Image

Cybersecurity Summit

Oct. 23, 2024, 8 a.m.-4:30 p.m. WMU Student Center
presented by the Office of Information Technology and People Driven Technology, Inc.
Image

Oct. 23, 2024

WMU Student Center, 8 a.m.-4:30 p.m.
People Driven Technology, Inc.

People Driven Technology, Inc.

Our Root Level sponsor is People Driven Technology, Inc.
Image

Sponsorship

Help make the event a success!

It takes all members of the community to create a secure environment

The WMU Cybersecurity Summit seeks to inform participants of best practices for increasing individual cybersecurity awareness, learn more about cybersecurity in the educational setting, and serve as a networking opportunity within the West Michigan community.

When?

Wednesday, Oct. 23, 2024
8 a.m.-4:30 p.m.

Where?

WMU Student Center

The Cybersecurity Summit will take place in the WMU Student Center's second-floor ballroom, and rooms 2209, 2211, and 2213, on WMU's main campus. For directions and more information about the location visit wmich.edu/student-center

Who should attend?

  • IT directors, staff, and their supervisors
  • higher ed leadership and decision-makers
  • IT and business-focused instructors and students
  • K-12 educational partners
  • local and state security professionals

Schedule

Oct. 23, 2024, 7:30 a.m.-4:30 p.m.

Please note that the schedule is subject to change. We will make every effort to adhere to the planned agenda, but adjustments may be necessary to accommodate unforeseen circumstances.

Morning schedule 

Takes place primarily in Ballroom A/B

 

Exhibitor, vendor, and sponsor check-in starts at 7:30 a.m.

Attendee check-in starts at 8 a.m.

A continental breakfast will be served from 8-9 a.m. the perfect opportunity to network and talk with your fellow attendees and cybersecurity aficionados.

Welcome to the morning and introduction to the summit from CIO, Andrew Holmes and Security and Privacy Officer, Charles Norton.

18 Things I Have Learned During 30+ Incident Response Events

Daniel Heidt–People Driven Technology Inc.
In this session, we will discuss “Bad Actor” tactics and their methodologies as it pertains to cyber defense and recovery. We will also leverage examples of successful and failed results. We will deep dive into the architectures that can improve cyber security posture and recoverability. With this knowledge, you should feel more empowered to build a better defense to protect your long-term business goals. Follow-up sessions will be made available to continue the discussion to address attendees' particular needs and concerns.

10-minute break. Visit the Student Center website for building maps and amenities.

Attacking GenAI: The OWASP Top 10 for LLM Applications

Dell
Justin Vogt, Principal Security Engineer

This session explores the unique security challenges posed by Generative AI (GenAI) and Large Language Models (LLMs). We’ll break down the OWASP Top 10 vulnerabilities for LLM applications, discussing real-world examples and practical strategies for protecting AI systems against attacks like prompt injection, model theft, and data poisoning. Join us to learn how to apply essential security practices to ensure the safe deployment and use of GenAI technologies.

Cyber Resilience Maturity

Dell
Xavier Chapa, Advisory Solutions Principal

This session talks through the current challenges Organizations are facing as they look to improve their Cyber Resilience posture. We will explore Dell’s Cyber Resilience Maturity model that was developed on industry best practices and leveraging 20+ years of Resiliency expertise to help navigate this journey. Join us as we share industry insights, and best practices on how we meet our Customer’s evolving Cyber Resilience requirements.

 

Grab a boxed lunch and explore the campus. Or, just grab your boxed lunch and hang out around the Student Center with your fellow cybersecurity enthusiasts.

Afternoon schedule 

Takes place in Ballroom A/B and rooms 2209, 2211, and 2213. You can pick which session or speaker you want to attend.

Welcome to the afternoon from CIO, Andrew Holmes and Security and Privacy Officer, Charles Norton.

Speaker (Ballroom A/B)
Building Blocks for a Strong Security Program

Brian Gawne-CDW
The key to a strong security program is its foundational components. Just as we build houses, the order in which we put the pieces together is important and can impact the success of a cybersecurity program. What building blocks are missing from your security program?

A strong cybersecurity program is key to protecting corporate assets and the organization itself. Understanding all the cybersecurity building blocks which are necessary and the impact they can have on your program is important. This session discusses the most common building blocks, how they make an impact, why they are important, and how the information they provide can help guide your security program while ensuring that it aligns with business goals, client expectations, and local, state, or federal regulations.

Cybersecurity Jeopardy (Room 2209)
People Driven Technology, Inc.

Women in Security and Technology
Staff/Faculty Discussion Panel (Room 2211)
Moderator: Sarah Cheatham
Join us for a moderated panel featuring faculty and staff discussing the contributions and experiences of women in the security and technology fields. Everyone is welcome to bring their questions and participate in the discussion.

