BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:volunteertraining2026
X-WR-CALDESC:Event Calendar
METHOD:PUBLISH
CALSCALE:GREGORIAN
PRODID:-//Sched.com Volunteer Training//EN
X-WR-TIMEZONE:UTC
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T123000Z
DTEND:20260707T180000Z
SUMMARY:Pre-Summit Registration Open and Badge Pick-Up
DESCRIPTION:\n
CATEGORIES:
LOCATION:Building T Main Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:3b827ad3a823b46caf283d6e92adc7d5
URL:http://volunteertraining2026.sched.com/event/3b827ad3a823b46caf283d6e92adc7d5
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T130000Z
DTEND:20260707T210000Z
SUMMARY:PRE-SUMMIT WORKSHOP (Separate Registration Required): Empowering Institutions of Higher Education (IHE) AI Adoption and Use
DESCRIPTION:Pre-Summit workshops require separate registration and are available exclusively to registered Summit attendees. If you are registered for the Summit and did not receive your Pre‑Summit Workshop registration code\, please contact NCyTE@whatcom.edu for assistance.\n\nPre-Summit Workshop Registration: June 23\, 2026\n(Registration code required) \n\n\n\nEmpowering Institutions of Higher Education (IHE) AI Adoption and Use\nTime: 8:00 AM - 4:00 PM CDT \nRoom: TBD\nFee: $500 (lunch included)\n\nThis workshop is designed for IHE’s CSOs\, CIOs\, CTOs\, and IT Director’s and Managers and will cover technical policy and governance\, the AI threat landscape and risk\, AI models\, standards and approaches for architecting AI for security and implementing technical controls to ensure safe and responsible use of AI. Participants will leave with actionable information and access to concrete use cases\, templates\, and playbooks. \n\nFacilitator(s):\nMichele Robinson\, CISSP\, CISM\, CISA\, CDPSE\, Senior Director & Principal Investigator\, National Cybersecurity Centers (NCyTE & CCNC)\, Whatcom Community CollegeTBD\n
CATEGORIES:
LOCATION:TBA\, Moraine Valley Community College
SEQUENCE:0
UID:2a153d725b73e9199f848210bad6c2e9
URL:http://volunteertraining2026.sched.com/event/2a153d725b73e9199f848210bad6c2e9
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T170000Z
DTEND:20260707T210000Z
SUMMARY:PRE-SUMMIT WORKSHOP (Separate Registration Required): Flipper Zero for Cybersecurity Across the Disciplines
DESCRIPTION:Pre-Summit workshops require separate registration and are available exclusively to registered Summit attendees. If you are registered for the Summit and did not receive your Pre‑Summit Workshop registration code\, please contact NCyTE@whatcom.edu for assistance.Pre-Summit Workshop Registration: June 23\, 2026(Registration code required)\n\nPlease note:&nbsp\;Participants attending afternoon-only workshops will need to plan for lunch on their own.\n\n\nFlipper Zero for Cybersecurity Across the Disciplines\nTime: 12:00 PM - 4:00 PM CDT\nRoom: TBD\nRegistration Options (choose one):Participants may register for the workshop with the option to include the cost of a Flipper Zero device\, or they may bring their own. While a Flipper Zero is not required to participate\, having one is strongly encouraged to support a more engaging\, hands-on learning experience.\nWorkshop Only (Bring Your Own Device): $200\nFor participants who already have a Flipper Zero and will bring their own.Workshop + Flipper Zero Device: $375\nIncludes the $200 workshop registration fee plus a Flipper Zero with SD card (device value: $175\, reflects a 30% academic discount). Attendees keep the device.\nCybersecurity now intersects with nearly every discipline\, not just IT or computer science. Technologies such as physical security systems\, networking infrastructure\, wireless communication\, IoT devices\, operational technology\, and even everyday classroom tools introduce real and often overlooked vulnerabilities. The Flipper Zero has emerged as an accessible\, hands-on tool for exploring these concepts. It interacts with technologies that faculty and students encounter regularly\, including RFID access cards\, wireless doorbells\, remote controls\, Bluetooth devices\, presentation systems\, and basic IoT environments. Its simplicity and versatility make it an effective entry point for experiential learning across a wide range of academic and workforce contexts.\nFacilitator(s):\nEric Renegar\, Professor\, Information Technology Academics\, Sinclair Community CollegeKyle Jones\, NCyTE Co-PI\, Assistant Dean of Technology\, Sinclair Community CollegeDoug Hampton\, Associate Professor/Chair | Business & Public Services Division\, Sinclair Community CollegeKristine Christensen\, Director\, Faculty Development / Professor\, Computer Information Systems\, Moraine Valley Community College\n
CATEGORIES:
LOCATION:TBA\, Moraine Valley Community College
SEQUENCE:0
UID:26c118c99e92b3850dfb11ad4c0efe0d
URL:http://volunteertraining2026.sched.com/event/26c118c99e92b3850dfb11ad4c0efe0d
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T170000Z
DTEND:20260707T210000Z
SUMMARY:PRE-SUMMIT WORKSHOP (Separate Registration Required): Leadership\, Governance\, and Policy: Risks with Emerging AI and Cyber
DESCRIPTION:Pre-Summit workshops require separate registration and are available exclusively to registered Summit attendees. If you are registered for the Summit and did not receive your Pre‑Summit Workshop registration code\, please contact NCyTE@whatcom.edu for assistance.Pre-Summit Workshop Registration: June 23\, 2026(Registration code required)Please note:&nbsp\;Participants attending afternoon-only workshops will need to plan for lunch on their own. \n\nLeadership\, Governance\, and Policy: Risks with Emerging AI and Cyber\nTime: 12:00 PM - 4:00 PM CDT\nRoom: TBD\nFee:&nbsp\;$200\n\nThis workshop will focus on leadership\, governance\, and policy issues in academic institutions where emerging AI technologies are utilized. Various topics will be examined through the lens of audiences affected at the institutions: faculty\, staff\, students\, athletes\, on-campus health facilities\, applicants (both students and employees)\, and the public. Participants will leave the workshop with a more refined sense of relevant risks to take back to their home institutions to further discussions on best approaches to implement.\n&nbsp\;
CATEGORIES:
LOCATION:TBA\, Moraine Valley Community College
SEQUENCE:0
UID:03c83b86f7da4899b7c26fc2fe695a00
URL:http://volunteertraining2026.sched.com/event/03c83b86f7da4899b7c26fc2fe695a00
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T170000Z
DTEND:20260707T210000Z
SUMMARY:PRE-SUMMIT WORKSHOP (Separate Registration Required): Proof of Process: Designing AI-Resistant Assessments
DESCRIPTION:Pre-Summit workshops require separate registration and are available exclusively to registered Summit attendees. If you are registered for the Summit and did not receive your Pre‑Summit Workshop registration code\, please contact NCyTE@whatcom.edu for assistance.Pre-Summit Workshop Registration: June 23\, 2026(Registration code required)\n\nPlease note:&nbsp\;Participants attending afternoon-only workshops will need to plan for lunch on their own.\n\n \nProof of Process: Designing AI-Resistant Assessments\nTime: 12:00 PM - 4:00 PM CDT\nRoom: TBD\nFee:&nbsp\;$200\n\nAs Generative AI reshapes the academic landscape\, educators must evolve their assessment strategies to ensure student integrity and authentic learning. This hands-on workshop introduces actionable strategies for "AI-proofing" your curriculum\, ranging from in-class analog pivots to complex\, process-oriented digital projects. Participants will move beyond theory and actively develop four distinct types of exercises—including scaffolded reflections\, hyper-local research prompts\, and oral defense simulations—tailored to their specific disciplines. By the end of the session\, participants will leave with a diversified assessment toolkit that shifts the focus from policing technology to evaluating unique\, human-centric critical thinking.\nFacilitator(s):\nJiri Jirik\, Director\, Educational Pathways National CenterMichael Qaissaunee\, Professor/Chair\, Engineering and Technology\, Brookdale Community College
CATEGORIES:
LOCATION:TBA\, Moraine Valley Community College
SEQUENCE:0
UID:6f7864c2128b3669f0403785787b3821
URL:http://volunteertraining2026.sched.com/event/6f7864c2128b3669f0403785787b3821
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T170000Z
DTEND:20260707T210000Z
SUMMARY:PRE-SUMMIT WORKSHOP (Separate Registration Required): Trust but Verify: Auditing AI-Generated Data
DESCRIPTION:Pre-Summit workshops require separate registration and are available exclusively to registered Summit attendees. If you are registered for the Summit and did not receive your Pre‑Summit Workshop registration code\, please contact NCyTE@whatcom.edu for assistance.Pre-Summit Workshop Registration: June 23\, 2026(Registration code required)\nPlease note:&nbsp\;Participants attending afternoon-only workshops will need to plan for lunch on their own.\n\n\n\nTrust but Verify: Auditing AI-Generated Data\nTime: 12:00 PM - 4:00 PM CDT\nRoom: TBD\nFee: $200\n\nGenerative AI has rapidly become a staple in the academic toolkit\, but its propensity for "hallucinations and incorrect data conclusions"—confident but incorrect assertions—poses a significant challenge for accuracy and academic integrity. This workshop shifts the focus from policing AI usage to empowering students with the critical thinking skills necessary to scrutinize machine-generated data. In this interactive session\, participants will learn specific methodologies and requirements for validating AI outputs\, including lateral reading techniques\, source triangulation\, and bias detection. Participants will engage in hands-on "red teaming" exercises where they will generate AI content and practice exposing inaccuracies.\n
CATEGORIES:
LOCATION:TBA\, Moraine Valley Community College
SEQUENCE:0
UID:399d949dad7fa5318fd3093eb4df0b03
URL:http://volunteertraining2026.sched.com/event/399d949dad7fa5318fd3093eb4df0b03
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T210000Z
DTEND:20260707T230000Z
SUMMARY:Registration Open and Badge Pick-Up
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:7aa312642a9386dcea63308507733140
URL:http://volunteertraining2026.sched.com/event/7aa312642a9386dcea63308507733140
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T213000Z
DTEND:20260707T223000Z
SUMMARY:Welcome Dinner Opens
DESCRIPTION:
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:8e52caecd52aa7010301d40f7fc1d113
URL:http://volunteertraining2026.sched.com/event/8e52caecd52aa7010301d40f7fc1d113
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T223000Z
DTEND:20260707T230000Z
SUMMARY:Welcome Dinner: Summit Opening and Welcome
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:dc6adf5ee2e558d2fd1fca1680208f4c
URL:http://volunteertraining2026.sched.com/event/dc6adf5ee2e558d2fd1fca1680208f4c
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260707T230000Z
