ChiCyberCon 2025: Convergence of AI, data, and human-centered cybersecurity

In the ever changing landscape of everything, staying ahead requires continuous learning and networking. ChiCyberCon 2025 provided an unparalleled opportunity for professionals, researchers and students who are eager to delve into the latest developments in artificial intelligence and data/human centric security. It was hosted at Hermann Hall on Friday, March 28, 2025. It was a hybrid event to ensure accessibility for a diverse audience that accommodated and served both in-person and online attendees between 9 a.m. to 5 p.m. which was followed by a reception from 5 p.m. to 6 p.m.

With a legacy of excellence over the years, ChiCyberCon has garnered support from various esteemed organizations such as AccessData, Argonne National Laboratory, Cisco, IBM, Microsoft and even the FBI. These collaborations underscores the conferences conference’s commitment that helps cybersecurity community to grow. It serves as a pivotal platform for people like researchers, students, professionals and academics where they can explore current technologies, legal frameworks and training initiatives that are being used for secure computing. Illinois Tech’s Cyber Security and Forensics Education, which was designated by the Department of Homeland Security and the National Security Agency as a National Center of Academic Excellence in Cyber Defense Education, is at the heart of this necessary and important endeavor for future professionals.

The conference featured Calvin Nobles, Dean and Portfolio VP of School of Cybersecurity and Information Technology at the University of Maryland Global Campus. His address on topic of stopping to admire the Human Factor Problem in CyberSecurity: Do Something shed light on proactive approaches to human centric challenges related to cybersecurity. The conference also offered a series of panels that were designed to important topics of cybersecurity like:

  1. Why Learn About Generative AI in the Cybersecurity Context?
  2. Launching Your Cybersecurity Career: Certifications, Military Pathways, or University—Which is Right for You?
  3. How to Communicate Cybersecurity Concepts to Senior Leaders?
  4. Security Behavior and Culture Programs: Why Are They Important?
  5. Embracing the 3Rs of Cyber Defense: Resilience-Driven, and Resource-Efficient Risk Management

The Conference also featured a lot of presentations that catered both industry professionals and academics.

  • Industry Track
    • Real World Penetration Testing by Arvin Bahrami
    • Data Governance and Security by Yashwini Kamdar
    • Game of Threats, House of Exploits by Otha Mabry
    • Unleashing the LionInUs: Championing Cybersecurity Career Pathways by Lorena Mejia
    • Decoding the Digital Canvas: Safeguarding Against Visual Data Leaks by Alex Holden
    • CMMC Compliance Unlocked: Adapting to the Final Rule by Shadi Beidas and Sarah O’Kelley
  • Academic Track
    • From Curiosity to Career: Launching High School Students into Cybersecurity by Michael Bass
    • Kosovo Study Away Program in Cybersecurity by Shahana Fatima, Avery Huerta, Cedric Nartey, Maria Soto, and Annamaria Szakonyi, Ph.D.
    • Innovating Security: Developing Guard Prototype for Enhanced Protection (IPRO) by Cedric Nartey, Hrishikesh Pawar, Mohamed Trigui, and Ivan Zziwa
    • Risks of Motion Data Collected by AR/VR by Mark Roman Miller
    • On a Path to Commercialize GUARD (IPRO) by Oluwafisayo Okunuga and Sukhmani Sandhu
    • Intelstack: Weaponizing SoC with Automated Threat Intelligence Analysis and Incident Response by Dharmin Suthar
    • Is It Too Early to Start Using Quantum-Proof Encryption? by Francisco Ruiz
    • Healthcare and Cybersecurity – Taking a Zero Trust Approach by George Vukotich
    • Lost in TranslAItion by Joel Su
    • Generating Target Profiles by Using AI to Automate OSINT by Robert Soler

This is the list of the presentations that can be used to connect to people online in case you missed the opportunity to attend this event and want to connect to an expert on a particular topic.

References:https://chicybercon.com/#about

Related Posts