
Assistant Vice-Chancellor, CISO and CTO
University of Tennessee Health and Science Center (UTHSC) Cybersecurity Literacy
Security Architect / Adjunct Professor
IBM/Capitol Technology University An Exploratory Study into Vulnerability Chaining Blindness
Head of Engineering / Office of the CTO
Check Point Software
The Decline and Fall of the (Roman Empire) Traditional Data Center
CTO at WitFoo
Machine Learning in PsyOps & Social Engineering
Principal Scientist, Human Behavior and Analytics
Methods for Building Trust in Analytics to Improve Cyber Situation Awareness
Dr. Stephanie Carter, CISSP, CISM, CRISC, CCSK, CISA
CoalFire Systems Inc
Overcoming Container Security Risks
(dba, Cognitive Risk Institute) Quantifying Human Factor Impacts in Cybersecurity
Vice President – Strategic Solutions
DivIHN Integration Inc.
Choosing a Career Path in Cybersecurity
Lead Audit Manager-Information Security / Cybersecurity Adjunct Professor
Wells Fargo/Maryville University Cyberattacks on These Most Vulnerable US Organizations Could Have the Greatest Adverse Impact
Campbellsville University Artificial Intelligence and Cybersecurity
Construction and Real Estate Industry Lead / Chief Information Officer and Executive Advisor
Hartman Executive Advisors Aligning Cyber Security Practices with Corporate Safety Programs
Deputy, Assistant Chief of Staff, G3 Operations
U.S. Army Critical skills for Army Cybersec professionals, IT Modernization, Persistent engagement, and Preparing a Cybersec workforce for Cyber.
U.S. Army Cyber Command, G1 Programs and Policy Division
U.S. Army Army internships for cybersecurity and integrating college graduates (civ) in the Army Cyber workforce
Illinois Institute of Technology Ways of an Effective Cyber Incident Management
Human Factors Performance Lead
scoutbee Adapting the Human Factors Analysis Classification System (HFACS) to Cybersecurity
Dr. Dustin Fraser
Adjunct Cybersecurity Instructor
Cooper Union Cybersecurity Skills in Developing Countries
Director and Chair of Cybersecurity and Data Privacy Practice Group
Crowe & Dunlevy The Multiverse of Madness: Navigating the 50-State Approach to Privacy and Security
Saint Leo University Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts
Director – Magnet Digital Investigation Suite (MDIS)
Magnet Forensics Augmenting the Cybersecurity Workforce Shortage With Automation
Maurice Dawson Jr., Ph.D., D.CS., SMIEEE, CSSLP, CGEIT, CCISO, CDPSE
Director of IIT Center for Cyber Security and Forensics Education (C2SAFE)
Assistant Professor of Information Technology and Management
Illinois Institute of Technology
Illinois Institute of Technology An Overview of the Cybersecurity Profession
Senior Director of Cybersecurity
MxD Overview of the DoD Cybersecurity Maturity Model Certification (CMMC) Program
Job Fair Participants
Recruit at the conference – register for free company participation
Get recruited – register to participate in the job fair
Join the more than 200 students and practitioners who attend this fun-filled technical conference each year. This is a multitrack, industry-focused event that includes discussion on forensics, security, data/information governance, cybercrime and security, cybersecurity legislation, ethical hacking, cloud forensics, steganography, policy and compliance, identity theft, and more.
Please reach out via email if you have any questions. We’re here to provide help in any way we can.