Image

Cybersecurity Summit

Oct. 9, 2025, 8 a.m.-4:30 p.m. WMU Student Center
presented by the Office of Information Technology
Image

Registration

Registration closed
Oct. 6 at noon.

Image

Oct. 9, 2025

WMU Student Center, 8 a.m.-4:30 p.m.

Image

Speakers/Sessions

Additional speakers and sessions will be added as we confirm event details.

Image

Sponsorship

Help make the event a success!

Cybersecurity for All: Empowering Every Digital Citizen

From Students to CEOs, from Coders to Consumers—Everyone Has a Role in Cybersecurity.

In today's interconnected world, cybersecurity is no longer just the domain of IT professionals—it’s a shared responsibility. The 4th Annual Cybersecurity Summit embraces this reality with open arms and welcomes everyone, regardless of background or expertise. Whether you're a student exploring career paths, a professional shaping digital strategy, a tech expert defending networks, or a community member protecting your personal data, this summit offers insights, tools, and connections tailored to your journey.

When?

Thursday, Oct. 9, 2025
8 a.m.-4:30 p.m.

Where?

WMU Student Center

The Cybersecurity Summit will take place in the WMU Student Center's second-floor ballroom, and adjacent rooms. For directions and more information about the location visit wmich.edu/student-center

Who should attend?

  • IT directors, staff, and their supervisors
  • Higher ed leadership and decision-makers
  • IT and business-focused instructors and students
  • K-12 educational partners
  • High school tech and cybersecurity students
  • Local and state security professionals
  • Small business owners and entrepreneurs
  • Community leaders and nonprofit organizations
  • Public service professionals
  • Anyone who uses the internet and wants to stay safe online and be part of the Cybersecurity conversation.

Pathways

This year’s event has something for everyone and emphasizes the idea that cybersecurity is not one-size-fits-all—it’s a dynamic, inclusive field where everyone plays a part. The 4th Annual Cybersecurity Summit offers 4 pathways, so you can make the most of your attendance. You also have the flexibility to mix and match sessions across all tracks, empowering you to create a personalized summit experience tailored to your interests, goals, and schedule.

Cybersecurity Foundations & Futures (student pathway)

This path is designed to introduce students to the real-world landscape of cybersecurity. Attendees will gain insights from industry leaders, explore career pathways, and connect with registered student organizations and other student-focused exhibitors. Sessions will focus on foundational cybersecurity concepts, emerging threats, and how to prepare for internships and entry-level roles. The networking breakfast and lunch provide excellent opportunities to meet mentors and potential employers.

Leadership in Cybersecurity Strategy (professional pathway)

This path emphasizes strategic cybersecurity planning, risk management, and leadership in digital security. Professionals will explore how to align cybersecurity initiatives with organizational goals, manage compliance, and foster a culture of security awareness. The summit offers a platform to exchange best practices with peers and learn from case studies in higher education and business environments.

Cyber Defense & Innovation (tech pathway)

This path dives into the technical side of cybersecurity, offering sessions on threat detection, incident response, and the latest tools and technologies. Attendees will benefit from practical demonstrations, peer discussions, and insights from cybersecurity professionals and industry leaders. It’s perfect for those looking to sharpen their skills and stay ahead of evolving cyber threats.

Everyday Cyber Safety (consumer/end-user pathway)

This path focuses on practical cybersecurity knowledge for everyday life. Attendees will learn how to recognize scams, protect their digital identities, and secure their home networks and devices. Sessions are designed to be accessible and engaging, with real-world examples and tips that anyone can apply—no technical background required. This is a great opportunity to become more confident and informed in today’s digital world.

Schedule

Oct. 9, 2025, 7:30 a.m.-4:30 p.m.

Please note that the schedule is subject to change. We will make every effort to adhere to the planned agenda, but adjustments may be necessary to accommodate unforeseen circumstances.

Morning schedule 

Takes place in Ballroom A/B and adjacent rooms.

