2022 Cyber Security Day

The above images are from the 2022 Cyber Security Day.

The fifteenth annual Cyber Security Day was held Tuesday, October 18, 2022, in the HUB Ohio Room on the IUP main campus.

Information for the Event

Schedule of the Event

9:00-9:05 a.m.: Introduction

Waleed Farag, Director, Institute for Cyber Security and Professor of Computer Science

9:05-9:10 a.m.: Provost Remarks

Lara Luetkehans, IUP's Provost and Vice President for Academic Affairs

9:10-9:15 a.m.: Opening Remarks

Steven Hovan, Dean, Kopchick College of Natural Sciences and Mathematics

9:15-9:20 a.m.: Welcome Message

Francisco E. Alarcon, Chair, Department of Mathematical and Computer Sciences

9:20-9:30 a.m.: Event history, ICS work, and recent achievements, and logistics.

Waleed Farag, Director, Institute for Cyber Security and Professor of Computer Science

9:30-10:15 a.m.: Countermeasures and Risk Management: A Principled Approach

Dr. Rita Doerr, Academic Outreach Lead, National Security Agency

10:20-11:05 a.m.: From Gang Busters to Ransomware Gangs: Evolution of FBI Investigations

Ms. Mackenzie Monarko, Special Agent & Private Sector Coordinator, FBI Pittsburgh

11:10-11:55 a.m.: Become a Cyber Warrior for Free, Courtesy of Uncle Sam!

Mr. Christopher May, Technical Director, Cyber Workforce Development, CERT® Division, Software Engineering Institute, Carnegie Mellon University

12-1:15 p.m.: Lunch Break

1:15-2:00 p.m.: Information Warfare

Dr. Bryant Wysocki, Senior Level Executive, Technical Advisor for C4I and Cyber Systems for the Air Force and Associate Director, Air Force Research Laboratory, Rome NY 

2:00-2:10 p.m.: Afternoon break

2:10-2:55 p.m.: Designing Systems for Security: Walls are Only as Secure as They are Designed

Mr. Nigel Wright, Director of Product for Locomation

2:55-3:05 p.m.: Afternoon break

3:05-3:50 p.m.: Multi-Factor Authentication: A Cybersecurity Difference Maker

Panel Discussion: Amanda Marshall, Director, Project Management, Dan Yuhas, Director, IT Compliance and Administration, and Bill Balint, Chief Information Officer. Moderator, Todd Cunningham, Executive Director, IT Services

3:50-4:00 p.m.: Conclusions

Waleed Farag, Director, Institute for Cyber Security at IUP

Guest Speaker Biographical Information

Rita Doerr, Academic Outreach Lead, National Security Agency

Dr. Joe HarfordRita Doerr has been employed as a computer scientist with the National Security Agency for over 37 years. She is currently the academic outreach lead for the Cybersecurity Directorate’s (CSD) Cybersecurity Collaboration Center. Prior to her arrival at CSD, she was a cyber instructor within NSA’s National Cryptologic School’s College of Cyber. During this assignment, Doerr completed a three-year technical development program focusing on cybersecurity education and training, where she toured in NSA’s Red Team and Academic Engagement Offices. Her external tours included teaching at Archbishop Spalding High School and the University of Maryland, Baltimore County’s CSEE graduate program, and serving as a cyber consultant for the Maryland Air National Guard’s 175th Cyberspace Operations Group.

Mackenzie Monarko, Special Agent and Private Sector Coordinator, FBI Pittsburgh

Dr. Balaji PalanisamySpecial Agent Mackenzie Monarko joined the FBI in 2006 and is currently assigned to the FBI Pittsburgh Division. Her previous office assignments included Albuquerque and Philadelphia, and she has worked a variety of investigations to include violent gangs, organized crime, international and domestic terrorism, and criminal cyber matters. In January 2021, SA Monarko took on the role of private sector coordinator, where she works closely with cyber and counterintelligence agents and intelligence analysts to keep organizations apprised of priority threat intelligence.