DTEND:20260708T000000Z
SUMMARY:Welcome Dinner: Keynote
DESCRIPTION:
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:fc73a2ec751de7567461ef10f2149c08
URL:http://volunteertraining2026.sched.com/event/fc73a2ec751de7567461ef10f2149c08
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T121500Z
DTEND:20260708T210000Z
SUMMARY:Registration Open and Badge Pick-Up
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:a2c1eb3be6f78fdade9242740d57ae89
URL:http://volunteertraining2026.sched.com/event/a2c1eb3be6f78fdade9242740d57ae89
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T123000Z
DTEND:20260708T130000Z
SUMMARY:Breakfast
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:b77d9e5ef8ab8ee190b3068b0d70d5b6
URL:http://volunteertraining2026.sched.com/event/b77d9e5ef8ab8ee190b3068b0d70d5b6
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T131500Z
DTEND:20260708T133000Z
SUMMARY:Day 2 Opening Remarks
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:796e4beb12c3ad18dc0ed93bb938856a
URL:http://volunteertraining2026.sched.com/event/796e4beb12c3ad18dc0ed93bb938856a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T133000Z
DTEND:20260708T150000Z
SUMMARY:Keynote: The Power of Partnership: Securing Critical Infrastructure Together
DESCRIPTION:As cyber threats grow in scale\, speed\, and sophistication\, no single sector can defend in isolation and when a major cyber incident&nbsp\;occurs it rarely stays in one lane. This powerhouse plenary panel brings together leaders from multiple critical infrastructure sectors to examine the evolving threat landscape and the shared risks that increasingly span sector boundaries. Moderated by the Chair of the National Council of Information Sharing and Analysis Centers (ISACs) and President and CEO of Health-ISAC\, panelists from IT-ISAC\, Automotive ISAC and REN-ISAC (Research & Education Networks)\, will discuss real-world challenges in information sharing\, incident response\, and resilience\, highlighting lessons learned from recent cross-sector cyber events. The discussion will focus on actionable strategies for strengthening collaboration between ISACs\, academia\, private industry\, and government partners to improve collective defense. Attendees will gain insights into practical approaches for enhancing trust\, accelerating threat intelligence exchange\, and building sustained cyber resilience across&nbsp\;the national critical infrastructure ecosystem.Learning Objectives\nExplain how modern cyber incidents propagate across multiple critical infrastructure sectors and why interdisciplinary\, cross‑sector thinking is essential for technician and workforce preparation.Identify the collaboration patterns ISACs use during incidents (e.g.\, shared situational awareness\, sector‑to‑sector coordination\, joint mitigation guidance) and how those can be adapted into interdisciplinary courses\, labs\, and capstones.Learn about skill sets needed to combat critical infrastructure threats and build resilience.\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:aa86fbb2809f0bff0cbf97e210a15cd7
URL:http://volunteertraining2026.sched.com/event/aa86fbb2809f0bff0cbf97e210a15cd7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T150000Z
DTEND:20260708T153000Z
SUMMARY:Mid-Day Break 1
DESCRIPTION:
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:b38aa12bba5c9a05f2651c73cd6d7fbe
URL:http://volunteertraining2026.sched.com/event/b38aa12bba5c9a05f2651c73cd6d7fbe
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T153000Z
DTEND:20260708T161500Z
SUMMARY:Keynote: The Most Underrated Advantage in Business:  Being Human
DESCRIPTION:For many\, the leaders we look up to possess qualities that make them - and their positions - feel untouchable. &nbsp\; Whether in person or on our screens they appear poised\, articulate\, masters of their domain\, living lives most can only dream of. &nbsp\;The truth\, however\, is far more complicated and surprisingly relatable. &nbsp\;In fact\, you have more in common with your heroes than you ever thought possible. &nbsp\;In this talk\, Parham Eftekhari distills his lessons learned from 20+ years engaging with leaders at the highest levels of government and industry. &nbsp\;Through honest\, often funny\, and sometimes raw storytelling\, attendees will leave with a renewed sense of confidence and a clearer understanding that the ability to lead\, influence\, and create impact isn't reserved for a select few. It starts with embracing the most underrated advantage in business and in life... being human.
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:66b5bfb9588284a96db47bf157f12c04
URL:http://volunteertraining2026.sched.com/event/66b5bfb9588284a96db47bf157f12c04
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T163000Z
DTEND:20260708T170000Z
SUMMARY:Working Lunch
DESCRIPTION:Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:184ef0af8c2ab7ad328e2ab0c37cbeef
URL:http://volunteertraining2026.sched.com/event/184ef0af8c2ab7ad328e2ab0c37cbeef
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T170000Z
DTEND:20260708T180000Z
SUMMARY:Lunch Plenary Speaker/Panel
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:b36241b71b01c7ba7f1a18f0618eec22
URL:http://volunteertraining2026.sched.com/event/b36241b71b01c7ba7f1a18f0618eec22
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T181500Z
DTEND:20260708T200000Z
SUMMARY:Integrating Local LLMs in Higher Education for Privacy\, Security and Cost Effectiveness
DESCRIPTION:This workshop explores the value of using large local language models (LLMs) in educational settings\, with a focus on tools such as Ollama\, Llama and LangChain. Participants will learn how running LLMs locally can enhance data security and protect student privacy by keeping sensitive information off external servers. This is often a regulatory requirement for educational institutions. The session also highlights cost-effectiveness\, showing how schools and universities can reduce or eliminate recurring subscription and API fees while maintaining powerful AI capabilities with local LLMs. Designed for educators and students\, the workshop includes practical examples and use cases that demonstrate how local LLMs can support teaching\, learning\, and experimentation in a responsible\, accessible\, and sustainable way.\n\nMany vendors offer free access to their cloud-based LLMs for students and educators. However\, these free tools have usage limits and are not suitable for prompts or documents containing personally identifiable information. Local LLMs complement\, but doesnʻt replace\, the use of these cloud-based LLMs.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-925\, Moraine Valley Community College
SEQUENCE:0
UID:24b3c5cd52686870a10e0ea33e86c890
URL:http://volunteertraining2026.sched.com/event/24b3c5cd52686870a10e0ea33e86c890
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T181500Z
DTEND:20260708T200000Z
SUMMARY:Challenge Accepted: Real-World Problem Solving Through Experiential Learning at Scale
DESCRIPTION:The NCyTE Virtual Cybersecurity Career Challenge (VCCC) is a scalable\, experiential learning initiative designed to introduce students to real-world cybersecurity roles through hands-on\, team-based problem solving. Delivered in a fully virtual environment\, the Challenge engages participants in realistic scenarios aligned with industry frameworks\, emphasizing technical skills\, critical thinking\, and professional competencies. The NCyTE VCCC strengthens talent pipelines and demonstrates learners education has prepared them for entry into the cybersecurity workforce. This session will highlight the Challenge’s design\, implementation\, and impact on student engagement and career readiness.&nbsp\;
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-403\, Moraine Valley Community College
SEQUENCE:0
UID:04ec8d9a45ef2a53a7c77bda654a7abb
URL:http://volunteertraining2026.sched.com/event/04ec8d9a45ef2a53a7c77bda654a7abb
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T181500Z
DTEND:20260708T190000Z
SUMMARY:AI-Proof Assignments for Cybersecurity Classes in an Online Environment
DESCRIPTION:The rapid adoption of generative AI has significantly altered how students approach coursework in online cybersecurity programs\, creating new challenges for assessment integrity and meaningful skill evaluation. This presentation explores practical strategies for designing AI-resistant assignments that prioritize authentic learning and demonstrable technical competence over traditional written submissions. Rather than focusing on restrictive policies or detection tools\, the session highlights assessment approaches that naturally limit inappropriate AI use by requiring students to show their work through observable actions\, verifiable outcomes\, and individualized responses. Examples include performance-based tasks\, validation of technical artifacts\, and student-led video presentations in which learners explain their process\, reasoning\, and results in their own words. By shifting the emphasis from static deliverables to student accountability and real-time demonstration\, these methods reduce the effectiveness of generative AI while better aligning assessments with real-world cybersecurity expectations. Attendees will gain insight into how thoughtfully designed assignments can both preserve academic integrity and improve student engagement in fully online environments. The session is intended for educators seeking adaptable\, experience-driven assessment ideas that evolve alongside emerging AI technologies without sacrificing rigor or authenticity.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:61a1ec84656be78f93dcb742757de04d
URL:http://volunteertraining2026.sched.com/event/61a1ec84656be78f93dcb742757de04d
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T181500Z
DTEND:20260708T200000Z
SUMMARY:Deploying CTFd with Docker for Live Capture the Flag
DESCRIPTION:This 45-minute\, hands-on session introduces participants to hosting Capture the Flag (CTF) competitions using CTFd\, an open-source CTF platform. The session begins with a brief overview of how CTFs are used in education\, workforce training\, and outreach to develop practical cybersecurity skills such as problem solving\, analysis\, and teamwork.\nParticipants will then install Docker and deploy CTFd live on their own laptops\, following a step-by-step walkthrough. The session demonstrates how to launch a functional CTF instance\, access the administrative interface\, configure basic settings\, and create a sample challenge suitable for instructional use. Common setup issues\, classroom considerations\, and environment safety practices will be discussed throughout the session.\n\nBy the end of the presentation\, attendees will have a working CTFd environment and the foundational knowledge needed to host their own Capture the Flag events for students\, trainees\, or community programs.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-701\, Moraine Valley Community College
