Each year, the Institute for Cyber Security, in collaboration with IT Support, hosts Cyber Security Day. This daylong event features nationally recognized security experts as well as speakers from law enforcement, government, the security industry, and academia. Cyber Security Day is open to the public, community colleges, and neighboring universities.

Information for the Event

The seventeenth Cyber Security Day, held on October 29, 2024, featured presentations from Bryant Wysocki, Damon Smith, Jon Roumfort, Matt Isnor, Joey Mathews, Jon David, and Logan Zellem.  Presentation topics included information warfare, AI, reverse software engineering, and social engineering, among many others. 

View the 2024 event documents below, and see the guest speaker and title/abstract sections for more information. 

Event Flyer |  Schedule | Brochure | Presentations

Guest Speakers

Bryant Wysocki

Technical Advisor for C5ISRT, US Air Force and Space Force

Bryant Wysocki

Bryant Wysocki, a senior-level executive, is the technical advisor for C5ISRT for the US Air Force and Space Force.  Bryant provides technical oversight of these areas for the department and advises senior leadership. He holds a PhD in electrical engineering from Cornell University. 

Damon Smith

Technical Director for Computer Network Operations, National Security Agency

Damon Smith

Damon Smith has been programming and reverse engineering software for NSA since 2005. He has a master's in information security from Carnegie Mellon University and a bachelor's in computer science from Dartmouth College. Damon has worked for NSA in Maryland, overseas, and, since 2017, in Colorado.

Jon Roumfort

CISSP, IUP Senior Security Analyst

Jon Roumfort

Jonathan Roumfort is a senior security analyst in IT Services at ºÚÁϳԹÏÍø and serves as a lead in the ITS Cybersecurity Leadership Team. Jonathan has been employed at IUP for over 25 years, where he has managed IT security, enterprise systems, and networking. He has served IUP as a senior security analyst for almost 22 years and is on IUP’s Institute for Cyber Security steering committee. Jonathan is a member of various security groups and has been an ISC2 Certified Information Systems Security Professional since 2010.

Matt Isnor

Program Lead, DOD Cyber Workforce Development Branch, US Department of Defense

Matt Isnor

Matt Isnor an expert in the federal cyber workforce with DoD/CIO and is the former Cyber Mission Force program lead for training for US Cyber Command. He currently is the program lead for the development and refinement of standardizing the cyberspace workforce through work roles included in the DoD Cyberspace Workforce Framework. He is also responsible for leading the effort in DoD CIO to create the 8140 Policy Series, which sets the qualification program for all of DoD. Another area is that he is one of the cochairs with NSA and USCYBERCOM to lead the development of Cyber Institutes at each of the senior military colleges. 

Isnor holds a master of business administration with a concentration in information systems from Hawaii Pacific University and a master’s of cybersecurity from Webster University.

Joey Mathews

Superintendent of the Information Technology Division, US Naval Research Laboratory

Joey Mathews

Joey Mathews is the superintendent of the Information Technology Division at the US Naval Research Laboratory. He leads a broad-based program of research and development spanning artificial intelligence and autonomy, networking and communications, information operations, high-assurance systems and cyber warfare, knowledge management and decision support, and computational science.

Jon David

Managing Director and Co-Founder, NR Labs

Jon David

Jon David, a former director at Mandiant, boasts over 15 years of extensive experience in both private and DoD cybersecurity sectors. His expertise lies in enabling organizations to comprehend their threat landscape, strategically prioritize defenses, and effectively mitigate exposure to malicious threats. Throughout his career, David has played a pivotal role in aiding numerous enterprises across diverse industries in identifying and addressing vulnerabilities within complex environments. Drawing from this wealth of experience, he intimately understands the unique challenges each industry encounters when safeguarding its digital ecosystems.

Logan Zellem

Security Director, NR LabsLogan Zellem

Logan Zellem is a security director with over eight years of experience. He has provided guidance and expertise to hundreds of federal clients, nonprofit organizations, and Fortune 500 companies. He specializes in privileged access management, designing and architecting secure systems that ensure compliance, streamline automation, and bolster overall security efficiency with a focus on mitigating risk.

Titles and Abstracts

Bryant Wysocki - Technical Advisor for C5ISRT, US Air Force and Space Force

  • Session Time: 9:20 AM to 10:05 AM
  • Title: The Convergence of Cyber, Information Warfare, and AI
  • Abstract: The convergence of cyber, information warfare, and artificial intelligence (AI), is reshaping global power competition by integrating AI-driven capabilities into cyber operations and information campaigns. This fusion enables activities like automated threat response, adaptive cyber maneuvers, and AI-powered misinformation, that significantly enhance the impact of hybrid warfare strategies. As these technologies blur the lines between competition and conflict, they present societal challenges and raise critical ethical and legal questions. This talk will explore the implications of this convergence, highlighting the need for new defense approaches and international norms to address the evolving landscape of AI-enhanced activities.

Damon Smith - Technical Director for Computer Network Operations, National Security Agency

  • Session Time: 10:15 AM to 11:00 AM
  • Title: The Software Reverse Engineering Skillset
  • Abstract: Seasoned software reverse engineers at the National Security Agency draw from a wide and esoteric set of skills to support the NSA’s cybersecurity and foreign intelligence missions. Bringing new reverse engineers up to speed can take months or years. This talk considers the skills and competencies an aspiring reverse engineer might focus on to improve their readiness for a career in cybersecurity and the intelligence community.

