- Go back to the SUNY Plattsburgh Home Page
- About SUNY Plattsburgh
- Centers & Institutes
- Center for Cybersecurity & Technology (CCT)
- North Country Cybersecurity Conference
North Country Cybersecurity Conference
Where The Business World Meets Tech
The 5th annual North Country Cybersecurity Conference takes place on Friday, October 13, 2023. Join us!
2023 Conference
Prepare, Plan, Practice, Win in the North Country
October is Cybersecurity Awareness Month and through 14 presentations in our day-long conference, we will address the new challenges of hybrid work and threats to our businesses. Join us for learning, networking and welcoming our alumni. The conference is open to faculty, staff, students and community members.
- Friday, October 13, 2023
- Au Sable Hall, SUNY Plattsburgh campus
- 8:30 a.m. to 5 p.m.
- $55 general registration fee with included lunch ($25 for students).
- Register and learn more here
2023 Presenters From:
Cybrary, Fortinet, Entegral, CloudRange, AWS, Vertek, GreyCastle Security, FlashPoint, IBM Security X-Force Red, InfraGard, Center for Internet Security (MS-ISAC), Twinstate Technologies, CyberX, SUNY Canton, NYS Computer Crimes Unit Raybrook
- 2022 Conference Highlights
For the fourth year, we are delivering the premier cybersecurity and tech conference in the North Country on the SUNY Plattsburgh campus. This year, a more powerful and informative conference with over 20 speakers and multiple tracks. You can expect presentations by the FBI Agents of the Albany Cyber Squad, CIOs and CISOs, security engineers and SOC analysts, threat analysts and business leaders.
2022 Keynote Speakers
Terry Cutler, Cyology
Presentation: “Insider Secrets” to How Hackers are Getting in — and Why
Terry Cutler is the CEO of Cyology Labs and the author of the #1 Amazon best seller “Insider Secrets to Internet Safety: Advice from a Professional Hacker.” Mr. Cutler is the creator of the family-based Internet Safety University training program (www.isunow.com) and is a federal government cleared cybersecurity expert (a certified ethical hacker).
Mr. Cutler was named to IFSEC Global’s Top 20 Most Influential People in Cybersecurity in 2018, 2019 and again in 2020. In the same year, he was named to the CISO Platform Global TOP 100 List. He was also awarded the 2017 Cybersecurity Educator of the Year award among others. The Cybersecurity Excellence awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security. You can contact him at [email protected] or 1-844-CYOLOGY
Angelo “Tony” Riddick, Chief Information Officer, The State of New York
Angelo “Tony” Riddick was named the state’s chief information officer (CIO) in December 2020 and now leads the Office of Information Technology Services (ITS). He comes to ITS with extraordinary credentials.
Most recently, Tony served as the chief information officer and director of the Bureau of Information Technology for the U.S. Virgin Islands. He has an extensive and diverse background in information technology in both the public and private sectors. Tony is also a retired U.S. Army Colonel with more than 30 years of active military service.
COL(R) Riddick received numerous military and civilian awards including the Army Legion of Merit, numerous joint and army meritorious, commendation and achievement medals. He was awarded the coveted Army Ranger Tab, Airborne Wings and Combat Action Badge for combat service in Iraq. In addition, Tony was awarded the StateScoop State Employee of the Year award for his efforts in disaster recovery when he spearheaded the effort to standup communications resources after the devastating category 5 storms that ravaged the U.S. Virgin Islands and Puerto Rico. In 2022, Tony was named the StateScoop GoldenGov State Executive of the Year.
He holds an associate degree in business from Marion Military Institute, a bachelor of business administration from Albany State University and a master of quality systems management with the National Graduate School of Falmouth, Massachusetts.
Jesse Adams ‘19, Cyber Threat Intell (CTI) Analyst, Center for Internet Security (CIS/MS-ISAC)
Jesse Adams is a Cyber Threat Intel (CTI) Analyst with MS-ISAC. He graduated from SUNY Plattsburgh in 2019 with his computer security B.S. He currently holds his SANS GSEC and is pursuing a specialized focused in ICS Security.
David Adkins, Ph.D., PMP, CISSP, CISA, Lecturer College of Emergency Preparedness, Homeland Security and Cybersecurity, University of Albany
Dr. Adkins is a lecturer and undergraduate director of cybersecurity at the College of Emergency Preparedness, Homeland Security, and Cybersecurity at SUNY Albany.