SEQUENCE:0
UID:1fc67e699ed8914dc925c5c9faacdb22
URL:http://volunteertraining2026.sched.com/event/1fc67e699ed8914dc925c5c9faacdb22
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T191500Z
DTEND:20260708T200000Z
SUMMARY:Industry-led Experiences moving AI across multiple disciplines and populations
DESCRIPTION:This session will share actual experiences including successes\, challenges\, and risks in moving AI across multiple technical disciplines and across multiple populations (national\, regional\, local). Presenters will share actual experiences working with AI and other industry leaders to improve workforce preparation of students. &nbsp\;Panelists will share their actual experiences. &nbsp\;Dr. Beheler will moderate the panel and will share her work with Miami Dade College\, the National Applied AI Consortium NSF grant\, National NSF Centers\, and a state-wide initiative to integrate AI content across curriculum with strong industry guidance. &nbsp\;Dr. Wosczyna-Birch will share work that has been done on the national level through the National Center for Next Generation Manufacturing to provide guidance to colleges on how to incorporate AI content into learning to better prepare the workforce in various fields of manufacturing. &nbsp\;Dr. Jones will share his work on implementing the network and AI tools first for his college as a means for students in multiple disciplines to immediately work together using AI tools. &nbsp\;
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T Fogelson Theater\, Moraine Valley Community College
SEQUENCE:0
UID:37d606bbf17fe4979265c160fe7389dc
URL:http://volunteertraining2026.sched.com/event/37d606bbf17fe4979265c160fe7389dc
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T191500Z
DTEND:20260708T200000Z
SUMMARY:When AI Fails Undetected: Rethinking Institutional Governance\, Operations\, and Leadership
DESCRIPTION:Artificial intelligence is rapidly becoming woven into how higher-education institutions teach\, operate\, and make decisions. Yet many of the most consequential AI risks rarely surface as obvious cybersecurity failures. Instead\, they emerge quietly through routine use\, opaque model behavior\, and unclear ownership\, often slipping past traditional IT and security controls until trust\, compliance\, or institutional credibility is already in jeopardy. Drawing on experience building and governing enterprise-scale AI platforms in regulated environments\, this presentation examines how AI can reshaping institutional operating models\, risk management practices\, and lines of accountability. It highlights why cybersecurity teams increasingly find themselves inheriting risks created upstream by governance gaps\, and why mitigating AI-driven threats demands leadership\, policy clarity\, and cross-functional alignment rather than technical controls alone. The presentation concludes by looking forward to the opportunities AI makes possible. When thoughtfully integrated\, AI can expand how institutions teach\, learn\, and collaborate across disciplines. It offers higher education the chance not only to adapt to change\, but to actively shape the future it serves.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:124290b3649b98fbe388417e8e83d54a
URL:http://volunteertraining2026.sched.com/event/124290b3649b98fbe388417e8e83d54a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T191500Z
DTEND:20260708T200000Z
SUMMARY:Embedding Cybersecurity Awareness into Strategic Management Business Course through Community-Engaged Learning
DESCRIPTION:This session presents a scalable\, community-engaged instructional model that embeds cybersecurity awareness into a strategic management business course without requiring technical prerequisites. Students conducted comprehensive strategic analyses of local businesses that integrated traditional competitive\, operational\, and environmental factors with an explicit evaluation of cybersecurity awareness\, data protection practices\, and organizational risk exposure. Based on their analyses\, student teams developed context-specific\, actionable recommendations aligned with each firm’s size\, industry\, and digital maturity.\n\nThe project culminated in two public-facing components: poster presentations at an institutional symposium and a community cybersecurity awareness workshop open to students\, local businesses\, and residents. This dual-audience approach reinforced professional communication skills while extending cybersecurity education beyond the classroom. Business owners reported increased awareness of cyber risks and appreciation for student-generated insights\, while students demonstrated heightened understanding of ethical responsibility\, risk management\, and regulatory considerations.\n\nThe session illustrates how business programs can meaningfully contribute to cybersecurity talent pipelines through interdisciplinary\, applied learning. During the session\, participants will examine project design\, assessment strategies\, and implementation logistics\, followed by a guided interactive activity to adapt the model to their own disciplines and institutional contexts. Emphasis will be placed on feasibility\, academic–industry collaboration\, and workforce-relevant skill development across non-technical programs.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:08c96882627280b33e976763f15a7f65
URL:http://volunteertraining2026.sched.com/event/08c96882627280b33e976763f15a7f65
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T191500Z
DTEND:20260708T200000Z
SUMMARY:Using AI to Create a More Inclusive Workplace for Neurodivergent Talent
DESCRIPTION:In today’s rapidly evolving world\, the growing popularity of AI is transforming various aspects of our workplace experience. One area where AI is making a significant impact is in learning and development. AI can be a game-changer for workplace inclusion\, in particular for neurodivergent employees\, which make up roughly 20% of the population. AI can equalize the playing field by assisting neurodivergent employees by automating repetitive tasks\, offering real-time assistance and sensory support\, and personalizing work experiences for greater productivity. More this technology can also benefit non-neurodivergent employees. In this session\, attendees will learn to understand the challenges faced by neurodivergent employees in the workplace\, identify AI tools to address those challenges\, and balance AI benefits and risks with ethical implementation.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:93d4f0b12efef97f5103c30f6cc72632
URL:http://volunteertraining2026.sched.com/event/93d4f0b12efef97f5103c30f6cc72632
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T200000Z
DTEND:20260708T203000Z
SUMMARY:Mid-Day Break 2
DESCRIPTION:\n
CATEGORIES:
LOCATION:Building T Main Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:8862627b6e0470a8f2ab7b2f87534082
URL:http://volunteertraining2026.sched.com/event/8862627b6e0470a8f2ab7b2f87534082
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T203000Z
DTEND:20260708T211500Z
SUMMARY:Balancing Innovation and Risk: Integrating AI Security Awareness into Business Education
DESCRIPTION:As artificial intelligence becomes rapidly embedded in modern business workflows\, students across disciplines are adopting AI platforms for productivity\, analysis\, and decision support\, often without fully understanding the associated security and privacy risks. This presentation explores the design and delivery of Introduction to AI in Business\, a collaboratively taught interdisciplinary course that intentionally integrated cybersecurity principles into a business-focused AI curriculum.\n\nWhile the course introduced students to the strategic value and operational benefits of AI\, it placed particular emphasis on the risks surrounding sensitive\, personal\, and proprietary information when using public and enterprise AI systems. Several course modules explicitly addressed data exposure\, model training risks\, prompt leakage\, intellectual property concerns\, and organizational policy considerations.\n\nTo better understand student perspectives\, we conducted surveys measuring perceived risk\, trust in AI platforms\, and awareness of data security implications before and after targeted instructional interventions. This presentation discusses course structure\, instructional strategies\, and survey findings\, highlighting how intentional cross-disciplinary teaching can improve student awareness of AI-related security risks while preserving an appreciation for AI’s transformative potential.\n\nAttendees will gain insight into practical approaches for embedding cybersecurity literacy into non-technical curricula and fostering more security-conscious AI use across academic disciplines.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:2a013cdd15fc8fe460685182ec4ddbb9
URL:http://volunteertraining2026.sched.com/event/2a013cdd15fc8fe460685182ec4ddbb9
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T203000Z
DTEND:20260708T211500Z
SUMMARY:Developing a Cybersecurity Program at an HBCU Focused on Critical Infrastructure and Agricultural Systems
DESCRIPTION:This session presents the institutional journey of West Virginia State University (WVSU)\, an 1890 land-grant HBCU\, in developing its Bachelor of Science in Cybersecurity. Participants will learn how WVSU evolved from offering a cybersecurity minor to launching a comprehensive\, workforce-driven four-year degree program designed to address critical state and national workforce needs while advancing the university’s land-grant mission.\n\nA central focus of the presentation is WVSU’s distinctive interdisciplinary approach\, which embeds cybersecurity within applied domains such as smart farming\, precision agriculture\, and critical infrastructure protection (SCADA/ICS). The session will examine how aligning the curriculum with the NICE Cybersecurity Workforce Framework ensures graduates are well prepared for high-demand cybersecurity roles.\n\nThe presentation will also highlight key outcomes and successes\, including academic and industry partnerships\, student achievements\, capacity building efforts\, externally funded grants\, and community engagement. Overall\, this session offers a replicable model for institutions seeking to develop impactful\, interdisciplinary cybersecurity programs that serve underrepresented populations while strengthening regional and national cyber resilience.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:0358a40f2529aeeb588c5eb31fe8e222
URL:http://volunteertraining2026.sched.com/event/0358a40f2529aeeb588c5eb31fe8e222
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T203000Z
DTEND:20260708T211500Z
SUMMARY:Educating for Digital Trust: Building resilience in a world of deepfakes\, phishing\, and AI-powered deception.