Exhibitor, vendor, and sponsor check-in starts at 7:30 a.m.

Attendee check-in starts at 8 a.m.

A continental breakfast will be served from 8-9 a.m. the perfect opportunity to network and talk with your fellow attendees and cybersecurity aficionados.

Welcome to the morning and introduction to the summit from CIO, Andrew Holmes.

Keynote Speaker: Brett Leatherman, FBI Cyber Division - Assistant Director

Acting with Urgency: How the FBI Defends America in Cyberspace

Nation-state and cyber criminals pose a growing threat across the globe for cyber espionage and cyber attacks. The FBI leverages its unique authorities, world-class capabilities, and enduring partnerships to provide support to victims of cyber intrusions and detect, deter, and counteract adversaries in an increasingly complex cyber environment. This session with FBI Cyber Division Assistant Director Brett Leatherman will provide an overview of the current cyber threat landscape, including emerging cyber threat trends, tactics and objectives utilized by cyber adversaries, and key elements of successful collaboration between the FBI and partners in preventing and responding to cyber incidents.

10-minute break. Visit the Student Center website for building maps and amenities.

Ballroom A/B
Cybersecurity Foundations & Futures (student pathway)
Kane Greer, City of South Bend (WMU Alum) - Cybersecurity Specialist

From University, Government and Everything In Between 

Kane will share his unique journey at WMU, highlighting how he developed a growth mindset and adaptability. He’ll discuss how these traits helped him secure and strive in his current role, offer insights into the transition from student life to a career in government, and reflect on the key lessons he has learned along the way. This will be an interactive forum with plenty of opportunities for questions and open dialogue throughout. 

Room 2207
Everyday Cyber Safety (consumer/end-user pathway)
Eric Marchewitz, CDW - Senior Field Solutions Architect

Everyday Cyber Safety

Join Eric Marchewitz, CDW cyber security architect on a journey on how to protect yourself at home and abroad. Cyber security at home is one of the most neglected areas of computer hygiene. Common scams are used against all individuals in a “shotgun” approach. Romance scams alone cost the US consumers over 1.3 billion dollars annually. Learn how to be a cyber security advocate for yourself and those vulnerable populations you touch (grand parents, parents and community members) along with some of the more unique ways that simple cyber hygiene can protect you and those around you from cyber crime!  Learn how a $42 dollar watch and one bad click caused an international criminal effort and how to keep protected along with free tools to help reduce exposure!

Room 2209
CTF Facilitation

Room 2211
Leadership in Cybersecurity Strategy (professional pathway)
Tim O’Connor, Cadre - CISO and Manager of Knowledge Services

Is Effective Employee behavior change for cyber-security human factors possible?

Is it truly possible to change employee behavior to improve cybersecurity outcomes? This engaging and interactive session explores how effective Security Awareness programs can go beyond basic training to foster a mature security culture. By leveraging adult learning principles and neuroscience, organizations can overcome common pitfalls—such as employee apathy or resistance—and drive meaningful behavior change. Attendees will gain insights into designing impactful programs, measuring human factor controls, tailoring awareness for all roles (including executives), and integrating modern technologies like AI, cloud, and mobile into their strategy.

Room 2213
Cyber Defense & Innovation (tech pathway)
Xavier Chapa, Dell – Principal Solutions Principal - Resiliency & Security

Incident Response & Recovery – Insights and Lessons Learned 

Dell’s Global Incident Response & Recovery practice has responded to some of the most complex and high-impact cyber breaches worldwide.  This session will focus on sharing best practices and lessons learned to help organizations and security professionals prepare for a destructive event.  Participants will gain an understanding of people, process, and technologies that help create an efficient and effective recovery.  

Gathering Stairs
Cybersecurity Jeopardy
People Driven Technology, Inc.

Grab a boxed lunch and explore the campus. Or, just grab your boxed lunch and hang out around the Student Center with your fellow cybersecurity enthusiasts.