He was formerly the CIO (chief information officer) for NYSERDA (New York State Energy Research & Development Authority) responsible for managing the authority’s information technology, cybersecurity, data governance/analytics/architecture and web operations units and served as a key leader responsible for implementing and maintaining technology systems that enabled NYSERDA to advance its ability to reduce greenhouse gas emissions and support renewable energy systems.
Prior to this, he served as part of the senior CIO executive team at NYS Information Technology Services (ITS) leading end user services for over 120,000 members of the state workforce and oversaw WebNY, a division supporting over 160 websites across New York State.
Before state service, he was the chief technology officer for the 75,000-member New York State Bar and the director of information technology for NYSUT (New York State United Teachers). Previously, he worked at several technology firms developing technology solutions for clients in the public and private sector.
Dr. Adkins has a degree in telecommunications from Syracuse University, an M.B.A. from the School of Business, University at Albany, and a Ph.D. in information science from the University at Albany. He is a member of the CIS Advisory Committee at Hudson Valley Community College and serves on the boards of NYCON (New York Council of Nonprofits) and Council Services Plus.
In the past he has taught online and onsite courses at the University of Maryland Global Campus, University of Dayton, Siena College, Rensselaer Polytechnic Institute (RPI), HVCC, and UAlbany at the School of Business. He is also a part of the Medical Reserve Corps in Essex and Clinton County
Marisa Atkinson ‘19, GREM, ’18, Senior HUNT Analyst at Flashpoint
Marisa Atkinson is a senior HUNT analyst at Flashpoint. At Flashpoint she works at identifying trends in emerging threats as well as performing malware analysis and reverse engineering to create comprehensive intelligence reports for partners. Previously she worked at the MS-ISAC as a senior SOC analyst. She graduated from SUNY Plattsburgh in 2018 with a bachelor’s degree in management information systems and a bachelor’s in computer security. She was a co-director at CCT from 2017–2018. Currently she holds a GREM certification.
Samantha Baltzersen, Special Agent FBI, Supervisor of Cyber Squad, Albany Field Office
Samantha Baltzersen has served as a special agent in the FBI for over 18 years. She was a certified FBI forensic examiner for seven years who conducted incident response and digital forensic examinations in the New York, Washington, and Portland Field Offices. She has investigated cyber intrusion cases for the past ten years including BECs, Ryuk Ransomware, and national security cases. Samantha transferred to the Albany field office and became the supervisor of the Cyber Squad. She holds multiple GIAC certifications in incident response, digital forensics, the 20 critical security controls, and reverse engineering of malware.
John “Jack” Broderick ’97, Intelligence Analyst, N.Y. State Intelligence Center, Cyber Analysis UnitA native of New York’s capital region and a 1997 graduate of SUNY Plattsburgh with a baccalaureate in criminal justice. He first came to work for the New York State Police in May 2000.
In 2004 he accepted a promotion to the then Upstate New York Regional Intelligence Center (UNYRIC). Upon joining the UNYRIC, he worked for the next 14 years as part of its Counter Terrorism Center and saw the evolution into the NYSIC. His work would help him to understand the interconnectedness of the world and lead to his next promotion 2018 to the CAU. He brought an immediate impact to the unit and serves as the subject matter expect for elections-related cybersecurity. He regularly provides intelligence briefings to several critical infrastructure sectors, including energy and education.
Additionally, he serves in the Navy Reserve holding the rank of master chief petty officer and rate of information systems technician.
Cristian Bucur, Polytechnique Montreal Ph.D. Student/Hydro Quebec
Cristian Bucur holds an electrical engineering diploma from the University of Ottawa, Canada, and a master in information security from the Lulea University of Technology, Sweden. He works as an enterprise architect at Hydro-Quebec, and he is also a member of the Engineering Association of Quebec (Ordre des ingénieurs du Québec) A cybersecurity passionate, Cristian is a Ph.D. student at Polytechnique of Montreal in the area of IoT security and is working on his dissertation.
Thomas Burl ‘95, Ph.D., Department Chair, Decision & Graphic Media Systems Department, SUNY Canton
Dr. Burl is an IT professional with 25+ years of experience that spans the public and private sectors. He holds numerous Microsoft certifications and has been a Microsoft certified trainer (MCT) for over 20 years. He is the chief information officer for Plattsburgh Creative Signs, Plattsburgh RV Store, and Blue Haven Campground.
