We are thrilled to announce an exciting lineup of experts, luminaries, and leaders from across the cybersecurity ecosystem!

CyberBay 2026 AGENDA

The agenda is subject to change. Although sessions are organized into topic tracks, attendees do not need to adhere to a specific track.

March 11, 2026 – Pre-Conference Day

1:00 – 4:00 PM

Check-in | Fourth Floor Registration Desk

Hands-on pre-conference workshop. BYOD. RSVP required (coming soon!)

  • Interactive CMMC Training: Gamifying Cybersecurity Compliance Education Jiri Jirik & Dr. John Sands | Hillsborough

Jiri Jirik
Director, Moraine Valley Community College

Interactive CMMC Training: Gamifying Cybersecurity Compliance Education

John Sands

John Sands
Professor, Moraine Valley Community College

Interactive CMMC Training: Gamifying Cybersecurity Compliance Education

March 12, 2026 – Conference Day 1

8:00 – 9:00 AM
Check-in | Fourth Floor Registration Desk

9:00 – 10:00 AM
Opening Performance, Welcome Remarks, Day 1 Opening Keynote Address with Jen Easterly | Tampa Bay Ballroom

JEN EASTERLY

CEO, RSAC and Former Director, Cybersecurity & Infrastructure Security Agency (CISA)

10:00 – 11:00 AM: BREAKOUT SESSION 1

  • CyberBay Cup Competition commences in the Tampa Bay Ballroom
  • How to Conduct a Risk Assessment of an AI Ecosystem David Kim
  • Post-Quantum Cryptography: Securing the Future Before It Arrives Impactifi Global Panel Discussion – John Riley, Araceli Venegas-Gomez, Cierra Choucair Director & Marin Ivezic
  • Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders Samuel Farnan & James Cerkovnik
  • AI and Education: Current State, Best Practices and the Future Jeremy Straub
  • Offensive Defense – Leveraging Dark Web Intelligence for Proactive Cyber Threat Hunting Gene Yoo
  • Innovation Challenge Pitch Session 1

David Kim
AI & GRC Principal Consultant, Technology Management Corp.

How to Conduct an IT Security Risk Assessment of an AI Ecosystem

John Riley
Impactifi Global

Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Cierra Choucair
Resonance

Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Marin Ivezic
Applied Quantum

Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Araceli Venegas-Gomez
Qureca

Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Jim Cerkovnik

Jim Cerkovnik
Cybersecurity Researcher, Idaho National Laboratory

Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders

Dr.-Jeremy-Straub

Jeremy Straub
Associate Professor, University of West Florida

AI and Education: Current State, Best Practices and the Future

Gene Yoo
CEO, Resecurity

Offensive Defense – Leveraging Dark Web Intelligence for Proactive Cyber Threat Hunting

11:00 AM – 12:00 PM: BREAKOUT SESSION 2

  • From Afterthought to Force Multiplier: Predictive Threat Intelligence in the Age of AI Norman Dorsch
  • When Your Software Gets a Brain: The Looming Authorization Crisis in Agentic AI Palonivel Manohanran
  • The Battle for the Mind: AI, Cognitive Exploitation, and the New National Security Frontier Allen Westley
  • Cybersecurity Incident Response Resources for Organizations with Limited Budgets George Zimmermann & Brianna Savage
  • Innovation Challenge Pitch Session 1

Norman Dorsch
Global Product Manager, X-Force, IBM

From Afterthought to Force Multiplier: Predictive Threat Intelligence in the Age of AI

Palanivel Manoharan

Palanivel Manhoharan
Lead CyberSecurity Architect, Humana

When Your Software Gets a Brain: The Looming Authorization Crisis in Agentic AI

Allen Westley
Director, Cyber Intelligence, L3Harris Technologies

The Battle for the Mind: AI, Cognitive Exploitation, and the New National Security Frontier

George Zimmermann
Information Security Manager, Northwest Regional Data Center, FSU

