
2024
3rd Annual.
North Carolina Cybersecurity Symposium
Speakers wall
KEYNOTE SPEAKERS

Cynthia Kaiser
Deputy Assistant Director, FBI Cyber Division
​
2/22
THURSDAY
MORNING

DR. JEFF CRUME
IBM Distinguished Engineer, CTO IBM Security
​
2/22
THURSDAY
AFTER LUNCH

CATHY OLIESLAEGER
Journey Into Cybersecurity
Podcast Host
​
2/22
THURSDAY
AFTERNOON

SAMUEL
CAMERON
Cisco Systems Supply Chain Security Architect

CHAD
RYCHLEWSKI
Public Service Cybersecurity Lead, Accenture

Jordan
ferns
SailPoint - Sr. Account Executive SLED

CHUCK
KESLER
Chief Information
Security Officer

MARIA
THOMPSON
AWS SLG Executive
Government Advisor

KEN
ALLEN
Cloud Security and Transformation Advisor

Srinivasan Vanamali
Principal, Olympus Infotech, LLC

SIMI
JAFARIKHAH
Assistant Professor of Computer Science at UNCW

Sammie Carter
Systems Architect, Friday Institute / NCSU

Amir Lawrence
Cybersecurity Specialist,
The Friday Institute

Ken Taitingfong
Senior Security Engineer - Cisco Systems, Inc.

Jon Sternstein
Founder & CEO,
Stern Security

Phillip Maddux
Systems Architect, Friday Institute / NCSU

NEIL KHatod
CISO, Hays Americas

Joshua Beck
Staff Application
Security Engineer

Larry Maccherone
DevSecOps Transformation

Lisa Bradley
Dell - Sr. Director Product
and Application Security

Kelsey Merriman
Senior Threat Researcher
@ Proofpoint

Chris Romeo
CEO, Devici
​
.jpg)
LAURA
RODGERS
Director of Cybersecurity Practice, NCSU

Doug Lewis Sr.
North Carolina State University, Cybersecurity Risk Specialist
and Architect

STEVE
COBB
CISO, SecurityScorecard

TERRENCE
HERNANDEZ
Continuous Improvement and Continuous Development
​
.jpg)
Seyedhossein SiadatiS
Adjunct faculty University of North Carolina Wilmington

Omar Santos
Cisco

Chris McCoy
Principal Engineer,
Cisco Systems

Elizabeth Cole-Walker
Cybersecurity Champion
​

DAVID RANKIN
DBR Cybersecurity LLC; Adjunct Professor Information Assurance UNC Chapel Hill

Aliyana Isom
Nike, Sr. Technical
Program Manager

Sphurthi Annamraju
Director, CyberSecurity Advisory

Anthea Gonzalez
Cisco Systems, Information Security Engineer

CASEY
FORREST
Chief Information Security Officer, UNC Greensboro

Phillip Maddux
Deception Logic, Founder

•

Adrianne George
Founder, MyCyberExec
​

SOUNIL
YU
Creator of the Cyber Defense Matrix and the DIE Triad
.jpg)
Laura Rodgers
Director of Cybersecurity Practice, NCSU

Myriam Batista
Chief Information and Compliance Officer @ Reef Systems

Daniel Barber
Second Renaissance
Founder and President

Mardecia Bell
NC State University, Chief Information Security Officer

Donna Petheridge
Vice Provost, Digital Education& Learning Technology Applications
%20Brown.jpg)
Kelly
brown
UNC School of Medicine IT, Deputy Chief Information Officer

Larry Macherone
DevSecOps Transformation

Aaron
lancaster
vCISO and Chief Information Security Officer at General Informatics
STUDENT RESEARCHERS

VARUN
MADATHIL
Final year, Ph.D. Student, NCSU
.jpg)
Lorenzo Neil
UNC School of Medicine IT, Deputy Chief Information Officer

Abdulrahman Aldkheel
PhD candidate and Research
Assistant at UNCC
.jpg)
Chibuike Okekeogbu
Graduate Research Assistant for the Center of Excellence in Cybersecurity Research
.png)
JASON
GREEN
PhD Student at NCAT University
_edited.jpg)
Bedeabasi John
Centre of Excellence in Cybersecurity Research, Education and Outreach

Mahsa Tavasoli
Computer System Technology program , College of Science and Technology, NCA&T

Tiffany Davis-Stewart
Master of Science in Information Technology Degree-NC A&T State Univ.

Abhinaya S B
PhD student at NC State

BRIAN
TORRES
University of NC at Pembroke

ELIZABETH
LIN
PhD student at NC State

Yanping Zhang
PhD candidate at Duke University

K. VIRGIL ENGLISH
PhD Student - WSPR Lab

SATHVIK PRASAD
PhD Candidate at
NC State University
.jpg)
BRIANNA PHIFER
NCCU '24 Senior Student

FEYF OSMAN
NC Central University
'26 Student

Greg Tystahl
PhD Student under Dr. William Enck and Dr. Alexandros Kapravelos

Mykah Stone
Student – NCCU

Matthew Swepson
Student – NCCU
.png)
COLE HEARLD
Computer Science Student at East Carolina University

IMRANUR RAHMAN
Graduate Research Assistant
at WSPR Lab of NC State

ELIJAH
TRIPP
Graduate Student at
UNCW – RezLab
.jpg)
ELIF
SAHIN
MSCSIS Student University of North Carolina Wilmington
