We are thrilled to announce an exciting lineup of experts, luminaries, and leaders from across the cybersecurity ecosystem!
CyberBay 2026 AGENDA
The agenda is subject to change. Although sessions are organized into topic tracks, attendees do not need to adhere to a specific track.
March 11, 2026 – Pre-Conference Day
1:00 – 4:00 PM
Check-in | Fourth Floor Registration Desk
Hands-on pre-conference workshop. BYOD. RSVP required (coming soon!)
- Interactive CMMC Training: Gamifying Cybersecurity Compliance Education Jiri Jirik & Dr. John Sands | Hillsborough

Jiri Jirik
Director, Moraine Valley Community College
Interactive CMMC Training: Gamifying Cybersecurity Compliance Education

John Sands
Professor, Moraine Valley Community College
Interactive CMMC Training: Gamifying Cybersecurity Compliance Education
March 12, 2026 – Conference Day 1
8:00 – 9:00 AM
Check-in | Fourth Floor Registration Desk
9:00 – 10:00 AM
Opening Performance, Welcome Remarks, Day 1 Opening Keynote Address with Jen Easterly | Tampa Bay Ballroom

JEN EASTERLY
CEO, RSAC and Former Director, Cybersecurity & Infrastructure Security Agency (CISA)
10:00 – 11:00 AM: BREAKOUT SESSION 1
- CyberBay Cup Competition commences in the Tampa Bay Ballroom
- How to Conduct a Risk Assessment of an AI Ecosystem David Kim
- Post-Quantum Cryptography: Securing the Future Before It Arrives Impactifi Global Panel Discussion – John Riley, Araceli Venegas-Gomez, Cierra Choucair Director & Marin Ivezic
- Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders Samuel Farnan & James Cerkovnik
- AI and Education: Current State, Best Practices and the Future Jeremy Straub
- Offensive Defense – Leveraging Dark Web Intelligence for Proactive Cyber Threat Hunting Gene Yoo
- Innovation Challenge Pitch Session 1

David Kim
AI & GRC Principal Consultant, Technology Management Corp.
How to Conduct an IT Security Risk Assessment of an AI Ecosystem

John Riley
Impactifi Global
Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Cierra Choucair
Resonance
Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Marin Ivezic
Applied Quantum
Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Araceli Venegas-Gomez
Qureca
Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Jim Cerkovnik
Cybersecurity Researcher, Idaho National Laboratory
Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders

Jeremy Straub
Associate Professor, University of West Florida
AI and Education: Current State, Best Practices and the Future

Gene Yoo
CEO, Resecurity
Offensive Defense – Leveraging Dark Web Intelligence for Proactive Cyber Threat Hunting
11:00 AM – 12:00 PM: BREAKOUT SESSION 2
- From Afterthought to Force Multiplier: Predictive Threat Intelligence in the Age of AI Norman Dorsch
- When Your Software Gets a Brain: The Looming Authorization Crisis in Agentic AI Palonivel Manohanran
- The Battle for the Mind: AI, Cognitive Exploitation, and the New National Security Frontier Allen Westley
- Cybersecurity Incident Response Resources for Organizations with Limited Budgets George Zimmermann & Brianna Savage
- Innovation Challenge Pitch Session 1

Norman Dorsch
Global Product Manager, X-Force, IBM
From Afterthought to Force Multiplier: Predictive Threat Intelligence in the Age of AI

Palanivel Manhoharan
Lead CyberSecurity Architect, Humana
When Your Software Gets a Brain: The Looming Authorization Crisis in Agentic AI

Allen Westley
Director, Cyber Intelligence, L3Harris Technologies
The Battle for the Mind: AI, Cognitive Exploitation, and the New National Security Frontier

George Zimmermann
Information Security Manager, Northwest Regional Data Center, FSU
Cybersecurity Incident Response Resources for Organizations with Limited Budgets