Trent DeLor ‘20, Cybersecurity Engineer, MITRE Corporation
Trent DeLor is a cybersecurity engineer at MITRE’s Cyber Operations and Effects Innovation Center. In this position, Trent has participated in many facets of cyber, including application security, software engineering, cyber R&D, security automation and more. His contributions include secure code reviews of applications ranging from a couple thousand to over a million lines of executable code, developing scalable ETL data pipelines, and developing/researching content for the Common Weakness Enumeration (CWE) website. In research and development, Trent has a special interest in methods to mitigate open-source supply chain compromise, an ever increasing attack vector for adversaries. Trent’s primary interests lie in the intersection between application security, offensive security, and software engineering.
Trent is a Fall 2020 graduate of SUNY Plattsburgh with a Bachelor of Science in computer science. While at Plattsburgh, Trent co-directed the Center for Cybersecurity and Technology, and was the founder and captain of PlattsCTF, SUNY Plattsburgh’s security capture-the-flag team. He has brought the passion for cybersecurity developed through the CCT with him into his career.
Mustafa Demir, Ph.D., Associate Professor, SUNY Plattsburgh Criminal Justice Program
Mustafa Demir is associate professor of criminal Justice at State University of New York at Plattsburgh. He has three advanced degrees in criminal justice: two M.A.s and one Ph.D. He earned his Ph.D. in criminal justice from Rutgers University. He has about twenty years police experience including international organizations such as United Nations and Organizational Security and Cooperation in Europe. He has more than publications and 50 academic presentations. Some of his publications appeared in top-tier journals in the field
Duane Dunston, Professor, Champlain College
Duane Dunston is an associate professor of cybersecurity at Champlain College. He has been in information security since 1997 working in both the education and government sectors. He focuses on risk management, practical use of cryptography, security education, threat intelligence, threat hunting, and using technology for social change. In addition to teaching and consulting, he is a member of the Vermont Cyberpatriots Program. He is currently pursuing his Doctorate of Education at Northeastern University focusing on cognition and learning. Duane is the senior adversarial engineer at Cloud Range where he creates cyber attacks within a live range and trains existing security teams to identify and respond to the attacks.
Duane has spoken for the Western North Carolina, Colorado, and Burlington Vermont Foreign Policy Association Great Decisions series as a guest lecturer on cybersecurity. He was the keynote speaker at the 2021 International Elastic Polymer conference. He has also been featured on WCAX for topics related to cybersecurity. His information security experience is from the education and government sector where he worked as an information systems security officer and computer forensics analyst for the National Oceanic and Atmospheric Administration.
Duane takes a lot of interest in mentoring people transitioning into cybersecurity and newcomers to the industry.
Kevin Geil ‘97, CISSP, SANS MSISE, Incident Response Specialist, GreyCastle Security
Kevin Geil ‘97, has worked as an incident response specialist at GreyCastle Security since 2021. Prior to joining GreyCastle, Kevin spent more than a decade building and enhancing the information security program for the NYS Olympic Regional Development Authority as their information security officer.
Kevin has extensive experience in incident response, security program design, threat hunting, SIEM analytics, and Windows Domain Administration. Kevin is a CISSP, holds a master’s degree in information security engineering from the SANS Institute, and holds ten industry certifications.
Keenan Kunzelman ’19, Vulnerability Management Consultant, IBM X-Force Red
Keenan is a recent SUNY Plattsburgh graduate who holds a bachelor’s degree in computer science. He currently works as a vulnerability management consultant on IBM’s offensive security team. He enjoys working on anything related to offensive security research, data science, coding, and vulnerability research. In his off hours you can catch Keenan at the skate park or playing the piano.
Chen Liu, Ph.D., Professor Clarkson University
Dr. Liu's research has been focusing on capturing, modeling and monitoring the software behavior at run-time using hardware-level information. At his leisure time, Dr. Liu enjoys reading, movies, hiking and gardening. He is also an avid tennis player. Read more about Dr. Liu.
Alissa Momot, Cyber Evangelist, Twinstate Technologies
Alissa is the marketing manager at Twinstate Technologies where she is responsible for helping to spread the word on how SMBs can better apply technology to accelerate and secure their businesses. She attended the University of Hartford and graduated in 2015 with a health science degree and a minor in business management. Alissa has attended many conferences, spoke at some, and is passionate about educating and securing our interconnected lives.