Jon Roumfort - CISSP, IUP Senior Security Analyst

  • Session Time: 11:10 AM to 11:55 AM
  • Title: The Evolution of Social Engineering in Cybersecurity
  • Abstract: This presentation examines the dynamic evolution of social engineering. With traditional security vulnerabilities becoming more short-lived and less effective to exploit, attackers have found leveraging vulnerabilities in human behavior through social engineering to be an easier and more profitable alternative to more complicated and short-lived attacks on technology itself.  Social engineering has become the most prevalent and damaging cyber attack today and it will only increase with the help of artificial intelligence.  This presentation will examine several types of past and current social engineering techniques, explore emerging trends, and go over ways to help prevent the attacks.

Matt Isnor-Program Lead, DOD Cyber Workforce Development Branch, US Department of Defense

  • Session Time: 1:10 PM to 1:55 PM
  • Title: Growing the Next Generation of Cyber Talent
  • Abstract: The increasing prevalence of cyber threats highlights the critical need for the Department of Defense to have a capable and ready cyber workforce.  Developing such a workforce involves a multi-disciplinary approach across policy, program development, strategy, data analytics, and data science that will drive innovation and development across the cyber workforce. This presentation will provide information on the DoD CIO’s by Cyber Workforce Strategy Implementation Plan, DoD Cyber Workforce Framework, DoD 8140 Cyberspace Workforce Management and Qualification Program, Academic Outreach, and Cyber Excepted Service. Through targeted initiatives, investment in personnel, and a commitment to continuous development activities, we can build and sustain an agile, capable, and ready cyber workforce.

Joey Mathews - Superintendent of the Information Technology Division, US Naval Research Laboratory

  • Session Time: 2:05 PM to 2:50 PM
  • Title: Navy Cyber Science & Technology
  • Abstract: In 1915, American inventor Thomas Edison opined, “The Government should maintain a great research laboratory to develop guns, new explosives, and all the technique of military and naval progression without any vast expense.” This statement led to the creation of the Naval Research Laboratory in 1923. One hundred years later, NRL has changed the way the military fights and tilted the world’s balance of power on at least three occasions with the first US radar, the world’s first intelligence satellite, and the first operational satellite of the Global Positioning System. NRL’s Information Technology Division carries out research and development in the collection, transmission, assurance, and processing of information to provide Naval and joint warfighting forces with the means to achieve and maintain information dominance. In this talk, I will discuss factors which motivate Naval science and technology investments, cybersecurity considerations for Navy platforms, and opportunities for students to engage with and contribute to the Navy’s innovation ecosystem.

Jon David and Logan Zellem, NR Labs

  • Session Time: 3:05 PM to 3:50 PM
  • Title: From Campus to Career: Making Moves, Not Mistakes
  • Abstract: Undergraduate students are generally motivated, self-educating, and technical, but may need assistance in securing and maintaining industry employment after graduation. This presentation will provide students with résumé and interview tips, do's and don'ts for their first year of employment, and personal anecdotes on mistakes recent graduates tend to make. In addition, incident response stories will be shared for students to gain first-hand knowledge of real-world situations.

More Information

For more information about Cyber Security Day at IUP, please contact Waleed Farag, Director, Institute for Cybersecurity, at farag@iup.edu, 724-357-7995.

Previous Events 

Each year, the Institute for Cyber Security, in collaboration with IT Services, hosts Cyber Security Day (known previously as Information Assurance Day). This day-long event features nationally recognized security experts as well as speakers from the government, the security industry, and academia. Cyber Security Day is open to all IUP members, the public, community colleges, and neighboring universities.

Below is brief information about previous years' events.

16th Annual Cyber Security Day - October 31, 2023

Topics includedcybersecurity workforce development, cybersecurity awareness month, building a cybersecurity career, advanced computing ecosystems, and active cyber defenses.

15th Annual Cyber Security Day - October 18, 2022

Topics included countermeasures and risk management, evolution of FBI investigations, information warfare, and security design for systems.

14th Annual Cyber Security Day - October 26, 2021

Topics included: blockchains, cybersecurity tools, cyber war, and cybersecurity careers.

13th Annual Cyber Security Day - October 20, 2020 

Topics included: privacy, digital rights, digital resilience, and cybersecurity employment.

12th Annual Cyber Security Day - October 29, 2019

Topics included: IoT, career opportunities, cyberscience and geoinformatics, and cybersecurity in higher education.

11th Annual Cyber Security Day - October 30, 2018

Topics included: machine learning, future threats, ransomware, and the changing landscape.

10th Annual Cyber Security Day - October 26, 2017

Topics included: phishing, cyber power, the employment landscape, and current challenges.

9th Annual Information Assurance Day - November 3, 2016

Topics included: innovation, wireless security, cyber security awareness, combating cyber crime, and cyberspace operations.

7th Annual Information Assurance Day - October 30, 2014

Topics included: centric access control, security awareness, social engineering, and computer forensics.

6th Annual Information Assurance - November 7, 2013

Topics included: hypervision framework, cybersecurity jobs, police and computer forensics, and database systems.

5th Annual Information Assurance Day - November 1, 2012

Topics included: electronic voting, improving privacy, computer crime investigation, and mobile device security.

4th Annual Information Assurance Day - November 10, 2011

Topics included: threat monitoring, red team approaches, enterprise security, and cyber crime.

3rd Annual Information Assurance Day - November 9, 2010

Topics included: cloud forensics, cyber crime, and network security, among others. 

2nd Annual Information Assurance Day - November 5, 2009

Topics included: current and emerging threats in health care security and digital forensics.

1st Annual Information Assurance Day - November 7, 2008

Topics included: incident response, new and evolving threats, and creating value from vulnerability.