Brianna Savage
Security Specialist, Northwest Regional Data Center, FSU
Cybersecurity Incident Response Resources for Organizations with Limited Budgets
12:00 – 1:00 PM: LUNCH in the Tampa Bay Ballroom
1:00 – 2:00 PM: BREAKOUT SESSION 3
- AI with Intention: Ransomware Detection and Trusted Data Recovery Jim McGann
- Building A Comprehensive Internet of Things Testing Program Deral Heiland
- AI-Driven Cybersecurity: Building Resilient Defense Systems in the Age of Artificial Intelligence Buck Bell
- Secure Microsoft 365, Dynamics 365, and Entra ID Data Against Cyber Threats Vanessa Toves
- Where’s My Money! Cryptocurrency Money Laundering TTPs Florida Department of Law Enforcement

Jim McGann
CMO, Index Engines
AI with Intention: Ransomware Detection and Trusted Data Recovery

Deral Heiland
Principal Security Researcher (IoT)
Building A Comprehensive Internet of Things Testing Program

Buck Bell
Director, Global Security Strategy Office
AI-Driven Cybersecurity: Building Resilient Defense Systems in the Age of Artificial Intelligence

Vanessa Toves
Microsoft 365 Solutions Architect, Druva
Secure Microsoft 365, Dynamics 365, and Entra ID Data Against Cyber Threats
2:00 – 3:00 PM: BREAKOUT SESSION 4
- Crisis Management Preparation for Executives John Ford
- Agentic-AI for Cybersecurity Regulatory and NERC-CIP Standards Compliance Guillermo Francia
- Let Slip the Dogs of Cyberwar: Nation-State Tactics, Commercial Targets, and the New Front Lines Rich Caminos
- Breaching the Unbreachable: Stories from the Field Travis Weathers
- The Ups and Downs of Dark Marketplaces Maria Olivella

John Ford
CEO, Trifident Advisory Services
Crisis Management Preparation for Executives

Guillermo Francia
Professor & Director, University of West Florida
Agentic-AI for Cybersecurity Regulatory and NERC-CIP Standards Compliance

Rich Cominos
Investigator, CyberCX USA
Let Slip the Dogs of Cyberwar: Nation-State Tactics, Commercial Targets, and the New Front Lines

Travis Weathers
Co-Founder, Mayweather Group, LLC & VTEM Labs, Inc
Breaching the Unbreachable: Stories from the Field

Maria Olivella
Senior Crime Intelligence Analyst, Florida Department of Law Enforcement
The Ups and Downs of Dark Marketplaces
3:00 – 4:00 PM: EXHIBITOR NETWORKING HOUR
Grab some coffee and take time to get to know the many partners that make up CyberBay!
- That’s a Weird Topic for a Comic Book Allan Liska
- From Campus to Cyber Command: How USF Bellini College and ReliaQuest Are Building Tampa Bay’s Pipeline for an AI-Ready Cyber-workforce Marbin Pazos Revilla & Patrick Whitaker
4:00 – 5:00 PM: BREAKOUT SESSION 5
- The ABCs of Software Supply Chain Security Blake Hearn
- Cyber Predictions for the Rise of Artificial Intelligence & Quantum Computing Mark Mahovilich
- The Dark Arts: Volatile Data Artifacts Corey Monaghan
- Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation Kassandra Pierre Bedell & Melissa Caruso
- Quantum Q-Day Reckoning: The Coming Day When Quantum Computers Break Today’s Cryptography Roger Grimes
- The New Attack Surface Hotness: Your SSO Dashboard Allan Liska

Blake Hearn
Federal Sales Engineer, Chainguard
The ABCs of Software Supply Chain Security

Mark Mahovlich
Vice President of Strategy & Execution, ICM Cyber
Cyber Predictions for the Rise of Artificial Intelligence & Quantum Computing

Corey Monaghan
Special Agent Supervisor, Florida Department of Law Enforcement
The Dark Arts: Volatile Data Artifacts

Kassandra Pierre Bedell
Founder, DYASPURA Digital
Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation

Melissa Caruso
Florida Design and Training Solutions
Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation

Roger Grimes
Data-Driven Defense CISO Advisor, KnowBe4
Quantum Q-Day Reckoning: The Coming Day When Quantum Computers Break Today’s Cryptography
5:00 – 7:00 PM: CONFERENCE RECEPTION
Skip rush hour and stay with us for a party you won’t forget!
March 13, 2026 – Conference Day 2
8:00 – 9:00 AM
Check-in | Fourth Floor Registration Desk
9:00 – 10:00 AM
Welcome Remarks, Day 2 Opening Keynote Address with Rachel Wilson | Tampa Bay Ballroom