Devi Momot, CISSP, GSLC, GISP, CEO Twinstate Technologies
Devi Momot is the CEO and acting CISO of Twinstate Technologies® and has been at the helm since 2007, moving the company into the future through her pioneering vision. She is a certified information systems security professional (CISSP®) by (ISC)2, the International Information System Security Certification Consortium, Inc.; and has core cybersecurity leadership certifications from the SANS (SysAdmin, Audit, Networking and Security) Institute, including the GIAC security leadership certification (GSLC®) and the GIAC information security professional (GISP®). Devi holds certificates in education from institutions like Harvard Business School; serves on advisory councils for global tech titans such as Sophos; is a present and past member of a number of boards of directors and is actively involved in making a difference in her community. An avid supporter of education, Devi initiated the company’s support of the SUNY Plattsburgh School of Business and Economics (SBE) Center for Cybersecurity and Technology (CCT) as an academic alliance.
Richard Nelson, Senior Cyber Threat Intelligence Analyst at CIS
Richard Nelson is a senior cyber threat intel (CTI) analyst with the MS-ISAC. He is also an electrical engineer, holds several industry certifications, and is a retired U.S. Navy Officer.
Michelle Parmelee ’17, Associate IT Analyst at Erie Insurance Group
Michele has been with Erie Insurance for over 3 years, where she was recently inducted into the IT apprentice program, currently on a software engineering assignment for the open systems server team and previously spent a rotation with the IT security team. Michele graduated from SUNY Plattsburgh in 2017 with a Bachelor of Science in computer science, and a minor in computer security. She was considered a “townie”, having lived in Plattsburgh, N.Y. since the age of eight. Following graduation, after about a year of working as an IT technician for a local hospital, she took a huge leap and moved to Raleigh, N.C. to temporarily work for the service desk at LORD Corporation, now Parker-Lord. After six months, life took her to Erie, Pa. where she resides today. She has a combined five years of experience in IT support across 3 different industries, supporting many different kinds of software and hardware, and people from all walks of life. When not working, Michele likes to lay low and live a peaceful life with her fiancé, his almost six-year-old daughter, and their two cats. She loves video games, horror movies, and having board game nights with another couple every Saturday night. Occasionally, she can be found grabbing drinks with her most trusted work companions. When it's nice out, she enjoys hiking, boating, and fishing.
George Rhodes, Senior Security Analyst, Vertek Corporation
George Rhodes has 20+ years of experience in enterprise IT security operations, security automation, and big data analytics. He holds degrees in computer science and predictive analytics from Troy University and Southern New Hampshire University. As director of data insights in the AT&T Chief Security Office (CSO) George developed and managed the Executive Security Program which used advanced machine learning techniques to increase the information security protective posture for the AT&T Board of Directors, CEO, and direct reporting C-level officers. George is currently working to design and implement SOAR across the Vertek customer base.
Theodore (TJ) Sayers, Manager of the MS- and EI-ISAC’s Cyber Threat Intelligence (CTI) team
TJ Sayers is the Manager of the MS- and EI-ISAC’s Cyber Threat Intelligence (CTI) team. He completed his graduate studies in 2018 and holds several industry certifications. He also serves in the U.S. Navy Reserve.
Shervin Sharafatmandjoor, Ph.D., Nova Bus and volunteer at CCT
Shervin has a Ph.D. in aerospace engineering and is a lifelong learner of engineering simulation and computer science. When he is not absorbed in the latest cloud computing/network technology, Shervin loves to spend time with his family.
Will Sims ‘19, CEO, The Freedom Unit
William TJ Sims is a cyber security engineer by trade with 7+ years of experience in all facets of incident and security management, intrusion detection, and global security risk management. He is also the founder of CyberX Elite, a leading online career development program that specializes in cybersecurity and all facets of professional development that expose, educate and teach high school, college students and mid-career professionals how to secure a six-figure career in cyberspace. William is a thought leader, disrupter and visionary who offers adept career coaching strategies in order to transcend the next generation of young elite leaders by developing the necessary skills needed to position themselves for a bulletproof career in the age of information technology. Areas of expertise include: risk management, project management, incident management and response, networking, data privacy, technology solutions, IT delivery, consulting, security controls, security systems.
- Past Conference Speakers
The theme of the 2018 event, Prepare, Plan, Practice, and WIN!, moved away from the doom and gloom portrayal of cybersecurity to present winning strategies for ongoing cybersecurity resiliency in the North Country. Speakers shared their best strategies for cybersecurity awareness, management and technical implementation in your organizations.