Cybersecurity Incident Response Resources for Organizations with Limited Budgets

Brianna Savage

Brianna Savage
Security Specialist, Northwest Regional Data Center, FSU

Cybersecurity Incident Response Resources for Organizations with Limited Budgets

12:00 – 1:00 PM: LUNCH in the Tampa Bay Ballroom

1:00 – 2:00 PM: BREAKOUT SESSION 3

  • AI with Intention: Ransomware Detection and Trusted Data Recovery Jim McGann
  • Building A Comprehensive Internet of Things Testing Program Deral Heiland
  • AI-Driven Cybersecurity: Building Resilient Defense Systems in the Age of Artificial Intelligence Buck Bell
  • Secure Microsoft 365, Dynamics 365, and Entra ID Data Against Cyber Threats Vanessa Toves
  • Where’s My Money! Cryptocurrency Money Laundering TTPs Florida Department of Law Enforcement

Jim McGann
CMO, Index Engines

AI with Intention: Ransomware Detection and Trusted Data Recovery

Deral Heiland
Principal Security Researcher (IoT)

Building A Comprehensive Internet of Things Testing Program

Buck Bell
Director, Global Security Strategy Office

AI-Driven Cybersecurity: Building Resilient Defense Systems in the Age of Artificial Intelligence

Vanessa Toves
Microsoft 365 Solutions Architect, Druva

Secure Microsoft 365, Dynamics 365, and Entra ID Data Against Cyber Threats

2:00 – 3:00 PM: BREAKOUT SESSION 4

  • Crisis Management Preparation for Executives John Ford
  • Agentic-AI for Cybersecurity Regulatory and NERC-CIP Standards Compliance Guillermo Francia
  • Let Slip the Dogs of Cyberwar: Nation-State Tactics, Commercial Targets, and the New Front Lines Rich Caminos
  • Breaching the Unbreachable: Stories from the Field Travis Weathers
  • The Ups and Downs of Dark Marketplaces Maria Olivella

John Ford
CEO, Trifident Advisory Services

Crisis Management Preparation for Executives

Guillermo Francia
Professor & Director, University of West Florida

Agentic-AI for Cybersecurity Regulatory and NERC-CIP Standards Compliance

Rich Cominos
Investigator, CyberCX USA

Let Slip the Dogs of Cyberwar: Nation-State Tactics, Commercial Targets, and the New Front Lines

Travis Weathers
Co-Founder, Mayweather Group, LLC & VTEM Labs, Inc

Breaching the Unbreachable: Stories from the Field

Maria Olivella

Maria Olivella
Senior Crime Intelligence Analyst, Florida Department of Law Enforcement

The Ups and Downs of Dark Marketplaces

3:00 – 4:00 PM: EXHIBITOR NETWORKING HOUR

Grab some coffee and take time to get to know the many partners that make up CyberBay!

  • That’s a Weird Topic for a Comic Book Allan Liska
  • From Campus to Cyber Command: How USF Bellini College and ReliaQuest Are Building Tampa Bay’s Pipeline for an AI-Ready Cyber-workforce Marbin Pazos Revilla & Patrick Whitaker

4:00 – 5:00 PM: BREAKOUT SESSION 5

  • The ABCs of Software Supply Chain Security Blake Hearn
  • Cyber Predictions for the Rise of Artificial Intelligence & Quantum Computing Mark Mahovilich
  • The Dark Arts: Volatile Data Artifacts Corey Monaghan
  • Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation Kassandra Pierre Bedell & Melissa Caruso
  • Quantum Q-Day Reckoning: The Coming Day When Quantum Computers Break Today’s Cryptography Roger Grimes
  • The New Attack Surface Hotness: Your SSO Dashboard Allan Liska

Blake Hearn
Federal Sales Engineer, Chainguard

The ABCs of Software Supply Chain Security

Mark Mahovlich
Vice President of Strategy & Execution, ICM Cyber

Cyber Predictions for the Rise of Artificial Intelligence & Quantum Computing

Corey Monaghan
Special Agent Supervisor, Florida Department of Law Enforcement

The Dark Arts: Volatile Data Artifacts

Kassandra Pierre Bedell
Founder, DYASPURA Digital

Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation

Melissa Caruso PhD

Melissa Caruso
Florida Design and Training Solutions

Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation

Roger Grimes
Data-Driven Defense CISO Advisor, KnowBe4

Quantum Q-Day Reckoning: The Coming Day When Quantum Computers Break Today’s Cryptography

5:00 – 7:00 PM: CONFERENCE RECEPTION

Skip rush hour and stay with us for a party you won’t forget!