DESCRIPTION:Misinformation and social engineering attacks are escalating in scale and sophistication\, fueled by generative AI and global threat actors. This session explores how educators and organizations can embed misinformation resilience into cybersecurity curricula and workforce training. We will examine real-world cases\, highlight AI’s dual role as both a risk and a defense\, and share actionable strategies for preparing students\, government employees\, and private sector staff. Attendees will learn how to leverage AI-driven tools\, behavioral science\, and critical thinking exercises to strengthen awareness and build a culture of digital trust.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:b74d1d6748854a8cb63bf586ff5c706a
URL:http://volunteertraining2026.sched.com/event/b74d1d6748854a8cb63bf586ff5c706a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T213000Z
DTEND:20260708T215000Z
SUMMARY:Student Spotlight: AI-Powered Behavioral Biometrics: Continuous Authentication for Securing Emerging Cyber Systems
DESCRIPTION:The different traditional authentication methods such as tokens\, passwords and static biometrics continue to fail to protect modern cyber systems\, once initial access is compromised. As digital infrastructures across different sectors\, such as healthcare\, cloud application platforms\, and public services become more interconnected and are AI driven these days\, cybersecurity must move from one-time authentication to a continuous and an adaptive defense mechanisms.\n\nThis Student Spotlight presentation draws from a peer-reviewed research study which was published in the International Journal of Information Security (IJIS) that investigates AI-powered behavioral biometrics for continuous authentication. The research investigates how machine learning models could analyze behavioral patterns\, such as interaction dynamics and session behavior - to continuously verify the user’s identity in real time\, thereby reducing the risk of unauthorized access after login.\n\nThe presentation will be on the way in which behavioral biometrics have a human-centric and interdisciplinary approach to cybersecurity\, fusing the skills of AI\, human behavior\, and security systems\, and how it is being applied in critical sectors like healthcare sector\, cloud computing\, and online government services\, among others\, with consideration to the ethics of the same and the preparedness of the workforce.\n\nThis is going to explain how translating research insights into accessible concepts makes it possible for students and educators to bridge cybersecurity\, Artificial Intelligence (AI) and human factors to make them even more resilient to emerging cyber threats. The session will emphasize the role of interdisciplinary education and student-led research in shaping the future of AI-enabled cybersecurity solutions.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:90f8b3f1e6b59b634edd359dccd82140
URL:http://volunteertraining2026.sched.com/event/90f8b3f1e6b59b634edd359dccd82140
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260708T215000Z
DTEND:20260708T220000Z
SUMMARY:Day 2 Recap
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:9ce6054d3606aeb9414515be4f7abe46
URL:http://volunteertraining2026.sched.com/event/9ce6054d3606aeb9414515be4f7abe46
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T121500Z
DTEND:20260709T124500Z
SUMMARY:Networking Breakfast
DESCRIPTION:Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:d59c3935ec2c29db55d35fa4a5947b7c
URL:http://volunteertraining2026.sched.com/event/d59c3935ec2c29db55d35fa4a5947b7c
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T121500Z
DTEND:20260709T160000Z
SUMMARY:Registration Open & Badge Pick-Up
DESCRIPTION:
CATEGORIES:
LOCATION:BLDG M Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:98f0923c286e5b727895f3334d3997bc
URL:http://volunteertraining2026.sched.com/event/98f0923c286e5b727895f3334d3997bc
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T124500Z
DTEND:20260709T133000Z
SUMMARY:Morning Plenary: TBD
DESCRIPTION:\n\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:884f347f3173d0fba813ccf8142e6aca
URL:http://volunteertraining2026.sched.com/event/884f347f3173d0fba813ccf8142e6aca
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T143000Z
SUMMARY:Building a Virtual SOC with AI: Free\, Web-Based Cyber Labs for Everyone
DESCRIPTION:As cybersecurity threats grow\, access to realistic\, hands-on training environments remains limited—especially for students outside traditional technical programs. This session demonstrates how an AI-assisted design process was used to create a fully web-based\, virtual Security Operations Center (SOC) that is free and accessible to any student with a browser.\n\nThe virtual SOC replicates real-world analyst workflows through four monitoring screens and an integrated activity dashboard that guides learners through incident investigation and response. Students gain practical experience with the tools\, processes\, and decision-making used by SOC analysts.\n\nBeyond cybersecurity\, the environment functions as an interdisciplinary laboratory. Students engage from multiple perspectives—evaluating business risk and continuity\, analyzing digital evidence\, examining social engineering and human factors\, and building detection logic\, automation\, and AI-assisted analysis. This reflects modern incident response\, where technical\, organizational\, and human factors intersect.\n\nA key innovation is the use of AI to generate realistic\, customizable scenarios and continuously refine them through rapid iteration—enabling instructors to quickly adapt exercises to different disciplines\, skill levels\, and emerging threats. Attendees will tour the live environment and see how AI accelerates scenario design and evolution. Participants will leave with practical methods\, sample prompts\, and implementation strategies to build\, adapt\, and scale their own AI-driven\, scenario-based learning experiences across disciplines.\n\n
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:d17bdd81e3f1591f53249c212da180d3
URL:http://volunteertraining2026.sched.com/event/d17bdd81e3f1591f53249c212da180d3
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T143000Z
SUMMARY:FRAMEWORK FOR SCADA CYBERSECURITY - The Critical Infrastructure Framework
DESCRIPTION:Based on the current CSET Tool Assessment frameworks and standards for Process Control and relevant NIST Special Publications\, and my 27 + years in IT/OT with ExxonMobil and academic work with the Idaho National Labs\, this presentation will provide Critical Infrastructure faculty\, students\, and industry an understanding of the use of the Cyber Security Evaluation Tool (CSET®)\, a free stand-alone desktop application that systematically guides asset owners and operators through evaluating operational and information technology. The Department of Homeland (DHS) Cybersecurity and Infrastructure Security Agency (CISA) offer the CSET® download at no cost. The presentation will expand on the classroom use of a CSET by implementing an AI simulated CSET risk assessment to provide more real-world experience to students. The CSET embedded frameworks and standards will be demonstrated\, and participants will learn how to apply the frameworks and standards to new and existing SCADA applications and implementations\, including in an IT/OT environment.\n\n Key learner objectives and outcomes for this presentation:\n\nProvide an overview of what SCADA Systems are\, the risks associated with different types of SCADA Systems including the sophisticated threats targeting industrial environments (e.g.\, Stuxnet\, Flame)Understand an overview and introduction of the CSET Tool and various frameworks and standards for SCADA and IT/OT Risk Assessments provided within the CSET Tool.Demonstrate how to apply risk assessment frameworks and standards to enable the governance and implementation of SCADA and IT/OT cybersecurity plans with a focus on the CSET Tool using AI.Examine actionable take-aways for performing a CSET Tool Risk Assessment for SCADA systems in an IT/OT environment.\n
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:60019c220e894da19a8c0f06699de091
URL:http://volunteertraining2026.sched.com/event/60019c220e894da19a8c0f06699de091
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T152500Z
SUMMARY:Integrating the National Cyber League (NCL) into the College Classroom
DESCRIPTION:The National Cyber League (NCL) provides a powerful platform for students to develop applied cybersecurity skills through real-world challenges\, yet many faculty members new to teaching cybersecurity are unsure how to incorporate it effectively into their courses. This interactive workshop is designed to bridge that gap by guiding educators through practical strategies for integrating NCL into the college classroom. Over the course of 1 1/2 hours\, participants will engage in hands-on activities that model how NCL exercises can be aligned with course objectives\, assessment strategies\, and student learning outcomes. The session will begin with an overview of NCL’s structure\, resources\, and competition format\, followed by collaborative exercises where attendees will design sample lesson plans and classroom activities that leverage NCL challenges. Participants will also explore methods for scaffolding student engagement\, fostering teamwork\, and connecting NCL experiences to broader curricular goals. Ample time will be provided for Q&A and peer discussion\, ensuring that attendees leave with actionable ideas tailored to their own teaching contexts. By the end of the workshop\, educators will gain confidence in using NCL as a tool to enrich cybersecurity education\, enhance student motivation\, and provide experiential learning opportunities that prepare students for success in both academic and professional settings.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-701\, Moraine Valley Community College
SEQUENCE:0
UID:bccddbc3fc16b1974b0c26162dc11a41
URL:http://volunteertraining2026.sched.com/event/bccddbc3fc16b1974b0c26162dc11a41
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T152500Z
SUMMARY:Drive to Secure: Integrating IoT Cybersecurity into Automotive Education with the Sentinel Workforce Model