Afternoon schedule 

Takes place in Ballroom A/B and adjacent rooms.

Welcome to the afternoon from CIO, Andrew Holmes.

Ballroom A/B
Leadership in Cybersecurity Strategy (professional pathway)
Tom Sinnott, CDW - Field CISO

Navigating the Cybersecurity Career Path for Professionals 

As cybersecurity keeps evolving, so do the opportunities and challenges for professionals carving out their careers in this dynamic field. In this session, we'll dive into practical strategies to help cybersecurity pros navigate career opportunities, build leadership skills, and stay on top of emerging trends and technologies. 

Room 2207
Everyday Cyber Safety (consumer/end-user pathway)
Eric Woelfel, Resilience - Senior Security Solutions Engineer

Security Best Practices for Students and Home Users

The world of cybersecurity is evolving very quickly. How can students and home users protect themselves from modern threats? We'll dive into simple things folks can do at home and at University to significantly reduce their cyber risk.

Room 2209
Cybersecurity Foundations & Futures (student pathway)
Brian Gogan, WMU - Professor of English 
WRAVEN, WMU - RSO

Thwarting Phishing Attempts with GAI Prompting

Learn foundational generative artificial intelligence (GAI) prompting strategies and how to apply these strategies to avoid future phishing attempts. This presentation will introduce attendees to three levels of GAI prompting strategies and then demonstrate how these strategies can be used to identify and respond to phishing emails.

Room 2211
CTF Facilitation

Room 2213
Cyber Defense & Innovation (tech pathway)
Andy Brush, Cybersecurity Advisor – Brush Consulting, LLC 

Cyber Incident Response - getting ready for your bad day 

Work through a few mini tabletop exercises and explore incident response templates that you can start using today. 

Gathering Stairs
Cybersecurity Jeopardy
People Driven Technology, Inc.

10-minute break. Visit the Student Center website for building maps and amenities.

Ballroom A/B
Cyber Defense & Innovation (tech pathway)
Brian Gogan, WMU - Professor of English 
Brian Chalfant, WMU - Cybersecurity Analyst

Red Team/Blue Team: GAI Prompting Strategies

Gain the strategic edge in cybersecurity with Generative Artificial Intelligence (GAI). This panel will equip blue teams with GAI-driven strategies to simulate attacks, and train analysts on generated data. This panel will also teach red team members how to leverage GAI to expose hidden data and vulnerabilities.

Room 2207
Everyday Cyber Safety (consumer/end-user pathway)
Erica Santana, Ninjio - Manager of Sales

The Anatomy of Digital Deception: Protecting Loved Ones Through Cyber Education 

Scams don’t just happen—they are engineered. Whether it’s a child being lured through a gaming chat on Roblox, or a grandparent targeted by a convincing deepfake phone call and extorted, every attack follows a pattern. Cybercriminals exploit curiosity, trust, fear, and the gaps in our digital literacy. 

This talk will break down how modern scams are built, why they are so effective, and most importantly, how we can prevent them by educating those we love. By examining the psychological hooks behind fraud, manipulation, and exploitation, we’ll uncover the playbook criminals use and how to prevent our family and loved ones falling prey to the 10.5 Trillion dollar industry.  

Attendees will learn:

  • The most common entry points scammers use to target children and seniors.
  • Why these groups are especially vulnerable to manipulation in the digital age.
  • A practical approach to cyber education that empowers families to spot red flags, ask the right questions, and act before it’s too late. 

When we teach our loved ones to understand not just that risks exist, but how and why they happen, we turn fear into vigilance—and vigilance into protection. Cybersecurity begins at home, and education is our most powerful defense. 

Room 2209
Cybersecurity Foundations & Futures (student pathway)
WRAVEN, WMU – RSO

Inside Qilin: How Students Investigate Ransomware Gangs

This session explores how students in WMU’s WRAVEN cybersecurity research group conducted a real-world investigation into Qilin, a prominent ransomware group. Attendees will gain insight into the investigative process, tools, and methodologies used, and learn how complex threat intelligence work can be made accessible to students and early-career professionals.

