Wednesday - 2025

As Artificial Intelligence (AI) technologies evolve at an unprecedented rate, so too does the potential for their misuse. The growing threat posed by AI-generated Deep Fakes and Synthetic Identity attacks...
Intentional AV Design for Engaged, Activity-Based Learning and Supporting Younger Student Outcomes
Physical access still relies heavily on trust—keys get lost, credentials are shared, and permissions quickly become outdated. While cybersecurity universally embraces zero-trust models, physical access management dangerously lags behind, creating...
Cybersecurity professionals often rely on technical jargon, acronyms, and complex terminologies that often alienate stakeholders and inadvertently create barriers between security teams and business leaders. This session is designed to...