March 13, 2026 – Conference Day 2

8:00 – 9:00 AM
Check-in | Fourth Floor Registration Desk

9:00 – 10:00 AM
Welcome Remarks, Day 2 Opening Keynote Address with Rachel Wilson | Tampa Bay Ballroom

RACHEL WILSON

Head of Wealth Management Date Security & Infrastructure Risk, Morgan Stanley

10:00 – 11:00 AM: BREAKOUT SESSION 1

  • From Breach to Boardroom Michael Rogers
  • How Bad Vendor Contracts Create Security Nightmares (And How to Fix Them) John Licato
  • Adversary-Centered Defense: Using Hacker-Sourced Intelligence to Safeguard Critical Infrastructure C. Jordan Howell
  • When Good AI Misbehaves – Cybercrime’s New Evil Genius Steve Stasuokonis
  • Examining the Complexity of Sextortion Crimes: Offender Modus Operandi and Victim Impacts Roberta O’Malley
  • The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness Ryan Seymour, Andrew Reddie & Kurt Friday
Michael Rogers

Michael Rogers
Managing Director of Resilience Advisory Services, MOXFIVE

From Breach to Boardroom: Translating Cyber Incidents into Executive Action

John Licato
Associate Professor, University of South Florida & CEO, Actualization.AI

How Bad Vendor Contracts Create Security Nightmares (And How To Fix Them)

Jordan Howell
Assistant Professor, University of South Florida

Adversary-Centered Defense: Using Hacker-Sourced Intelligence to Safeguard Critical Infrastructure

Steve Stasiukonis

Steve Stasiukonis
Cybersecurity Professional, Secure Network Technologies

When Good AI Misbehaves – Cybercrime’s New Evil Genius

Roberta O’Malley
Assistant Professor, University of South Florida

Examining the Complexity of Sextortion Crimes: Offender Modus Operandi and Victim Impacts

Kurt Friday

Kurt Friday
Assistant Professor of Instruction, USF Bellini College

The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness

Andrew Reddie

Andrew Reddie
COO, Timus Networks

The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness

Ryan Seymour

Ryan Seymour
VP, Consulting and Education, ConnectSecure

The Next-Gen MSP/MSSP Stack: USF Bellini College, ConnectSecure, and Timus Networks on Capabilities and Career Readiness

11:00 AM – 12:00 PM: BREAKOUT SESSION 2

  • Deep Fakes & Corp Sec Felix Hernandez
  • Deterrence by Design: Fusing AI, Post-Quantum Cryptography & Zero-Trust to Protect National Security in 2030 Bidemi Ologunde
  • The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline Tad Schnaufer Panel Discussion with Linda Nhon and Stephen Gary
  • The Dark Web’s New Gold Rush: How AI Fuels Cybercrime as a Service (CaaS) Cat Karow
  • Moneyball Meets Mobility Sasha Vanterpool
  • USF-Rapid7 Research Partnership Showcase USF & Rapid7 Panel

Felix Hernandez
CISO, Strategic Sentinels

Deep Fakes and Corporate Security

Bidemi Ologunde
Security Strategy Consultant & Criminal Intelligence Liaison

Deterrence by Design: Fusing AI, Post-Quantum Cryptography & Zero-Trust to Protect National Security in 2030

Tad Schnaufer, PhD
Strategy and Research Manager, USF Global & National Security Institute

The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Linda Nhon, PhD
Research Fellow, USF Global & National Security Institute

The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Stephen “Scuba” Gary, PhD
Professor of Instruction, School of Information at USF

The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Cat Karow
Founder and CEO, ZoraSafe, Inc.

The Dark Web’s New Gold Rush: How AI Fuels Cybercrime as a Service (CaaS)

Sasha Vanterpool
Senior Workforce Consultant, Skillrex.io

Moneyball Meets Mobility: Data-Driven Strategies for Building Future-Skills Ready Cybersecurity Teams

12:00 – 2:00 PM: LUNCH in the Tampa Bay Ballroom

Featuring a special lunch presentation: Beyond The Imitation Game – From Alan Turing and James Bond to e-Commerce and Quantum Encryption
Discover the remarkable story of the Enigma machine—a device used by the German military during World War II to encrypt their military communications—and the lengths the Allies would go to break its code. Learn about the mark this episode has left on world history and modern encryption technology, and what James Bond has to do with it. Witness live demonstrations of the Enigma!

2:00 PM: Conference Concludes