Room 2211
Leadership in Cybersecurity Strategy (professional pathway)
WMU Faculty and Staff

HIPAA and Protecting PHI in the Digital Age Panel Discussion

Room 2213
CTF Facilitation

Gathering Stairs
Cybersecurity Jeopardy
People Driven Technology, Inc.

10-minute break. Visit the Student Center website for building maps and amenities.

Ballroom A/B
Everyday Cyber Safety (consumer/end-user pathway)
WRAVEN, WMU - RSO

Lock It Down: Simple Cyber Hygiene for Everyday Life 

WRAVEN shares practical steps anyone can take to protect themselves online. Learn how to spot common risks, protect yourself from hackers, reduce the amount of data you share, and build safer digital habits, no technical background required.

Room 2207
CTF Facilitation

Room 2209
Cybersecurity Foundations & Futures (student pathway)
Alan Rea and Jason Johnson, WMU - Co-directors of the Cybersecurity program

Insights and Updates about the Cybersecurity program at WMU

Room 2211
Leadership in Cybersecurity Strategy (professional pathway)
Brandon Smith, MC3 - Cybersecurity Intelligence Analyst

A strategic look at the state of Cyber Security in Michigan 

This presentation covers cybersecurity deficiencies found in Michigan after a year of doing cybersecurity assessments through all 16 sectors of critical infrastructure.

Room 2213
Cyber Defense & Innovation (tech pathway)
Eric Woelfel, Resilience - Senior Security Solutions Engineer

De-risking AI

AI is transforming how we work and make decisions. Join us for a presentation on how organizations can tap into the value of AI while managing its risks. We’ll cover real-world use cases, common pitfalls, and how to implement AI safely, including how to tackle ecosystem-wide threats.

Gathering Stairs
Cybersecurity Jeopardy
People Driven Technology, Inc.

10-minute break. Visit the Student Center website for building maps and amenities.

Closing remarks and wrap-up from CIO, Andrew Holmes.

Meet the speakers

Image

An innovative, collaborative team builder and complex problem solver with more than 20 years of higher education administration and executive leadership experience. Relentless culture mechanic and proponent for positive, progressive change. Deeply values transparency and transformative thinking. Constantly seeks opportunities to empower people and teams to develop their talents and creativity, and utilize their experiences, diverse perspectives, and knowledge.

Brett Leatherman, FBI Cyber Division - Assistant Director

Brett Leatherman is the Assistant Director of the FBI’s Cyber Division. Under Presidential Policy Directive 41, the FBI is the lead cyber threat response agency for the United States Government, and in this role, Mr. Leatherman serves as the senior executive managing the FBI’s strategy to impose cost on some of the most sophisticated cyber adversaries targeting US interests. Prior to this role, Mr. Leatherman held several key leadership roles within Cyber Division and the Dallas Division. Mr. Leatherman entered on duty as an FBI Special Agent in 2003. He first served in the Cleveland and Detroit Field Offices, while also serving as an FBI pilot and hostage negotiator. He graduated from Cornerstone University with a degree in Computer Information Systems and received a master’s degree in Cybersecurity Risk Management from Georgetown University. Mr. Leatherman holds several widely recognized cyber certifications and speaks domestically and internationally on emerging national security and cyber threats.

Kane Greer, City of South Bend (WMU Alum) - Cybersecurity Specialist

WMU Alum Kane will share his unique journey at WMU, highlighting how he developed a growth mindset and adaptability. He’ll discuss how these traits helped him secure and thrive in his current role, offer insights into the transition from student life to a career in government, and reflect on the key lessons he has learned along the way. This will be an interactive forum with plenty of opportunities for questions and open dialogue throughout.