Debra Snyder, GSTRT, CISSP, CRISC, PMP
- Chief Information Security Officer
- NYS Office of Information Technology Services
- Chief Information Security Office
Deborah A. Snyder serves as chief information security officer (CISO) for New York State, in the Office of Information Technology Services (ITS).
In her role, she directs the Enterprise Information Security Office’s comprehensive governance, risk management and compliance program. She is responsible for providing strategic leadership and vision, and assuring business-aligned, risk-based investments that maximize business opportunity and minimize cyber security risk.
Ms. Snyder has extensive experience in government program administration, information technology and cyber security policy. She actively supports the state’s efforts to engage citizens and enhance the delivery of government services. She is an acknowledged industry thought-leader, and has been recognized for excellence and outstanding contributions in public programs and the field of cyber security.
She serves on the NYS Forum Board of Directors, NY CISO Executive Summit Governing Board, is a State Academy for Public Administration Fellow, and member of the Project Management Institute, InfraGard, Information Systems Security Association (ISSA), Information Systems Audit and Control Association (ISACA), and the Institute of Internal Auditors (IIA).
She teaches graduate-level courses, has published numerous articles, and co-authored “SECURE – Insights From The People Who Keep Information Safe,” which offers industry leadership insights and perspective. She is a highly regarded speaker on topics critical to executive-level business and IT professionals.
Thomas Duffy, Class of ’73
- Senior Vice President, Operations & Services
- Vice President of Operations
- Multi‐State Information Sharing and Analysis Center (MS‐ISAC)
Thomas Duffy is senior vice president of operations and services at CIS. He is responsible for managing all aspects of the CIS Security Operations activities, which are the focal point for cyber threat prevention, protection, response, and recovery for the nation’s state, local, tribal, and territorial (SLTT) governments. He provides leadership in developing program, organizational, and financial strategies.
He also manages the operation of the CIS 24-hour cybersecurity watch and warning operations center, which provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification and mitigation, and incident response. He works closely with the U.S. Department of Homeland Security (DHS), including its National Cybersecurity and Communications Integration Center (NCCIC), as well as with SLTT officials across the country.
Prior to joining CIS, Mr. Duffy served as deputy director of the New York State Office of Cyber Security and Critical Infrastructure Coordination (CSCIC). In this role, he oversaw the day-to-day operations of the office, which included coordinating the state’s cybersecurity strategies and policy development, monitoring the state’s networks, researching threats, vulnerabilities, and exploits, and issuing cyber alert advisories to the governmental and private sector entities in New York.
Andrew Gronosky, Class of ‘92
- Principal Application Security Engineer at Pegasystems, Inc
Presentation: “Painless Threat Modeling.” Threat modeling is one of the best things you can do to improve your systems’ security posture and promote security awareness, but to a beginner, it can look like a massive and dauntingly complex task. This presentation will show how teamwork and an iterative approach can starting bringing you the benefits of threat modeling within hours, not weeks, while building positive relationships between security experts and IT and software engineering professionals.
Andrew Gronosky is a principal application security engineer at Pegasystems, Inc. in Cambridge, Mass. He graduated from SUNY Plattsburgh in 1993 and holds a master’s degree in mathematics from Rensselaer Polytechnic Institute. Mr. Gronosky was formerly a research scientist at Raytheon BBN technologies, where he developed survivable distributed systems and served on a team that received the Excellence in Engineering Technology award. He is currently a member of the Security Assessment Team at Pegasystems, where he is leading the company’s threat modeling program.
Devi Momot, CISSP, GSLC, GISP
- CEO, Twinstate Technologies
Presentation: “Creeps, cheats and thieves on the dark web, an inside look.” This session provide insight into the dark web and provide examples of what types of information is bought and sold. This is a non technical session to illustrate better information and awareness and remove the mystery of the term for the attendees.
Presentation: “The Dark Web is changing your role as an IT person.” This session provide insight into the dark web and provide examples of what types of information is bought and sold. This is a technical session to demonstrate the realities of what is occurring on the dark web and how this ecosystem is changing the way IT and IT Security professionals need to look at protecting their environments.