DESCRIPTION:As modern vehicles evolve into sophisticated IoT ecosystems\, the intersection of automotive technology and cybersecurity has become a critical frontier for workforce development. This interactive workshop demonstrates how to bridge the gap between traditional automotive programs and cybersecurity curricula. Participants will explore the application of the National Science Foundation-funded SENTINEL (Security and Networking Training through Immersive\, Novel\, and Experiential Learning) model—a scalable\, non-credit approach pioneered by Wake Technical Community College—specifically tailored for securing in-car communication systems.\n\nThe session will focus on the technical and pedagogical strategies for teaching IoT cybersecurity measures to automotive students. Educators will engage in hands-on demonstrations of in-vehicle network vulnerabilities (such as CAN bus exploitation) and the corresponding defensive protocols required to secure them. Beyond the technical\, we will share "lessons learned" from the Sentinel program’s holistic immersion model\, which integrates industry mentoring and work-based learning into technical instruction.\n\nAttendees will leave with a practical framework for implementing high-impact\, immersive labs that prepare students for the unique security challenges of the transportation and manufacturing sectors. We will conclude with a collaborative session on scaling this cross-disciplinary model to other technical programs\, highlighting how non-credit\, cohort-based pathways can accelerate talent development and complement existing CAE-CD academic tracks.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-403\, Moraine Valley Community College
SEQUENCE:0
UID:a93b391b818e2b75cefd1ec3c62a2504
URL:http://volunteertraining2026.sched.com/event/a93b391b818e2b75cefd1ec3c62a2504
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T143000Z
SUMMARY:Real Time Crime Center and Public University Partnerships for Cybersecurity and Criminal Justice
DESCRIPTION:Rural communities have the same challenges as large metropolitan cities but in different scales. They suffer from gang violence\, drug and human trafficking\, violent crimes\, and vehicular crimes. Combining these crimes with a geographically dispersed area with multiple law enforcement agencies only adds to the challenges. For example\, the City of Knoxville TN covers 100 square miles with 200\,000 residents. Taking that same population density to east Tennessee\, the required land area would be over 1\,000 square miles and cover dozens of agencies. To address these challenges\, East Tennessee State University has partnered with the City of Johnson City\, Northeast Tennessee's largest municipality\, to establish the first Real Time Crime Center (RTCC) at a university that serves the region. The RTCC will be a fusion center of law enforcement agencies that cooperate to combat crime. RTCCs enhance public safety by integrating live surveillance\, data analytics\, and rapid response coordination across law enforcement agencies. These centers enable proactive crime prevention through real-time monitoring and predictive policing strategies. By streamlining communication and access to critical information\, RTCCs improve emergency response times and investigative efficiency. Their implementation fosters community trust and resilience by promoting transparency and data-driven decision-making in public safety operations.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:545e4dad14865bad45bb80b39e62d65c
URL:http://volunteertraining2026.sched.com/event/545e4dad14865bad45bb80b39e62d65c
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T134500Z
DTEND:20260709T143000Z
SUMMARY:Lighting the Way: How a Grassroots Cybersecurity Nonprofit United a Community
DESCRIPTION:What happens when cybersecurity stops being a siloed function and becomes a shared community mission? This session tells the story of the Go Cyber Collective\, a nonprofit that started with a single individual and has grown into a thriving community of more than 90 engaged members meeting monthly\, united by a common goal of strengthening collective cyber resilience.\n\nAttendees will learn how the Go Cyber Collective was intentionally designed to be a lighthouse for the community\, serving as a trusted hub for cybersecurity education\, collaboration\, and support. The presentation explores how strategic partnerships with academia created a gateway for students to engage directly with real-world practitioners\, participate in meaningful discussions\, and build professional networks before entering the workforce.\n\nThe session will also highlight the creation of a mutual aid model that brings together government agencies\, private companies\, and security professionals to support one another during cyber incidents. Rather than competing\, members collaborate\, share expertise\, and respond together when attacks occur.\n\nThis talk is both a case study and a playbook. Attendees will walk away with practical insights on building trust\, growing membership organically\, engaging diverse stakeholders\, and transforming cybersecurity from an isolated discipline into a shared community responsibility.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:f2363bbad6b3a34ae416d4ea88a5e358
URL:http://volunteertraining2026.sched.com/event/f2363bbad6b3a34ae416d4ea88a5e358
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T144000Z
DTEND:20260709T152500Z
SUMMARY:India’s Unified Payments Interface (UPI): Deconstructing Hardware-Backed Security in an AI-Driven World
DESCRIPTION:India’s Unified Payments Interface (UPI) is a real-time digital payment system that has effectively replaced cash for millions of users across India and parts of Asia. As real-time payment platforms expand globally\, the fight against account takeover (ATO) and SIM-swap fraud has intensified.\n\nUPI has emerged as a global benchmark—not only for its massive scale\, processing over 10 billion transactions monthly—but also for its distinctive device-binding security model. Unlike U.S. peer-to-peer (P2P) payment systems that primarily rely on software-based multi-factor authentication (MFA)\, UPI enforces a hardware-and-network-level handshake that tightly couples the user\, device\, SIM\, and bank account.\n\nThis session will explore the UPI technical stack in depth\, examining how it leverages the mobile device’s Trusted Execution Environment (TEE)\, SIM-based identity\, and cryptographic binding to create a practical “Zero Trust” payment ecosystem. Attendees will gain insight into why UPI has proven highly resilient to large-scale fraud—and what global payment systems can learn from its architecture in an AI-accelerated threat landscape.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:e6e9a6b5dff70e90f88afafa08a5a27a
URL:http://volunteertraining2026.sched.com/event/e6e9a6b5dff70e90f88afafa08a5a27a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T144000Z
DTEND:20260709T152500Z
SUMMARY:Securing the Future: Embedding AI-Driven Cybersecurity Across Critical Infrastructure Education
DESCRIPTION:As artificial intelligence and emerging technologies such as quantum computing rapidly transform critical infrastructure sectors\, cybersecurity education must evolve just as quickly. This session presents a scalable\, practice-driven model for embedding AI-enabled cybersecurity concepts across diverse academic programs while strengthening workforce readiness for CISA’s Critical Infrastructure sectors. Drawing on real-world curriculum design\, industry-aligned labs\, and cross-sector collaboration\, this presentation demonstrates how AI can be leveraged both as a defensive tool and a threat vector. Participants will explore hands-on learning strategies that integrate AI-assisted threat detection\, secure system design\, and ethical risk analysis into cybersecurity\, IT\, data science\, and engineering programs. The session highlights partnerships between academia\, industry\, and government stakeholders to ensure instructional relevance\, workforce alignment\, and national security impact\, directly supporting America’s AI Action Plan by securing emerging technologies while harnessing AI for cybersecurity innovation.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:f92d4402c5817ba45720c18da23d5f0d
URL:http://volunteertraining2026.sched.com/event/f92d4402c5817ba45720c18da23d5f0d
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T144000Z
DTEND:20260709T152500Z
SUMMARY:Sharing the Spark: Advancing the Development of New and Early Career Faculty in Cybersecurity Education
DESCRIPTION:The cybersecurity workforce gap in critical infrastructure sectors demands not only more professionals\, but more qualified educators to train them. Critical infrastructure—including energy\, water\, transportation\, healthcare facilities\, and financial services—faces escalating cyber threats while struggling to fill specialized security roles. Two complementary initiatives address this need: the CAE-CD New and Early Career Faculty program and the NCyTE Community College Cybersecurity Fellowship Program. By focusing on faculty development\, these initiatives equip educators with the tools and knowledge needed to deliver high-quality cybersecurity education aligned with the unique requirements of critical infrastructure protection and workforce needs.\n\nThis presentation provides an overview of how these programs support and engage new and early-career faculty throughout their professional development journey. We will explore effective strategies for faculty mentorship\, professional development\, and ongoing skill development that help educators transition successfully into cybersecurity teaching roles at 2-and 4-year institutions. Members from both initiatives\, including participants who have engaged with both programs\, will share their experiences and insights into how these opportunities have shaped their teaching careers and strengthened cybersecurity education.\n\nAttendees will learn practical approaches for supporting faculty development within their own institutions and discover how collaborative efforts across programs can amplify impact. Whether you're a new faculty member seeking guidance or an administrator looking to strengthen your faculty pipeline\, this session offers valuable perspectives on building and sustaining excellence in cybersecurity education.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T Fogelson Theater\, Moraine Valley Community College
SEQUENCE:0
UID:67bc9ffecaf846d2c15d80950e8272f7
URL:http://volunteertraining2026.sched.com/event/67bc9ffecaf846d2c15d80950e8272f7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T144000Z
DTEND:20260709T152500Z
SUMMARY:The Cognitive Training: Operate Like a Pro Athlete
DESCRIPTION:Esports has evolved into a globally recognized\, high-stakes competitive sport. This shift\, recognizing professional gamers as "cognitive athletes\," is not only reshaping entertainment but also creating a tactic to advance cyber talent to meet the demands of emerging accelerants like AI and quantum\, as the skills essential for top-tier esports competitors mirror the mental architecture needed for future tech professionals.\n\nThis keynote explores the emerging Cognitive Domain and how the high-pressure\, mentally demanding competitive gaming offers a powerful\, unconventional training ground for critical infrastructure resilience.\n\nWe will frame the human mind not just as a tool\, but as a muscle requiring deliberate conditioning. Through analysis of neurological data and performance metrics from top-tier competitive gaming\, this presentation will demonstrate how structured cognitive conditioning—focused on rapid decision-making\, pattern recognition under stress\, sustained attention\, and collaborative problem-solving—directly translates into enhanced mental agility to counter advanced persistent threats\, strengthening focus during prolonged monitoring sessions\, and optimizing team coordination under the duress of a live cyber-attack on critical systems.\n\nJoin us to uncover the science behind "training like a pro gamer" for high-performing operations. We will conclude with dedicated small group discussions designed to actively engage the audience in exploring and defining the practical application of cognitive games and specialized exercises within both academic curricula and industry professional development programs. Attendees will leave with actionable insights on building a superiorly conditioned "cognitive muscle" ready to face the future of critical infrastructure security.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:179209b21e9f1590a31f7f6490e1aa02