Eric Woelfel, Resilience - Senior Security Solutions Engineer

Eric is a Senior Security Solutions Engineer at Resilience. He has 15 years of industry experience helping defend public universities against cyberthreats, starting in endpoint security and then moving to vulnerability management. He is currently focused on new security technologies and is an avid IOT tinkerer.

Erica Santana, Ninjio - Manager of Sales

Erica K. Santana is a passionate cybersecurity awareness evangelist and Manager of Sales at NINJIO Cybersecurity Awareness Training, where she helps organizations of all sizes empower their people to become the first line of defense against cyber threats. Ranked in the Top 10% of TryHackMe, Erica blends deep industry insight with an engaging, storytelling-driven approach to make cybersecurity approachable and memorable for everyone.

With a career spanning healthcare, Security compliance, and technology, Erica brings a unique perspective to digital safety. Before joining NINJIO, she held roles as a Senior Cyber Compliance Specialist at Mid-State Cyber and Business Development Manager at Gartner, where she honed her expertise in risk management, regulatory compliance, and enterprise technology strategy. Her professional journey began in nursing, giving her a natural ability to translate complex technical concepts into practical guidance for everyday users.

Erica is a frequent speaker and trainer at conferences and webinars, known for her dynamic style and real-world tips that help individuals recognize scams, protect their digital identities, and secure their home networks.

She believes cybersecurity education should be engaging and accessible, whether delivered through anime-style videos, interactive training, or community events.

When she’s not helping people outsmart cybercriminals, Erica is an avid video game enthusiast, lifelong learner, and advocate for creative approaches to online safety.

Her mission is simple: to inspire confidence and empower individuals to protect themselves in today’s ever-changing digital landscape.

Brian Gogan, Ph.D., WMU - Professor of English

Brian Gogan is a professor of English at Western Michigan University, where he teaches courses in rhetoric and writing and directs the first-year writing program. He is coeditor of Writing Prompts across the Disciplines: Real-World Use for Generative Artificial Intelligence Tools, an edited collection under contract with the WAC Clearinghouse and University Press of Colorado that advances an applied understanding of the GenAI prompt genre in order to promote effective, equitable, and ethical GenAI use. He is a contributor to AI for Creative Work, a University of Michigan Coursera course, and has led over a dozen GenAI workshops to campus groups, community organizations, and professional associations.

Tim O’Connor, Cadre - CISO and Manager of Knowledge Services

As a multidisciplinary leader in the field of Information Security, Tim O’Connor assists organizations, employees, and individuals in aligning their business processes with risk through practical policies, frameworks, presentations, seminars, and customized events like tabletop exercises and assessments.

He is passionate about addressing human factor information security risks and mitigations, conducting risk assessments, promoting security maturity growth, and facilitating business continuity planning (BCP) CBCI.

With over 25 years of experience in advanced cybersecurity (IS), Information Technology (IT) planning/implementation, networking, risk assessments, security awareness programs, gap analysis, and compliance auditing/assessment, he brings extensive expertise to the table.

He heads up Cadre Information Security’s knowledge services overseeing consulting, managing the Trusted Advisor (vCISO) practice, and cybersecurity training program development. He designs and implements risk assessments and security awareness programs that safeguard critical business information and information systems while aligning security measures with business processes.

Tim has authored over a dozen books, and technical courseware, has written for a number of publications, and is certified as a commercial rotorcraft pilot and flight instructor. His principal hobbies include antique motorcycles, astrophotography, mentalism, and doing science outreach.

Xavier Chapa, Dell - Principal Solutions Principal

Experienced professional with over 20+ year in Information Technology. I have a broad background including Leadership roles in Higher Education where I have lead Infrastructure & Operations teams across multiple transformational initiatives. Over the last 8 years through my roles at SungardAS, IBM, and Dell Technologies I have been primarily focused on helping Customers across all industries proactively prevent, mitigate, and recover from destructive attacks on their critical data and quickly resume operations. 

In my current role at Dell Technologies, I serve as a SME on our North American Security & Resiliency team that directly engages with customers, as well as internally helping to provide an interface between Sales, Product, and Marketing to ensure alignment on strategy across our organization.

