PAST CONFERENCE ATTENDEES
A dynamic and growing number of organizations have contributed to the success of this conference, including AccessData, Argonne National Laboratory, Authentify, the Chicago Police Department, Cisco, CompTIA, Computer Associates, the FBI, Fermilab, Fortinet, Guidance Software, IBM, IEEE, KPMG, Microsoft, Motorola, Sungard, UniForum, U.S. Army, X-Ways Forensics, and many others. Speakers and participants continue to represent local, regional, national, and international organizations and universities.
MISSION OF CHICYBERCON
This conference aims to be a source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology (Illinois Tech) as a National Center of Academic Excellence in Cyber Defense Education. The university’s Center for Cyber Security and Forensics Education (C2SAFE) is at the core of Illinois Tech’s designation.
2022 Keynote Speakers and Agenda
We are currently working on our 2023 keynote speakers and agenda. Check back often for updates.
2022 Speaker Sessions
We are currently working on our 2023 speakers. Check back often for updates.
Assistant Vice-Chancellor, CISO and CTOUniversity of Tennessee Health and Science Center (UTHSC) Cybersecurity Literacy
Security Architect / Adjunct ProfessorIBM/Capitol Technology University An Exploratory Study into Vulnerability Chaining Blindness
Head of Engineering / Office of the CTOCheck Point Software The Decline and Fall of the (Roman Empire) Traditional Data Center
CTO at WitFooWitFoo.com Machine Learning in PsyOps & Social Engineering
Principal Scientist, Human Behavior and AnalyticsForcepoint Methods for Building Trust in Analytics to Improve Cyber Situation Awareness
Dr. Stephanie Carter, CISSP, CISM, CRISC, CCSK, CISA
PrincipalCoalFire Systems Inc Overcoming Container Security Risks
Executive DirectorGRCIndex (dba, Cognitive Risk Institute) Quantifying Human Factor Impacts in Cybersecurity
Vice President – Strategic SolutionsDivIHN Integration Inc. Choosing a Career Path in Cybersecurity
Lead Audit Manager-Information Security / Cybersecurity Adjunct Professor Wells Fargo/Maryville University Cyberattacks on These Most Vulnerable US Organizations Could Have the Greatest Adverse Impact
Assistant ProfessorCampbellsville University Artificial Intelligence and Cybersecurity
Construction and Real Estate Industry Lead / Chief Information Officer and Executive Advisor Hartman Executive Advisors Aligning Cyber Security Practices with Corporate Safety Programs
Deputy, Assistant Chief of Staff, G3 OperationsU.S. Army Critical skills for Army Cybersec professionals, IT Modernization, Persistent engagement, and Preparing a Cybersec workforce for Cyber.
U.S. Army Cyber Command, G1 Programs and Policy DivisionU.S. Army Army internships for cybersecurity and integrating college graduates (civ) in the Army Cyber workforce
Graduate StudentIllinois Institute of Technology Ways of an Effective Cyber Incident Management
Human Factors Performance Leadscoutbee Adapting the Human Factors Analysis Classification System (HFACS) to Cybersecurity
Dr. Dustin Fraser
Adjunct Cybersecurity InstructorCooper Union Cybersecurity Skills in Developing Countries
Director and Chair of Cybersecurity and Data Privacy Practice GroupCrowe & Dunlevy The Multiverse of Madness: Navigating the 50-State Approach to Privacy and Security
Assistant ProfessorSaint Leo University Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts
Director – Magnet Digital Investigation Suite (MDIS)Magnet Forensics Augmenting the Cybersecurity Workforce Shortage With Automation
Maurice Dawson Jr., Ph.D., D.CS., SMIEEE, CSSLP, CGEIT, CCISO, CDPSE
Director of IIT Center for Cyber Security and Forensics Education (C2SAFE)Assistant Professor of Information Technology and Management Illinois Institute of Technology Illinois Institute of Technology An Overview of the Cybersecurity Profession
Senior Director of CybersecurityMxD Overview of the DoD Cybersecurity Maturity Model Certification (CMMC) Program
Join the more than 200 students and practitioners who attend this fun-filled technical conference each year. This is a multitrack, industry-focused event that includes discussion on forensics, security, data/information governance, cybercrime and security, cybersecurity legislation, ethical hacking, cloud forensics, steganography, policy and compliance, identity theft, and more.
Please reach out via email if you have any questions. We’re here to provide help in any way we can.Email: email@example.com