URL:http://volunteertraining2026.sched.com/event/179209b21e9f1590a31f7f6490e1aa02
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T153000Z
DTEND:20260709T160000Z
SUMMARY:Mid-Day Break 3
DESCRIPTION:
CATEGORIES:
LOCATION:Building T Main Lobby\, Moraine Valley Community College
SEQUENCE:0
UID:823330c18d767116546c22b4c7f2cbb8
URL:http://volunteertraining2026.sched.com/event/823330c18d767116546c22b4c7f2cbb8
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T160000Z
DTEND:20260709T164500Z
SUMMARY:From Classroom to Career: Cybersecurity in the Real World
DESCRIPTION:Artificial intelligence and emerging technologies are reshaping how organizations operate\, secure data\, and manage risk. This presentation examines the expanding role of AI\, automation\, and advanced digital systems in modern cybersecurity and governance environments. Emphasis is placed on understanding how emerging technologies introduce new threat vectors\, ethical concerns\, and compliance challenges alongside their benefits.\n\nDrawing from experience in cybersecurity education and technology governance\, the session explores practical examples of AI-driven systems\, cloud platforms\, and automated decision-making tools\, highlighting associated risks such as data privacy\, model bias\, system misuse\, and overreliance on automation. Attendees will gain insight into how foundational cybersecurity principles\, risk assessment\, and policy awareness can be applied to emerging technologies to support responsible and secure adoption. The presentation encourages a balanced approach that integrates technical understanding with governance\, ethics\, and risk management to better prepare students and professionals for an evolving digital landscape.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:3210d8ba79217997bfb1abb93668a2c1
URL:http://volunteertraining2026.sched.com/event/3210d8ba79217997bfb1abb93668a2c1
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T160000Z
DTEND:20260709T164500Z
SUMMARY:The Cyber Nobody Thinks About: Discovering Work Roles Protecting Critical Infrastructure Through Try Cyber's Micro-Challenges
DESCRIPTION:Framing technical cybersecurity concepts through critical infrastructure places abstract cyber vulnerabilities in everyday life\, connecting them to systems we rely on and only notice when they stop working. This presentation will highlight how Try Cyber's digital mentor-guided micro-challenges can be used to engage the cyber curious by situating common cybersecurity tasks and work roles within critical infrastructure contexts. Try Cyber bridges the gap between cybersecurity talent development and critical infrastructure workforce needs by offering hands-on experiences that demonstrate how cyber professionals protect essential services within critical infrastructure sectors. Attendees to this session will learn strategies for using these critical infrastructure-focused micro-challenges to spark interest\, facilitate work role discovery\, and create memorable first experiences with cybersecurity concepts.\n\nTry Cyber helps students and professionals understand that cyber career opportunities extend far beyond traditional tech companies. Participants discover how cybersecurity expertise safeguards transportation networks\, ensures emergency services remain operational during crises\, protects communication systems\, secures water treatment facilities\, and defends financial transactions. Newly released micro-challenges\, specifically introduce fundamental cybersecurity concepts related to privacy compliance\, systems security management\, infrastructure support\, incident response\, and digital evidence collection and analysis through the lens of critical infrastructure sectors.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:62deeed57ce2c7c6a9d9c39925cecfd2
URL:http://volunteertraining2026.sched.com/event/62deeed57ce2c7c6a9d9c39925cecfd2
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T160000Z
DTEND:20260709T164500Z
SUMMARY:Designing an AI-Mentored IoT Course Using Agile
DESCRIPTION:This presentation introduces the instructional format behind Sinclair College’s AI-mentored Internet of Things (IoT) course\, designed to blend experiential learning\, Agile practices\, and personalized student pathways. The class is structured around two-week sprints in which students are expected to deliver demonstrable value\, mirroring real-world IoT product and systems development.\n\nEach sprint includes three stand-up meetings distributed across the two weeks\, followed by a value presentation to a client and a structured retrospective. Students work from a Kanban board populated with value-based deliverables and supportive task suggestions. While these deliverables provide clear guidance\, students are empowered to modify or create their own\, allowing them to pursue individual interests and tailor solutions to specific IoT verticals.\n\nThe course is composed of seven two-week sessions\, each focused on a different IoT domain. Two of these sessions are dedicated specifically to IoT security\, encouraging students to incorporate security considerations directly into their projects. Rather than treating security as a standalone topic\, students are guided to apply secure design\, threat awareness\, and risk mitigation within the context of their chosen verticals and use cases.\n\nAgile is embedded throughout the course\, giving students hands-on experience with multiple practices such as monitoring flow metrics\, Kanban board visualization\, and Scrum events. These experiences prepare students for industry expectations and provide foundational Agile knowledge aligned with Professional Kanban I (PKI) certification. The result is a scalable\, adaptive learning model that unifies AI mentorship\, Agile delivery\, and modern IoT education.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-925\, Moraine Valley Community College
SEQUENCE:0
UID:8d3ec8f492ac7e38ebecbdd375bfb451
URL:http://volunteertraining2026.sched.com/event/8d3ec8f492ac7e38ebecbdd375bfb451
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T160000Z
DTEND:20260709T164500Z
SUMMARY:Teaching AI Essentials for Cybersecurity: Curriculum\, Skills\, and Case Studies
DESCRIPTION:Artificial Intelligence is transforming the communications and technology landscape\, driving an urgent need for professionals who can effectively understand\, deploy\, and protect AI‑powered systems. This session presents a practical\, interdisciplinary approach to preparing the cybersecurity workforce through the EC-Council Artificial Intelligence Essentials course outline and contents\, emphasizing the foundational knowledge\, skills\, and abilities (KSAs) required for AI‑aware cybersecurity practice.\n\nPresenters will outline the structure and learning objectives of the AI Essentials course\, highlighting core competencies targeted in the course. Attendees will also receive an overview of the curriculum’s resource ecosystem\, including guidance on how to obtain free instructional materials (e book and video lectures) and optional add‑ons such as hands‑on labs\, exam‑prep modules\, and certification exam vouchers.\n\nThe session features case studies from North Carolina Central University and Lenoir Community College\, both of which piloted the course across diverse student groups. Faculty will share implementation experiences\, student outcomes\, lessons learned\, and recommendations for institutions considering adoption.\n\nBy linking AI literacy with cybersecurity readiness\, this session provides a scalable model for equipping learners across disciplines with the essential skills needed to navigate—and secure—an increasingly AI‑driven world
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:b1e32d76e5e0756dd180783245b90abb
URL:http://volunteertraining2026.sched.com/event/b1e32d76e5e0756dd180783245b90abb
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T160000Z
DTEND:20260709T164500Z
SUMMARY:AI++ / AI--: Applying Cyber Risk Thinking to Generative AI in the Classroom
DESCRIPTION:As generative AI tools become embedded in teaching and learning\, students must learn not only how to use these technologies but also how to evaluate\, validate\, and take responsibility for their outputs. In cyber-related fields\, unverified or inaccurate AI-generated content introduces real risk\, affecting documentation\, policy analysis\, compliance\, and technical decision-making. This session applies cyber risk thinking to generative AI use in the classroom\, framing AI use as a system that must be assessed for potential threats\, vulnerabilities\, impact\, and appropriate safeguards. Rather than framing AI as inherently good or bad\, the presenters focus on helping students recognize tradeoffs\, understand where AI adds value\, and where human judgment remains essential. The presentation brings together a community college faculty member and a four-year university faculty member to share lessons learned from teaching with generative AI across the academic pipeline. Drawing on experiences from Privacy for Professionals and related courses\, the presenters share best practices for teaching ethical and responsible AI use in ways that prepare students for academic progression and professional expectations. The session also highlights how the AI Assessment Scale (AIAS) was used to clarify acceptable AI use and to reinforce accountability\, transparency\, and verification of AI-generated work. Attendees will leave with practical strategies and classroom-ready case studies they can adapt for embedding ethical AI use\, risk awareness\, and student responsibility into business\, policy\, IT\, and cybersecurity curricula.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:05a92376aa90bca099ed2584f4351860
URL:http://volunteertraining2026.sched.com/event/05a92376aa90bca099ed2584f4351860
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T170000Z
DTEND:20260709T173000Z
SUMMARY:Working Lunch
DESCRIPTION:Pick up your lunch in the foyer and proceed to the Moraine Rooms for the lunch panel and discussion.