Brian Chalfant, WMU - Cybersecurity Analyst

Brian Chalfant is a Cybersecurity Analyst at Western Michigan University, where he plays a key role in safeguarding institutional data and infrastructure. With a Bachelor of Science in Computer Science from Hawaii Pacific University and multiple industry certifications—including CompTIA Security+, PenTest+, and AWS Cloud Practitioner—Brian brings a robust technical foundation to his work in higher education cybersecurity. His background also includes specialized training in computer networking and Chinese-Mandarin, reflecting a diverse and global perspective. Outside of his professional role, Brian is an active developer with a portfolio of open-source projects on GitHub, showcasing his passion for continuous learning and community collaboration.

Tom Sinnott, CDW - Field CISO

Thomas Sinnott is a seasoned cybersecurity leader with over 25 years of experience, including more than 15 years as a Chief Information Security Officer for global organizations. As Field CISO at CDW, he advises a wide range of clients—from startups to Fortune 10 companies—on cybersecurity strategy, risk management, and compliance. His expertise spans multiple industries including finance, healthcare, higher education, and technology. Tom is known for tailoring security frameworks to align with business goals and has guided numerous organizations through cyber incidents and data breaches. He holds an MBA and multiple certifications, including CISSP, CISM, CRISC, and technical credentials from Palo Alto Networks, Zscaler, Intel, and Microsoft.

Eric Marchewitz, CDW - Senior Field Solutions Architect

Eric Marchewitz is a seasoned cybersecurity professional with more than 25 years of industry experience. As a Security Solutions Architect at CDW, he works with a wide range of technologies and evolving threats, helping organizations strengthen their defenses and solve complex security challenges. Outside of work, Eric dedicates his time to community service, volunteering with the Veterans of Foreign Wars, the American Legion, and the Lions Club, where he educates vulnerable populations on how to stay safe from online threats. He resides in Lake Orion, Michigan, with his son.

Brandon Smith, MC3 - Cybersecurity Intelligence Analyst

The Michigan Cyber Command Center (MC3) investigates the criminal aspect of network intrusions for cyber incidents involving Michigan businesses, non-profit organizations, and public entities -- including those incidents related to ransomware, phishing, business email compromises (BEC), and malicious insiders.  MC3 also assists other law enforcement agencies with forensic services for similar investigations.  In addition, the MC3 provides cybersecurity education and shares cybersecurity information with the public. 

Andy Brush, Brush Consulting, LLC - Cybersecurity Advisor

Andy Brush is passionate about building connections, friendships, and communities of practice in cybersecurity, embracing the truism that “cybersecurity is a team sport.” Your team is not just your team, but many others around you that you can learn from, help, and lean on when you are having your bad day.

Andy has worked collaboratively in IT and cybersecurity in Michigan over the last 25 years, most recently as a Michigan-based Cybersecurity Advisor with CISA. Prior to that he founded Michigan Cyber Partners at the State of Michigan and served as IT Director at Washtenaw County.

Bronco Cybersecurity Club

The Bronco Cybersecurity Club stands as a vibrant community, uniting individuals with a common passion for cybersecurity. Our doors are open wide, welcoming enthusiasts from every academic avenue. Here, whether you're majoring in computer science or marketing, your presence is not just welcomed – it's celebrated. Join us, and together we'll unravel the captivating mysteries of cybersecurity.

Business Technology Network (BTN)

The Business Technology Network (BTN) strives to educate students on the importance of technology within the business world. We focus on how technology affects every industry, and we provide opportunities for networking, professional development, and social events.

WRAVEN RSO Logo

Western Research Advisory for Vulnerabilities, Exploits, & Networks is committed to advancing the field of cybersecurity through research, collaboration, and education. Our mission is to cultivate a community where students can develop technical skills, exchange knowledge, work towards industry certifications, and engage in impactful projects focused on vulnerabilities, exploits, and networks. Whether you're an experienced professional or just beginning to explore cybersecurity, WRAVEN provides a welcoming environment for learning, contributing, and networking.