Christopher May, Technical Director, Cyber Workforce Development, CERT Division, Software Engineering Institute, Carnegie Mellon University

Mr. Dom Glavach

Christopher May is a technical director within the CERT Division of Carnegie Mellon University’s Software Engineering Institute. In this role, he leads a team of over 60 cybersecurity researchers in developing the technical abilities of the US military’s cyber operators. Additionally, he founded the Cyber Forensics and Incident Response curriculum track within CMU’s Information Security master’s degree program and taught courses therein for 17 years. Before joining Carnegie Mellon, May served seven years as a US Air Force communications officer. 

Bryant Wysocki, Senior Level Executive, Technical Advisor for C4I and Cyber Systems for the Air Force and Associate Director, Information Directorate, Air Force Research Laboratory, Rome, NY

Bryant Wysocki

Bryant Wysocki, a senior-level executive, is the technical advisor for C4I and cyber systems for the Air Force and associate director, Information Directorate, Air Force Research Laboratory, Rome, New York. As the recognized national/international authority on C4I and cyber systems, Wysocki provides technical oversight of these areas for the Air Force and advice on C4l and cyber systems to the highest level Air Force and government officials. The mission of the Information Directorate is to lead the discovery, development, and integration of affordable warfighting information technologies for our air, space, and cyberspace multi-domain forces. The directorate consists of more than 1,200 onsite military and civilian scientists, engineers, and support personnel with an annual budget greater than $1.8 billion. Wysocki evaluates technical approaches, develops transition strategies for directorate technologies, and serves as the senior scientist liaison to external national and international partners across government, academia, and industry. Wysocki started his active duty career with the Air Force as a nuclear weapons technician in 1991 and served in numerous technical and operational positions throughout his service as a development engineer and later as a civilian scientist. Previously, as Information Directorate chief engineer, Wysocki was responsible for developing and implementing tailored engineering policies, processes, and technical programs across the directorate's broad spectrum of information science research and development. He served the directorate as the primary authority on systems engineering and technology program management and provided technical oversight on directorate programs and engineering workforce development. Wysocki is a retired Air Force officer with experience in industry, academia, and government. He has broad technical leadership experience with a diverse background in military operations, acquisitions, logistics, maintenance, program management, systems engineering, engineering physics, fundamental research, and technology development.

Nigel Wright, Director of Product for Locomation
Mr. Jon Roumfort

Nigel Wright is an alumnus of California University of Pennsylvania and an advocate for reliable, safe, and secure automated systems. Wright has spent his career developing safety-critical autonomous systems and currently serves as director of product for Locomation. Responsible for product initiatives and strategy, Wright works with the team to ensure that the human-led convoy delivers safe, consistent, and reliable performance, generating value for the end customers. Wright also supports the advisory boards for Indiana University of Pennsylvania and PennWest California, providing support for curriculum development. Wright holds a bachelor’s degree in computer engineering technology from California University of Pennsylvania, a master’s degree in business administration from Point Park, and has completed executive post-graduate education in software architecture (Carnegie Mellon University Software Engineering Institute), model-based system engineering with (MITx), innovation management (Villach, Austria), and leadership and culture (Harvard University in partnership with Uber).

Bill Balint, Chief Information Officer, IUP

Craig PluchinskyBill Balint has 34 years of IT experience and became IUP's chief information officer in 2006. Bill has presented at more than 50 industry events at the regional, state, national, and international levels and has authored, co-authored, or been interviewed for more than 35 publications and websites via written, audio, and video formats. He is also a member of the Pittsburgh Executive CIO governing board.

Dan Yuhas, Director, IT Compliance and Administration, IUP

Cody Toy

Daniel J. Yuhas, director, IT Compliance and Administration, Indiana University of Pennsylvania. Yuhas received his BS in computer science from IUP in 1988. He began his career as a software engineer for Vitro Corporation designing tactical weapons systems for the US Navy.  He has held a variety of technology positions at IUP for 32 years, including director of Research and Development and director of Instructional and Research Technologies. He currently serves as director of IT Compliance and Administration focusing on IT compliance, cybersecurity, IT strategy, IT governance, IT policy, contracting, and personnel and financial management.