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:2c110020902737136424b8749f97ace2
URL:http://volunteertraining2026.sched.com/event/2c110020902737136424b8749f97ace2
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T173000Z
DTEND:20260709T183000Z
SUMMARY:Lunch Speaker: The New Perimeter: AI Ethics\, Data Risk\, and Cybersecurity in Every Organization
DESCRIPTION:When we talk about cybersecurity\, we tend to focus on threats from the outside: phishing attacks\, ransomware\, and data breaches. But the most consequential vulnerabilities in any organization right now are already inside the building\, embedded in the tools used every day.\n&nbsp\;\nGenerative AI has moved from an occasional experiment to a constant presence in the learning and operational environments\, and most institutions and businesses have not kept up. Every time a user uploads work to a public AI tool\, and every time a user uses an agentic system to complete an assignment\, and every time a department adopts a new AI application without a data protection and retention policy\, the institution or orgnaization accepts risk it may not even recognize.\n&nbsp\;\nThis session frames AI governance as a cybersecurity imperative\, not just a pedagogical or business competitive preference. Drawing on law\, ethics\, and cross-disciplinary policy practice\, we will examine where the real vulnerabilities are\, what workers in every discipline need to understand\, and what practical guardrails look like in a world where the threat is already inside the perimeter.\n\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:9ab01492ea7b1037f1fd7402905ebc4a
URL:http://volunteertraining2026.sched.com/event/9ab01492ea7b1037f1fd7402905ebc4a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T184500Z
DTEND:20260709T193000Z
SUMMARY:Impact of GenAI in the Classroom - Case Study from a Capstone Course!
DESCRIPTION:Generative Artificial Intelligence (GenAI)\, which uses Large Language Models (LLMs)\, has existed for a few years and has significantly influenced higher education. Although educators understand what GenAI is\, they find it challenging to implement it effectively in the classroom. While some disruptions have impacted student learning and assessment\, they have also notably affected faculty teaching STEM\, Business\, and other disciplines.&nbsp\;\n\nThis session will examine the impact on curriculum development\, assessment strategies\, and teaching methods for a business course\, including a case study from a Business Capstone course in the ABIT BAS program at UH Maui College. Session learning outcomes will include designing an adaptive curriculum\, project-based assessments\, and oral student presentations that showcase creativity in solving new and unique problems.\n\nThis session will cover general topics of interest to faculty\, staff\, and administrators\, including hands-on activities to actively engage a diverse audience. &nbsp\;
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:432667123d2426363940b7b622c3dbf4
URL:http://volunteertraining2026.sched.com/event/432667123d2426363940b7b622c3dbf4
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T184500Z
DTEND:20260709T203000Z
SUMMARY:WARDEN: Visualizing the Cyber Kill Chain
DESCRIPTION:Help us build the future of cyber defense training!&nbsp\;Join our WARDEN group playtest and workshop to contribute to a hands-on tool that visualizes the Cyber Kill Chain and empowers our IT fleet.\n\nThe “Autonomous Cyber Defense Challenge” is a workforce development effort offered by the Naval Information Warfare Center (NIWC) Pacific’s Basic and Applied Research Department to increase our understanding of the Cyber Kill Chain and how the use of deception can mitigate attacks. This introductory course focuses on autonomous agents\, network analysis\, and cyber Tactics\, Techniques\, and Procedures (TTPs). NIWC Pacific Science and Technology (S&T) develops novel research to produce applications that better train organizations and personnel to defend themselves\, and to augment our Naval warfighters' IT capabilities.\n\nWARDEN is a game-like application designed to empower engineers and scientists with a comprehensive understanding of Cyber Kill Chain fundamentals. This program aims to enable participants to apply security measures\, assess vulnerabilities\, conduct data collection and analysis of various network locations\, understand attack nomenclature\, and comprehend how using deception can offset an attack. These objectives encompass a broad knowledge base\, including familiarity with the taxonomy of cyber-attack behaviors\, reduction in time-from-machine\, and the ability to adapt to the continuously evolving landscapes of autonomous technology.\n\nThe objective of this workshop is to develop a cross-competency workforce of highly skilled network examiners and analysts who are expertly skilled at identifying attacks\, understanding the benefit of creating defensive machine learning agents\, and producing defensive mitigations which can be applied to mission-critical systems.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-403\, Moraine Valley Community College
SEQUENCE:0
UID:98cd740420fa57de5ea203a456dbd522
URL:http://volunteertraining2026.sched.com/event/98cd740420fa57de5ea203a456dbd522
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T184500Z
DTEND:20260709T193000Z
SUMMARY:The Role of Community Colleges and private industry in Developing Student-Powered SOCs
DESCRIPTION:As cybersecurity threats continue to grow and the workforce gap widens\, community colleges are uniquely positioned to play a critical role in developing the next generation of cyber professionals. This presentation explores the value of establishing student-run Security Operations Centers (SOCs) through partnerships between community colleges and local managed service providers (MSPs). Drawing on lessons from workforce development research and practice\, including prior work on bridging cybersecurity skills gaps\, we highlight how experiential learning models enable students to develop real-world skills in threat monitoring\, incident response\, and security operations while still in the classroom. The session will examine how collaboration among education\, industry\, and community partners creates sustainable talent pipelines\, strengthens institutional security\, and provides employers with job-ready graduates. Attendees will gain practical insights into partnership models\, implementation considerations\, and measurable benefits for students\, colleges\, and industry stakeholders seeking scalable\, hands-on cybersecurity training solutions.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:1e4b2ca983e3b4917e252b63f540609d
URL:http://volunteertraining2026.sched.com/event/1e4b2ca983e3b4917e252b63f540609d
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T184500Z
DTEND:20260709T193000Z
SUMMARY:Teaching Cybersecurity for Jobs That Don’t Exist: Why Space Is the Ultimate Interdisciplinary Classroom
DESCRIPTION:Cybersecurity education often lags the reality of how critical infrastructure systems actually operate—interconnected\, global\, and shaped by risks that cross technical\, organizational\, and national boundaries. This presentation argues that space is uniquely suited to close that gap.\n\nDrawing on a collaboration between the University of Colorado\, Colorado Springs and Space ISAC\, this session reframes space not as a niche technical domain\, but as a pedagogical integrator—one that forces students to reason simultaneously about cybersecurity\, AI\, supply chains\, governance\, resilience\, and international coordination. Space systems touch nearly every critical infrastructure sector and operate in environments where failure is systemic\, consequences are global\, and roles evolve faster than job descriptions.\n\nPresenters will share how faculty and industry leaders co-designed interdisciplinary learning experiences that expose students to real-world cyber risk\, international perspectives\, and emerging workforce roles that did not exist when most academic programs were conceived. Attendees will leave with a new way to think about cybersecurity education: not as content to be added\, but as a capability to be cultivated across disciplines.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:931e6bbd9e19ffc037d4b03ca269d9cf
URL:http://volunteertraining2026.sched.com/event/931e6bbd9e19ffc037d4b03ca269d9cf
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T184500Z
DTEND:20260709T193000Z
SUMMARY:When Less Isn't More in Critical Infrastructure Protection
DESCRIPTION:The cybersecurity landscape is shaped by an expanding and often overlapping set of standards and regulatory compliance frameworks\, including FERC\, NERC\, HIPAA\, NIST\, ISO\, CISA guidance\, and other privacy laws and sector-specific requirements. Navigating these requirements and frameworks presents challenges not only for organizations implementing security programs\, but also for educators and workforce developers preparing the next generation of cybersecurity professionals. This session explores how cybersecurity standards and regulatory requirements align with workforce frameworks—such as the DCWF and NICE Workforce Framework—and how these connections can be best operationalized through industry-informed curricula and advisory committees.