Devi Momot is the CEO and acting CISO of Twinstate Technologies® and has been at the helm since 2007, moving the company into the future through her pioneering vision. She is a Certified Information Systems Security Professional (CISSP®) by (ISC)2, the International Information System Security Certification Consortium, Inc.; and has core cybersecurity leadership certifications from the SANS (SysAdmin, Audit, Networking and Security) Institute, including the GIAC Security Leadership Certification (GSLC®) and the GIAC Information Security Professional (GISP®). Devi holds certificates in education from institutions like Harvard Business School; serves on advisory councils for global tech titans such as Sophos; is a present and past member of a number of boards of directors, and is actively involved in making a difference in her community. An avid supporter of education, Devi initiated the company’s support of the SUNY Plattsburgh School of Business and Economics (SBE) Center for Cybersecurity and Technology (CCT) as an Academic Alliance.
Christian Nicholson, GWAPT, GMOB, GPEN, GCIH, GSEC
- Lead Consultant and Partner at Indelible LLC
Presentation: “Six degrees to domain admin revisited, leveraging BloodHound for Defense and Offense.” I consider myself an advanced programmer, I have been programming ever since I was little, it is one of my favorite hobbies along with building computers and computer programs, websites, and more recently mobile apps. My first formal experience in the technology industry was as a part of the student technology team in both high school and middle school, whose job was to help teachers with computers, new programs, and also new technology like smart boards. I also do freelance work in the areas of web design, graphic design, program and application design for various platforms, video editing and special effects, audio editing, as well as occasional work in video game or 3d design.
I am fluent in a variety of computer languages including but not limited to Java, Python, HTML, PHP, SQL, Flash, Action Script, Javascript, Bash, and BASIC. When it comes to computers and software, I am also quick to learn new programing languages as well as programs. I am proficient in Windows, Linux, and Mac operating systems. I am always eager to learn new things and have decided to shift my focus to the world of network security. My dynamic learning ability and personality type allows me to easily work with others or on my own to complete a variety of tasks and rapidly learn and excel in new things.
I enjoy many different aspects of the rapidly evolving world of technology. I love to learn new things especially those that I can use later on in life. I enjoy programming and experimenting with new ideas and concepts. I also like to play around with graphic art and web design. I also love things that challenge me and force me to really think. I am a strong believer in pushing the boundaries of what we believe to be possible in order to find or create something new, just because we currently believe something is impossible doesn't mean that it is impossible.Work experience:
- KPMG, Sr. Associate Advisory Cyber
- Threat Researcher, Foundstone Professional Services, Intel Security
- SANS, CyberAces
- SANS, Instructor and Subject Matter Expert (SME)
Frank Angiolelli, CISSP
- Strategic Site Consultant, Foundstone
Presentation: “Wreck SIEM Noise. Practical and simple approaches and techniques anyone can do to eliminate alert fatigue and SIEM noise confidently.” Frank is an intelligence systems patent author and seasoned IT security professional with lengthy management and hands on technical experience. Possessing a broad knowledge of information security fields and deep knowledge in SOC operations, incident response, network forensics, pattern recognition, and threat landscape. Passionate about protecting both locally and the internet at large. Privacy advocate. Creator of Three Principles of Judo Threat Intelligence:
- Use the attackers energy against them
- Maximum effect, minimum effort
- Break their posture, execute the throw
- CISSP #354776 (18 Nov 2009)
- Nearly 2 decades of cyber security experience
- Deep experience in malicious anomalies
- Tenacious and unceasing security researcher
- CERT/CIRT incident management and response consulting
- Proven motivator, facilitator and problem solver
- Proven capabilities in producing actionable threat intelligence internally.
- Penchant for automation, statistics and thermodynamics
- Published in SANS SOC, Washington Post, SecurityAffairs.co, Westchester Magazine
Valecia Stocchetti, GCFE, GSEC
- CERT Manager, Multi-State Information Sharing and Analysis Center (MS-ISAC)
Valecia comes to CIS from the eCommerce field where she worked complex financial fraud cases. She is a graduate of University of Albany with a degree in Digital Forensics. Valecia has held every position within the MS-ISAC Computer Emergency Response Team (CERT), starting as an intern and working her way into division leadership. She currently manages the MS-ISAC CERT and spearheads forensics investigations and incident response for the MS-ISAC SLTT community. Valecia holds two certifications, GIAC Certified Forensic Examiner (GCFE) and GIAC Security Essentials Certification (GSEC). While she enjoys all things InfoSec, she particularly finds the cybercrime and espionage fields fascinating, which is what led her to this career in the first place.
Tyler Wrightson, CISSP, CCSP, CCNA, CCDA and MCSE
- Founder Leet Cyber Security
Tyler Wrightson, CISSP is the author of Advanced Persistent Threat Hacking and Wireless Network Security: A Beginner's Guide. Tyler is the founder of Leet Cyber Security, which helps organizations solve their technical cyber security challenges.