Cybersecurity Foundations and Career Paths
Student Discussion Panel (Room 2213)
Moderator: Caden Carr
A moderated panel featuring students from the Bronco Cybersecurity Club and Business Analytics and Information Technology (BAIT) registered student organizations. Bring your questions and discussions.

10-minute break. Visit the Student Center website for building maps and amenities.

Speaker (Ballroom A/B)
Matthew Aubert-Cisco Talos

Cybersecurity Jeopardy (Room 2209)
People Driven Technology, Inc.

Protected Health Information and HIPAA Data Security
Staff Discussion Panel (Room 2211)
Moderator: Adam Newsted
Join us for a moderated panel featuring staff to learn about protected health information (PHI), the Health Insurance Portability and Accountability Act (HIPAA), how these data classifications, privacy rules, and security practices are applied to the university, and how to protect your data and others. Everyone is welcome to bring their questions and participate in the discussion.

Technology, Business, and Cybersecurity Integration
Student Discussion Panel (Room 2213)
Moderator: Evey Ortiz-Martinez
A moderated panel populated by students, to talk cybersecurity, RSOs, technology, business, student life, work/life/school balance, and more. Bring your questions and discussions.

10-minute break. Visit the Student Center website for building maps and amenities.

Speaker (Ballroom A/B)
Scott Pierce, Sentinel
Cybersecurity—Knowing your risks

Cybersecurity Jeopardy (Room 2209)
People Driven Technology, Inc.

Staff/Faculty Discussion Panel (Room 2211)
Moderator: Adam Newsted
A moderated panel populated by faculty and staff, partnered with an expert to talk about the main topic and other cybersecurity topics. Bring your questions and discussions.

Student Life, Work-Life Balance, and Future Outlook
Student Discussion Panel (Room 2213)
Moderator: Evey Ortiz-Martinez or Caden Carr
A moderated panel populated by students, to talk cybersecurity, RSOs, technology, business, student life, work/life/school balance, and more. Bring your questions and discussions.

10-minute break. Visit the Student Center website for building maps and amenities.

Closing remarks and wrap-up from CIO, Andrew Holmes and Security and Privacy Officer, Charles Norton.

Meet the speakers

Image
Certified Information Systems Security Professional (CISSP) with over sixteen years of leadership, innovation, and a drive in the local government sector. Recently made the leap to higher education with a dedicated focus on security and privacy. Spends his days partnering with business leaders across the University to help guide and encourage the culture of security and privacy at the heart of everything we do.

Image

An innovative, collaborative team builder and complex problem solver with more than 20 years of higher education administration and executive leadership experience. Relentless culture mechanic and proponent for positive, progressive change. Deeply values transparency and transformative thinking. Constantly seeks opportunities to empower people and teams to develop their talents and creativity, and utilize their experiences, diverse perspectives, and knowledge.

Bronco Cybersecurity Club

The Bronco Cybersecurity Club stands as a vibrant community, uniting individuals with a common passion for cybersecurity. Our doors are open wide, welcoming enthusiasts from every academic avenue. Here, whether you're majoring in computer science or marketing, your presence is not just welcomed – it's celebrated. Join us, and together we'll unravel the captivating mysteries of cybersecurity.

Business Analytics and Information Technology (BAIT)

The Business Analytics and Information Technology (BAIT) association strives to educate students on the importance of technology within the business world. We focus on how technology affects every industry, and we provide opportunities for networking, professional development, and social events.

Daniel Heidt

Daniel Heidt is a long-time technology fanatic with a passion for customer & employee satisfaction. There is an argument that he has always been in the technology industry as he followed computing infrastructure trends from a very young age. A passion for problem solving and collaborating with others led to helping companies with network, network security, and Y2K remediations in the late 90's; then things got interesting. Daniel spent a significant part of his career unraveling technical debt and securing mission-critical infrastructure with Higher Education and Local Government including Airports and Utilities. Daniel has a fierce desire to bring enterprise experience to all customers. Taking the time to discover the customer’s technical details, ROI, and desired business outcomes is where the journey begins. Daniel is focused on the people and sharing strategies for creating a successful Hybrid Cloud journey. Join him for a smart conversation and make a friend.

Justin Vogt

I am a Principal Security Engineer at Dell Technologies, where I lead the enablement of our security sales engineering organization. My role involves close collaboration with Dell's Office of the CTO and the Dell Product Group, where I work to shape the development of new security products and services based on direct customer feedback. In addition, I coordinate development efforts with our partner engineering teams and technology partner development teams to ensure the continuous advancement of security solutions.