RACHEL WILSON
Head of Wealth Management Date Security & Infrastructure Risk, Morgan Stanley
10:00 – 11:00 AM: BREAKOUT SESSION 1
- From Breach to Boardroom Michael Rogers
- How Bad Vendor Contracts Create Security Nightmares (And How to Fix Them) John Licato
- Adversary-Centered Defense: Using Hacker-Sourced Intelligence to Safeguard Critical Infrastructure C. Jordan Howell
- When Good AI Misbehaves – Cybercrime’s New Evil Genius Steve Stasuokonis
- Examining the Complexity of Sextortion Crimes: Offender Modus Operandi and Victim Impacts Roberta O’Malley
- The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness Ryan Seymour, Andrew Reddie & Kurt Friday

Michael Rogers
Managing Director of Resilience Advisory Services, MOXFIVE
From Breach to Boardroom: Translating Cyber Incidents into Executive Action

John Licato
Associate Professor, University of South Florida & CEO, Actualization.AI
How Bad Vendor Contracts Create Security Nightmares (And How To Fix Them)

Jordan Howell
Assistant Professor, University of South Florida
Adversary-Centered Defense: Using Hacker-Sourced Intelligence to Safeguard Critical Infrastructure

Steve Stasiukonis
Cybersecurity Professional, Secure Network Technologies
When Good AI Misbehaves – Cybercrime’s New Evil Genius

Roberta O’Malley
Assistant Professor, University of South Florida
Examining the Complexity of Sextortion Crimes: Offender Modus Operandi and Victim Impacts

Kurt Friday
Assistant Professor of Instruction, USF Bellini College
The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness

Andrew Reddie
COO, Timus Networks
The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness

Ryan Seymour
VP, Consulting and Education, ConnectSecure
The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness
11:00 AM – 12:00 PM: BREAKOUT SESSION 2
- Deep Fakes & Corp Sec Felix Hernandez
- Deterrence by Design: Fusing AI, Post-Quantum Cryptography & Zero-Trust to Protect National Security in 2030 Bidemi Ologunde
- The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline Tad Schnaufer Panel Discussion with Linda Nhon and Stephen Gary
- The Dark Web’s New Gold Rush: How AI Fuels Cybercrime as a Service (CaaS) Cat Karow
- Moneyball Meets Mobility Sasha Vanterpool
- USF-Rapid7 Research Partnership Showcase USF & Rapid7 Panel

Felix Hernandez
CISO, Strategic Sentinels
Deep Fakes and Corporate Security

Bidemi Ologunde
Security Strategy Consultant & Criminal Intelligence Liaison
Deterrence by Design: Fusing AI, Post-Quantum Cryptography & Zero-Trust to Protect National Security in 2030

Tad Schnaufer, PhD
Strategy and Research Manager, USF Global & National Security Institute
The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Linda Nhon, PhD
Research Fellow, USF Global & National Security Institute
The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Stephen “Scuba” Gary, PhD
Professor of Instruction, School of Information at USF
The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Cat Karow
Founder and CEO, ZoraSafe, Inc.
The Dark Web’s New Gold Rush: How AI Fuels Cybercrime as a Service (CaaS)

Sasha Vanterpool
Senior Workforce Consultant, Skillrex.io
Moneyball Meets Mobility: Data-Driven Strategies for Building Future-Skills Ready Cybersecurity Teams
12:00 – 2:00 PM: LUNCH in the Tampa Bay Ballroom
Featuring a special lunch presentation: Beyond The Imitation Game – From Alan Turing and James Bond to e-Commerce and Quantum Encryption
Discover the remarkable story of the Enigma machine—a device used by the German military during World War II to encrypt their military communications—and the lengths the Allies would go to break its code. Learn about the mark this episode has left on world history and modern encryption technology, and what James Bond has to do with it. Witness live demonstrations of the Enigma!
2:00 PM: Conference Concludes