Exhibitors/Sponsors

Thank you! The core planning team extends heartfelt thanks to our WMU financial and support partners, whose contributions are making this upcoming event possible. We are especially grateful for the collaboration and support from Athletics, Enrollment Management, and the Office of the Provost.

Parking

Parking for the day event will be available in Lot 41 at no charge.

Visit the Campus Maps website for additional campus and parking information.

Meals

Breakfast

Continental breakfast will be served from 8-9 a.m.

Lunch

Lunch will be served from 11:30 a.m.-12:30 p.m.

 

Learn more about our Sponsors

What makes it successful? Collaborating and partnering with industry experts and connecting with the students, faculty, staff, and Cybersecurity minded individuals around Michigan.

People Driven Technology

People Driven Technology

Hardened Level Sponsor
(616) 264-6700
connect@peopledriven.com

Cadre Information Security Logo

Cadre Information Security

Cypher Level Sponsor
(513) 762-7350
info@cadre.net

CDW Education

CDW Education

Cypher Level Sponsor
(800) 808-4239
cdwg.com/accountCenter/emails/SupportEmail

TEKsystems

TEKsystems

Cypher Level Sponsor
(410) 540-7700
teksystems.com/en/contact-us

Dell Technologies

Dell Technologies

Cypher Level Sponsor
(877) 275-3355
dell.com/en-us/lp/contact-us

ThreatLocker

ThreatLocker

Key Level Sponsor
(833) 292-7732
sales@threatlocker.com

Bugcrowd

Bugcrowd

Key Level Sponsor
(888) 361-9734
sales@bugcrowd.com

Defendify

Defendify

Key Level Sponsor
(888) 508-9221
defendify.com/contact/

Commvault

Commvault

Key Level Sponsor
(888) 746-3849
commvault.com/contact-us

Bronco Cybersecurity Club

BCC

User Level Sponsor and Core Planning Partner
Bronco Cybersecurity Club RSO

Business Technology Network (BTN) Logo

BTN

User Level Sponsor and Core Planning Partner
Business Technology Network RSO

WRAVEN RSO Logo

WRAVEN

User Level Sponsor and Core Planning Partner
Western Research Advisory for Vulnerabilities, Exploits, & Networks RSO

Michigan SBDC

Michigan Small Business Development Center

User Level Sponsor and Core Planning Partner

NINJIO

NINJIO

Planning Partner
(805) 864 1999
hello@ninjio.com

Underlying principle every year.

It takes all members of the community to create a secure environment

The WMU Cybersecurity Summit seeks to inform participants of best practices for increasing individual cybersecurity awareness, learn more about cybersecurity in the educational setting, and serve as a networking opportunity within the West Michigan community.

Planning Committee

Thank you!

The 2025 planning committee was comprised of a diverse group of departments and colleges at WMU.

Andrew Holmes
Chief Information Officer
Office of Information Technology

Trevion Thomas
Program Manager Cybersecurity
Business Information Systems

Sarah Cheatham
CRMS Project & Training Spec
Enrollment Management

Tony Hendrix
Associate Director Information Systems
Student Affairs Information Services

Joan Amos
Budget Analyst Sr
Office of Information Technology

Jacob Neumann
Director Endpoint Management and Executive Success
Office of Information Technology

Bonnie Gabriel
Small Business Development Center Regional Director
Office of Research and Innovation

Nick Ford
RSO President
Bronco Cybersecurity Club (BCC)

Raiyan Hrid
RSO Vice President
Bronco Cybersecurity Club (BCC)

Caden Carr
RSO President
Business Technology Network (BTN)

Lochlan McElroy
RSO President
Western Research Advisory for Vulnerabilities, Exploits, & Networks (WRAVEN)

Garald (Gary) Barton IV
Marketing Manager
Office of Information Technology