With a strong foundation in Endpoint Security, Network Security, and Cloud Security, I am deeply involved in helping organizations enhance their security posture and build resilient infrastructures. My focus is on aligning innovative security strategies with real-world challenges, enabling customers to safeguard their most critical assets. I am passionate about sharing my expertise with technology professionals and students, and I actively contribute to discussions on the future of security technologies.

Xavier Chapa

Experienced professional with over 20+ year in Information Technology. I have a broad background including Leadership roles in Higher Education where I have lead Infrastructure & Operations teams across multiple transformational initiatives. Over the last 8 years through my roles at SungardAS, IBM, and Dell Technologies I have been primarily focused on helping Customers across all industries proactively prevent, mitigate, and recover from destructive attacks on their critical data and quickly resume operations.

In my current role at Dell Technologies, I serve as a SME on our North American Security & Resiliency team that directly engages with customers, as well as internally helping to provide an interface between Sales, Product, and Marketing to ensure alignment on strategy across our organization. Additionally, I am responsible for a global program that focuses on helping organizations mature their Cyber Resiliency posture and programs.

I bring experience from co-creating with our customers some of the most advanced Cyber Resiliency projects that Dell has delivered. I believe in joint success between our customers and Dell, and delivering outcomes which meet our customers objectives as well as providing value to their end stakeholders.

Brian Gawne

Brian has over 30 years working in the information security field. His experience includes consulting with global clients on the topics of security management programs, risk assessment methodology, design and implementation of security technologies, GRC solutions, forensics, e-discovery, and risk mitigation.


He has a deep knowledge of security organizational concepts, program and policy development, security frameworks and standards, associated government regulations, and a technical knowledge of network, system and digital forensic investigation. Prior to joining Access Interactive, he held leadership positions with multiple national privately held services firm focusing on Security and Compliance, Forensics, and E-Discovery. Brian also co-founded two security companies which offered security consulting and managed security services. Brian also served as the Assistant Director of the Information Assurance Center at Walsh College which was designated as a “Center of Excellence” by the National Security Agency (one of only 50 in existence at the time of the award) and is a lecturer on security and networking topics.

Scott Pierce

Scott is a proud Bronco and WMU graduate and has been helping clients improve their Cybersecurity Hygiene and reduce their risks of breaches and attacks for the last 20 years.

Matthew Aubert

Matthew serves as a Senior Manager on Cisco Talos Incident Response team. Prior to joining Cisco, Matt served nine years in the United States Marine Corps as a Cyber Systems Chief in addition to various public/private sector roles as a Malware and Digital Forensic Analyst. 

Matt has a M.S. in Digital Forensic Science from Champlain College and a Graduate Certificate in Business Management. Matthew holds multiple industry certifications to include the GIAC Reverse Engineer Malware (GREM), GIAC Certified Forensic Analyst (GCFA), and the Certified Information Systems Security Professional – Information Systems Security Management Professional (CISSP-ISSMP).  

Matt currently lives in Michigan with his wife and two sons.

People Driven Technology, Inc.

People Driven Technology, Inc is a customer-obsessed organization. We are a local, family-owned business that focuses on consumable outcomes for our clients. We leverage our decades of combined business, technology, and engineering experience to deliver these outcomes in a methodical manner.

Parking

Parking for the day event will be available in Lot 41 at no charge.

Visit the Campus Maps website for additional campus and parking information.

Meals

Breakfast

Continental breakfast will be served from 8-9 a.m.

Lunch

Lunch will be served from 11:30 a.m.-12:30 p.m.

Catering by Maggie’s Café & Catering

Maggie’s Café & Catering

Event T-shirt

As part of this year's event, we've partnered with All Creatures Deserving, a local non-profit, to provide an event t-shirt. The shirt will feature the "See a Link? Stop and Think!" design on it and will be offered as a fundraising opportunity to support All Creatures Deserving. Learn more about the event t-shirt on the All Creatures Deserving website.

Planning Committee

Thank you!

The 2024 planning committee was comprised of a diverse group of departments and colleges at WMU.

Andrew Holmes
Chief Information Officer
Office of Information Technology

Charles Norton
Security & Privacy Officer
Office of Information Technology

Alaina Tuohy
Director Advancement Services
University Advancement

Cristine Gaines
Business Manager
Office of Information Technology

Adam Newsted
Dir Strategic Project & Service Management
Office of Information Technology

Joan Amos
Budget Analyst Sr
Office of Information Technology

Sarah Cheatham
CRMS Project & Training Spec
Enrollment Management

Tony Hendrix
Associate Director Information Systems
Student Affairs Information Services

Evey Ortiz-Martinez
Cybersecurity Student
President of Bronco Cybersecurity Club

Trevion Thomas
Program Manager Cybersecurity
Business Information Systems

Katie Marshall
Faculty Specialist I of Business Information Systems
Business Information Systems

Garald (Gary) Barton IV
Marketing Manager
Office of Information Technology