CATEGORIES:HUMAN FACTORS PRIVACY ETHICS AND GOVERNANCE IN CYBERSECURITY
LOCATION:BLDG T-926\, Moraine Valley Community College
SEQUENCE:0
UID:95d3d2c2587dca7f4e2357a17ff1e827
URL:http://volunteertraining2026.sched.com/event/95d3d2c2587dca7f4e2357a17ff1e827
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T194500Z
DTEND:20260709T203000Z
SUMMARY:AI Supply Chain Vulnerabilities: A Backdoor Attack Demonstration Using Real Data
DESCRIPTION:Artificial intelligence (AI) systems increasingly depend on complex supply chains that include externally sourced datasets\, pretrained model checkpoints\, fine-tuning pipelines\, and automated feedback mechanisms. This layered dependency structure exposes AI systems to supply chain vulnerabilities that differ fundamentally from those in traditional software engineering. This work demonstrates that AI is not an exception to supply chain risk\; rather\, it amplifies such vulnerabilities through its reliance on data-driven learning. Using a backdoor poisoning attack on the EMNIST dataset—an expanded 2017 successor to the original MNIST benchmark—the study shows how a small\, automated manipulation of upstream training data can implant persistent\, targeted misbehavior in a downstream model without altering code\, architecture\, or infrastructure. Empirical evaluation\, including clean versus triggered confusion matrices and visual inspection\, reveals the stealth\, effectiveness\, and reproducibility of the attack. The findings underscore the need for rigorous provenance tracking\, auditing\, and adversarial evaluation frameworks to secure AI supply chains\, particularly as AI becomes embedded in emerging technologies and autonomous systems.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-924\, Moraine Valley Community College
SEQUENCE:0
UID:7a728c3f9fadedbc876fd7b17b07a0b6
URL:http://volunteertraining2026.sched.com/event/7a728c3f9fadedbc876fd7b17b07a0b6
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T194500Z
DTEND:20260709T203000Z
SUMMARY:Reimagining Cybersecurity and AI Education in Information Technology Domains
DESCRIPTION:Cybersecurity—and more recently\, artificial intelligence—has become pervasive across computing education\, including Information Technology Systems (ITS). Long before cybersecurity was formally recognized as a distinct discipline\, its principles were deeply embedded within IT practice and instruction. While cybersecurity now stands as its own domain\, many IT areas continue to rely heavily on its foundations. At the same time\, emerging competencies driven by AI adoption are reshaping what is uniquely essential to the IT field.\n\nThis work revisits the core concepts central to ITS and examines how they must evolve in response to AI integration. We argue for the development of updated professional competencies and dispositions that reflect the realities of modern IT practice\, where cybersecurity awareness\, adversarial thinking\, and AI literacy are inseparable from system administration\, networking\, and infrastructure management. By reframing these competencies\, this paper contributes a perspective for aligning IT education with contemporary technological and workforce demands.
CATEGORIES:AI EMERGING TECHNOLOGIES AND RISK IMPLICATIONS
LOCATION:BLDG T-925\, Moraine Valley Community College
SEQUENCE:0
UID:65959e4c49e0072b790c1c7b99ac3a95
URL:http://volunteertraining2026.sched.com/event/65959e4c49e0072b790c1c7b99ac3a95
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T194500Z
DTEND:20260709T203000Z
SUMMARY:Critical Alert Received: Navigating Critical Supplier Cybersecurity Vulnerabilities for All Sectors
DESCRIPTION:Organizations increasingly rely on complex supplier ecosystems\, making rapid identification and response to critical cybersecurity vulnerabilities a key operational risk. \n\nThis session focuses on a structured\, repeatable approach for identifying\, validating\, and responding to critical supplier cybersecurity vulnerability alerts originating from a myriad of sources. The session will examine how organizations can integrate threat intelligence\, vendor communications\, asset visibility\, and governance workflows to enable timely decision-making and coordinated response. Participants from all disciplines and sectors are encouraged to bring their supplier lists for the demonstration and walk-through of real examples.
CATEGORIES:CYBERSECURITY RISK AND REAL WORLD PROBLEM-SOLVING
LOCATION:BLDG T-404\, Moraine Valley Community College
SEQUENCE:0
UID:512a244012675d65d5fabf343f3be294
URL:http://volunteertraining2026.sched.com/event/512a244012675d65d5fabf343f3be294
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T194500Z
DTEND:20260709T203000Z
SUMMARY:Cyber by Design: Supporting Cyber-Ready Pathways Across Disciplines
DESCRIPTION:Cybersecurity touches far more students than just those who plan to major in it. Students in programs such as healthcare\, medical records\, criminal justice\, automotive technology\, and manufacturing regularly encounter cybersecurity issues in their coursework and future jobs\, but they don’t always see how cybersecurity skills connect to their fields.\n\nThis workshop introduces the Explore Cyber Toolkit\, a collection of practical resources designed to help students explore cybersecurity careers across disciplines. Co-presented by a faculty member and an academic advisor\, the session shows how teaching and advising can work together to support conversations about cybersecurity careers\, minors\, certificates\, and cyber-adjacent pathways.\n\nParticipants will work through several of the toolkit’s worksheets\, including activities focused on interests and personality\, career role mapping\, and pathway planning. These tools are designed to help students connect what they already enjoy and do well in their majors to cybersecurity roles that exist in critical infrastructure areas like healthcare\, manufacturing\, transportation\, and public safety.\n\nRather than treating cybersecurity as a standalone program\, the workshop focuses on using shared tools and common language to make cyber pathways clearer and more accessible to a wider range of students. Attendees will leave with ready-to-use worksheets and practical ideas they can immediately apply in advising sessions\, classrooms\, workshops\, and outreach events.
CATEGORIES:FOUNDATIONS OF INTERDISCIPLINARY CYBERSECURITY
LOCATION:BLDG T-101/102\, Moraine Valley Community College
SEQUENCE:0
UID:c5121dfd6a70e5caf230d21698afd997
URL:http://volunteertraining2026.sched.com/event/c5121dfd6a70e5caf230d21698afd997
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T203000Z
DTEND:20260709T210000Z
SUMMARY:Mid-Day Break 4
DESCRIPTION:
CATEGORIES:
LOCATION:BLDG M Moraine Foyer\, Moraine Valley Community College
SEQUENCE:0
UID:39cccfbbfd06bdecb0f3543b5287b0ae
URL:http://volunteertraining2026.sched.com/event/39cccfbbfd06bdecb0f3543b5287b0ae
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T210000Z
DTEND:20260709T212000Z
SUMMARY:Student Spotlight: TBD
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:94f667f5eb5b952d18c06c80bef296f7
URL:http://volunteertraining2026.sched.com/event/94f667f5eb5b952d18c06c80bef296f7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T212000Z
DTEND:20260709T220000Z
SUMMARY:Future Forward: Strategic Wrap Up
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:e11aa79ebeed2732dde9646a0c5c2fed
URL:http://volunteertraining2026.sched.com/event/e11aa79ebeed2732dde9646a0c5c2fed
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260520T234142Z
DTSTART:20260709T220000Z
DTEND:20260709T221000Z
SUMMARY:Closing Remarks
DESCRIPTION:\n
CATEGORIES:
LOCATION:BLDG M Moraine Rooms\, Moraine Valley Community College
SEQUENCE:0
UID:e004244c63d4764295868423cede4c3e
URL:http://volunteertraining2026.sched.com/event/e004244c63d4764295868423cede4c3e
END:VEVENT
END:VCALENDAR