Leet focuses on offensive security services such as penetration testing and red teaming to secure organizations against real world attackers. Tyler has over sixteen years of experience in the IT security field across many industries including healthcare and financial services with extensive experience in many areas of technical security including networking, systems architecture, offensive security and penetration testing.
Tyler holds industry certifications such CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, hacking and penetration testing, wireless security, and network security.
Tyler is the founder of ANYCon, Albany New York’s annual hacker conference. He has been a frequent speaker at industry conferences including NYS CyberSecurity Conference, Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com
Cristian Balan, CISSP, CHFI, ACE, CAS, MST
- Coordinator, Center for Cybersecurity and Technology (CCT)
- Management, Information Systems and Analytics Dept (MISA), School of Business and Economics (SBE), SUNY Plattsburgh
Presentation: “The WIN — Small Business Cyber Resiliency.” Small business continue to be the target of cyber-attacks and hacking. While on a small budget, they cannot afford the more expensive vendor provided protection of medium and large business. Using inexpensive products and in-house policies and management, small business can resist the onslaught of malware and ransomware we have seen in the past year. Building on last year’s presentation where we showcased some basic strategies, we will share more in depth techniques for protecting your computers, your network and your data. CCT Interns will be presenting with Prof. Balan.
Cristian Balan is an energetic information systems security professional with ample experience in incident response and managing teams of highly technical responders. He has teaching experience in computer networking and information security. He has extensive consulting experience working with the law enforcement community in system administration, information security and digital forensics. As the deputy CIO for the VT Army National Guard, Cristian Balan has experience working at the executive level with CIOs, CTOs and CISOs to implement security policies and create incident response teams.
He is an active member of the Albany Chapter of Infragard, an FBI sponsored organization, and was the chief of the Vermont Army National Guard Computer Network Defense Team. Major Balan and his team responded to cyber incidents on the VT Army National Guard computer networks and the larger U.S. Army network. MAJ Balan (Retired) is a National Guardsman with 31 years of experience with the last 14 years spent in the information assurance field.
In December of 2010, Major Balan completed a one year tour of duty in Afghanistan with the 1-172nd Cavalry Squadron, 86th Infantry Brigade Combat Team (Mountain) as their signal officer managing a 70 million dollar computer and radio communications infrastructure in Parwan Province, north of Kabul. MAJ Balan holds DOD Certification in Information Assurance Level III both technical and management. Professor Balan holds the CISSP certification from the International Information Systems Security Certification Consortium, Inc. [(ISC)²], the Certified Hacking Forensic Investigator designation from the EC-Council, and ACE certification from Access Data.
He is the owner and managing consultant of NY Computer Networks, a 14 year old consulting firm specializing in managing cyber risk for a wide range of clientele in both the public and private sector. Professor Balan invites his students to work with him on vulnerability assessments and consulting for government organizations and non-profits that cannot otherwise afford the services of a security expert. Professor Balan managed the highly successful Champlain College digital forensic program starting in the summer of 2007.
Prior, he held the position as distance learning coordinator at several colleges to include SUNY at Plattsburgh, SUNY at Potsdam and Clinton Community College. As a manager, Cristian Balan believes in constant professional development for his team members and participation in industry events. He endears a hands-on, lead from the front management style and quickly builds effective teams to respond to security incidents.
He actively works with the industry association and is a regular presenter at security conferences. Cristian Balan’s latest interests span remote forensics, digital evidence triage and malware analysis. Professor Balan manages the SUNY Plattsburgh Center for Cybersecurity and Technology in the School of Business and Economics. He teacher cybersecurity courses in the Management, Information Systems and Analytics Department. Cristian Balan is interested in exploring industry opportunities in managing incident response teams, digital forensic and malware teams along with consulting at the C-level in cybersecurity.
Randy Giltz, CPCU, CSRM, ‘86
- Senior Vice President, Northern Insuring
Randy joined the Northern Insuring team in 1990. He has twenty-five years of experience in the insurance industry and holds the designation of chartered property and casualty underwriter, as well as certified school risks manager. As senior vice president, Randy is responsible for marketing business insurance, taking an active role in nurturing our excellent relationship with a variety of insurance carriers. As a member of the sales team, he specializes in coverage for public schools.