Amanda L. Marshall, Director, Project Management, IUP

Cody Toy

Amanda L. Marshall, director, Project Management, Indiana University of Pennsylvania. Marshall received her BS in management information systems from IUP in 1996. She began her career as a help desk technician for Commonwealth Systems Corporation. Amanda has held several technology positions at IUP, including technology support analyst, user services coordinator, and, most recently, director of project management for IT Services. One of the most recent projects Amanda has been tasked with is the implementation of Duo, IUP’s multifactor authentication service. She is also instrumental in IUP cybersecurity initiatives. Amanda communicates regularly with the IUP community by alerting users to phishing and scam alerts and providing information and tips to educate users on the importance of cybersecurity.

Titles and Abstracts

Rita Doerr, Academic Outreach Lead, National Security Agency

  • Title: Countermeasures and Risk Management: A Principled Approach
  • Abstract: Countermeasures are any actions, devices, procedures, techniques, or other measures that reduce the vulnerability of any information system. This presentation provides a principled approach to using countermeasures when attempting to thwart cyber adversarial attacks.  We will address several techniques that will help to reduce and mitigate impact through the principles of Defense in Depth and Least Privilege and briefly speak to how one must remain ever vigilant.

Mackenzie Monarko, Special Agent & Private Sector Coordinator, FBI Pittsburgh

  • Title: From Gang Busters to Ransomware Gangs: Evolution of FBI Investigations
  • Abstract: This talk will explore the history of the FBI and walk the participants through the progression of FBI investigations from traditional criminal matters to modern-day cyber and counterintelligence investigations. Regardless of their level of sophistication, criminals are leveraging technological advances to evade detection by law enforcement. Some actors, whether they are financially motivated or nation-states, use a vast array of skills to hide within corporate networks to steal data or intellectual property. This talk will highlight how knowledge and understanding of computer science and information systems and being “tech savvy” are useful to advance investigations.

Christopher May, Technical Director, Cyber Workforce Development, CERT® Division, Software Engineering Institute, Carnegie Mellon University

  • Title: Become a Cyber Warrior for Free, courtesy of Uncle Sam!
  • Abstract: This talk will showcase and demonstrate technologies and methods for rapidly enhancing and assessing the skills and experience-level of aspiring cyber operators and defenders. The CERT® division of Carnegie Mellon University’s Software Engineering Institute develops cutting-edge cyber training platforms, simulators, and hands-on content in support of the U.S. Department of Defense and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). These capabilities were recently released as open-source software and are used for U.S. Indo-Pacific Command’s Cyber Endeavor exercise, the U.S. Army’s Gaining Cyber Dominance program and the White House-sponsored President’s Cup Cybersecurity Competition. The presenter will discuss how organizations can easily leverage these freely-available tools to jump start or enhance their own training, testing or security research programs.

Bryant Wysocki, Senior Level executive, Technical Advisor for C4I and Cyber Systems for the Air Force and Associate Director, Information Directorate, Air Force Research Laboratory, Rome, NY

  • Title: Information Warfare 
  • Abstract: Technology is advancing at speeds beyond previous human experience and nowhere is this more evident than in cyber information systems. The resulting information flow fuels our global economy, has altered world cultures, and serves as critical infrastructure within society and national security. Our information dependencies go deep making the assurance of cyber dependent missions a national priority. This talk examines the evolving challenges connected to protecting information in an increasingly fast paced and complex landscape where cyber capabilities converge with other more traditional means of national defense. The material introduces operational concepts related to information assurance and the four pillars of information warfare while considering the attributes of a stable and resilient information infrastructure.