Kevin Stillman
- SOC Administrator, State University of New York
Kevin Stillman is the administrator for SUNYNet and SUNY SOC Services at the State University of New York’s System Administration in Albany, NY, reporting to the chief information officer for SUNY. He is responsible for university-wide network initiatives, including SUNYNet and its wide-area-network services to the sixty-four campuses of the State University of New York (SUNY). He leads the network operations center responsible for data center network and security infrastructure at system administration, as well as planning and operations of voice/video/data networks at SUNY locations throughout New York State. Kevin also serves in an administrative leadership role for the SUNY Security Operations Center, which provides information security services to more than half the SUNY system’s campuses. Kevin has been with SUNY since 1997 starting as a network analyst in network operations and moved to a management role under the CIO’s office in 2003. Prior to joining SUNY Kevin was a network administrator for Rensselaer County in Troy, N.Y. where he provided a variety of information technology services like desktop support, Windows server management, mainframe operations, network cabling and routing & switching. Kevin graduated from Marist College in 1994 with a Bachelor of Science in Computer Information Systems and Business Administration. Today he still resides in Brunswick and enjoys very much being the father of two boys. While not working he enjoys playing guitar and being a dad.
Ken Runyon, CISSP, CCSP, CISM
- Chief Information Security Officer, State University of New York (SUNY) System Administration (SA)
Ken Runyon is the SUNY SA university wide CISO. In this role ken provides leadership and support to each SUNY campus in areas relating to information security, enterprise risk management, and compliance. In addition, he was instrumental in establishing the SUNY SOC and continues to provide oversight and information security guidance to the SOC with regard to future initiatives and operations. In line with his leadership role, he established SUNY’s first university wide information security working group (ISWG) to improve communications and information sharing within the broad SUNY information security community. These monthly meetings provide a venue for the identification of future technologies and better enables SUNY to leverage expertise available throughout the broader organization. As a subject matter expert, he was part of a handpicked team that crafted the SUNY board of trustees’ first u-wide information security policy. He routinely presents information security topics at SUNY sponsored technology events and enjoys sharing his experience and learning from others. His background includes a wide array of practical experience that lends itself to cybersecurity. This experience includes training as an electronic warfare/cryptologic linguist (Russian), intelligence officer (SIGINT), signal officer (telecommunications), and information systems management officer (computing) in the U.S. army, N.Y. army guard, and army reserve. During his career ken worked as a software engineer for several consulting firms and software vendors (Sybase/PowerBuilder, Silverstream software, and Novell) while living in the Washington dc metro area throughout the 90’s until taking a position at SUNY as a senior java developer in late 2003. His interest in cyber security began in the 1990’s when he became the data networking branch chief for the 311th theater signal command where he designed and implemented secure data networks in support of us army operations in Korea and south east Asia. As a java software engineer, he worked with the National Security Agency (NSA) and helped design their first secure web/java-based signals intelligence reporting portal. During OIF/OEF (2007-2008) he deployed in support of the 311th theater sustainment command out of ft. Bragg as their information management division chief where he established the unit’s secure SharePoint portal, secure ftp, and secure adobe connect, while supervising help desk support operations for over 30,000 distributed users. During this same time, in close coordination with the 335th theater network operations and security center (TNOSC), he engineered the first SIPRNET connection to the Sinai Peninsula in support of us military operations in that region. He recently retired from the us army reserves after serving as an adjunct professor for the us army command and general staff college responsible of training operations throughout New England, New York, and new jersey.
Diane J. Delaney
- Worldwide Talent Manager, IBM Security
Diane Delaney is the worldwide talent manager for IBM Security. In this role, she established and now oversees an enterprise-wide talent program to attract, recruit, hire and retain diverse early professionals with cybersecurity skills. She created and manages the IBM Security Early Professional Bootcamp, a class for IBM Security Early Professional New Hires. She also provides guidance and direction for the security enablement program which includes learning activities, digital badges and security certifications, essential for career growth for cybersecurity professionals. During her 33-year career with IBM, Diane has held several roles including senior manager, service delivery manager, project manager, systems engineer and programmer. Diane is an IBM Certified Executive Project Manager. She is PMP and ITIL Foundations v3 certified and holds a Bachelor of Science degree in Computer Science from SUNY Plattsburgh. Diane lives in Woodland Hills, California. She is married and is the mom of two “millennial” children. Outside of work, she enjoys playing racquetball, bicycling and skiing. She is actively involved at her church and is a volunteer leader for several community events focused on helping the homeless and hungry in Los Angeles and around the world.