Nigel Wright, Director of Product for Locomation

  • Title: Designing Systems for Security: Walls are only as secure as they are designed
  • Abstract: In any industry, proper system design will be the difference between success and failure. Allocation of system features, design of data elements, and thoughtful consideration of tradeoffs must occur to ensure that the product is secure, robust and reliable at the end of the day. In this engaging presentation, participants will learn about historical failures of secure system designs made by teams choosing the wrong incentives and understand how these factors will impact them in the real world.

Panel Discussion: Amanda Marshall, Director, Project Management, Dan Yuhas, Director, IT Compliance and Administration, and Bill Balint, Chief Information Officer. Moderator, Todd Cunningham, Executive Director, IT Services

  • Panel Title: Multi-Factor Authentication: A Cybersecurity Difference Maker
  • Abstract: This panel discussion will provide attendees with a working knowledge of multifactor authentication (MFA) and to explain its purpose as part of a cybersecurity program. Attendees will learn why MFA is helpful, how it works, its benefits and challenges, and various other related information.

Previous Events 

Each year, the Institute for Cyber Security, in collaboration with IT Services, hosts Cyber Security Day (known previously as Information Assurance Day). This day-long event features nationally recognized security experts as well as speakers from the government, the security industry, and academia. Cyber Security Day is open to all IUP members, the public, community colleges, and neighboring universities.

Below is brief information about previous years' events.

2021
Proceedings, Program and Photo Gallery for the 14th annual Cybersecurity Day, held on October 26, 2019.

2020
Proceedings, Program and Photo Gallery for the 13th annual Cybersecurity Day, held on October 20, 2019.

2019
Proceedings, Program and Photo Gallery for the 12th annual Cybersecurity Day, held on October 29, 2019.

2018
Proceedings, Programs and Photo Gallery for the 11th Annual Cybersecurity Day held on October 30, 2018

2017
The Institute for Cybersecurity at IUP, in collaboration with the IT Support Center and the Computer Science Department, hosted the tenth annual Cybersecurity Day on Thursday, October 26, 2017, from 9:00 a.m. to 4:00 p.m. in the Stouffer Auditorium.

2016
The Institute for Information Assurance at IUP, in collaboration with the IT Support Center and the Computer Science Department, will host the ninth annual Information Assurance Day on Thursday, November 3, 2016, in the Ohio Room at the HUB.


2014
The Institute for Information Assurance at IUP, in collaboration with the IT Support Center and the Computer Science Department, will host the seventh annual Information Assurance Day on Thursday, October 30, 2014, from 8:45 a.m. to 4:30 p.m. in the Ohio Room at the HUB.

2013
The Institute for Information Assurance at IUP, in collaboration with the Computer Science Department, will host the sixth annual Information Assurance Day on November 7, 2013, from 8:30 a.m.–4:00 p.m. at the Ohio Room in the HUB at IUP.

2012
The Computer Science Department, in collaboration with the Institute for Information Assurance at IUP, will host the fifth annual Information Assurance Day on November 1, 2012, from 9:00 a.m.– 4:00 p.m., at the Delaware Room in the HUB at IUP.

2011
The Computer Science Department, in collaboration with the Institute of Information Assurance at IUP, will host the fourth annual Information Assurance Day on November 10, 2011, at the Delaware Room in the HUB at IUP.

2010
The Computer Science Department, in collaboration with the Institute for Information Assurance at IUP, will host the third annual Information Assurance Day on November 9, 2010, from 9:00 a.m.– 4:30 p.m., in Studio 210, Fisher Auditorium at IUP.

2009
The Computer Science Department, in collaboration with the Institute for Information Assurance at IUP, will host the second annual Information Assurance Day on November 5, 2009, from 9:00 a.m.– 4:30 p.m., in the Susquehanna Room in the HUB at IUP.

2008
The Computer Science Department, in collaboration with the Institute for Information Assurance at IUP, will host the first annual Information Assurance Day on November 7, 2008, from 9:00 a.m.– 4:30 p.m., in Johnson Hall Room 247 at IUP.


For more information about Cyber Security Day at IUP, please contact Waleed Farag, Director, Institute for Cybersecurity, at farag@iup.edu, 724-357-7995.