Nebraska Cyber Security Conference

Nebraska Cyber Security Conference

Tuesday, Oct. 31, 2023

Nebraska Innovation Campus Conference Center
2021 Transformation Drive, Lincoln, NE
8 a.m.-4 p.m.
Doors open at 7:30 a.m. for check-in

Register by Sept. 12 and SAVE!
  • Early Bird Education Rate: $99
  • Early Bird Regular Rate: $129

After Sept. 12:
Education Rate: $129
Regular Rate: $149

Register Today! 

Clicking on the Register Today button will take you away from the Southeast Community College website and to a secure third-party site for registration.

In today’s world, we rely on technology and the Internet for a variety of transactions, communication and information – at home, in school and at the workplace. While we are familiar with the myriad of conveniences provided through Internet use, it is difficult to stay abreast of all the changes and the potential risks presented by the Internet. We are all “virtual neighbors” in cyberspace, and what we do, or don’t do, can affect many others.

The Nebraska Cyber Security Conference will assist in raising our awareness of cyber security and help in protecting all of us in cyberspace. If we do our part individually, we can have a tremendous positive impact collectively on our state’s cyber security.

This will be valuable time learning from skilled industry experts. The day will be filled with a variety of breakout sessions that will encompass different areas of information security and technology.


Time Description
7:30 a.m. Check-in
8 a.m. Opening Remarks
8:45 a.m. Break
9 a.m. First Session
9:45 a.m. Break
10 a.m. Second Session
10:45 a.m.  Break
11 a.m. Third Session
11:45 a.m. Lunch
1 p.m. Keynote
2 p.m. Break
2:15 p.m. Fourth Session
3 p.m. Break
3:15 p.m. Fifth Session


More information coming soon.

Michael AtkinsonMichael A. Atkinson, Armis
Mike Atkinson is a veteran cybersecurity practitioner and speaker, currently serving as the Principal Engineer for the Public Sector team at Armis. He lives in a far suburb of Chicago and believes that when he dies, if he was bad, that he will end up at O'Hare for his afterlife.

- Out of Sight, Out of Control: Asset Intelligence

Karla CarterKarla Carter, Bellevue University
Karla Carter is an Associate Professor of Cybersecurity in the College of Science and Technology at Bellevue University, in Bellevue, NE. Armed with an MS in Cybersecurity, Security+ and SANS Security Awareness Professional certifications, and drawing on more years than she should admit to of information technology experience, she teaches undergraduate and graduate courses in cybersecurity operations, social engineering and human factors, security awareness, web security, technology ethics, and—in a plot twist you didn't see coming—occasionally history and civics. Karla is a Member-At-Large and Student Activities Committee Chair on the Nebraska Section IEEE executive committee, as well as being involved with the IEEE Computer Society and ACM Committee on Professional Ethics. She is curious, intense and irreverent and often sends coded messages through her accessories.

- It's Okay to Walk Away

Jacob CharlesJacob Charles, Bison Cloud Solutions
I've worked in the IT industry for more than eight years. I started my career as a software engineer and quickly grew into leadership positions. I've had the great opportunity to solve a variety of problems and grew a passion for security and infrastructure automation. Last year I turned my passion into a product that everyone can benefit from. I founded Bison Cloud Solutions in order to help others improve cloud security and infrastructure automation.

- Cloud Security Awareness

Md Rashedul HasanMd Rashedul Hasan, University of Nebraska-Lincoln
Md Rashedul Hasan is a current student pursuing a Ph.D. in Computer Science at the School of Computing at the University of Nebraska-Lincoln. He completed his Software Engineering Bachelor's degree from Daffodil International University in the Fall of 2019. He also is an Information Security Researcher and OSINT expert. He has participated in various training programs in Bangladesh, Singapore, Indonesia, Malaysia, and the United States. Rashed is working as a graduate research assistant at the School of Computing at UNL. His research involves Large Language model-based development of efficient and resilient software systems.

- Impact of Open Source Intelligence of Offensive Security and Investigative Practices

Julie PaulJulie Paul, Check Point Software Technologies
For the past 28 years Julie has worked with security as a primary focus around the world. She started her career in the USAF as a Communications Computer Operator. She served at Kadena AB Okinawa Japan, Prince Sultan AB Saudi Arabia during Desert Shield and was at Offutt AFB Nebraska. During her 11 ½ years of service she encountered some interesting security issues such as the “Melissa” virus that took down the Air Combat Command network. She was instrumental in developing a plan of attack and orchestrated several security changes at Offutt AFB. Since leaving the Air Force, she has worked in several extremely complex networks. At her last position as a Global Network Security Architect she designed and created the network audit program. Julie has a Bachelor’s degree in Networking and a Masters of Security Management degree from Bellevue University. Currently she works at Check Point Software Technologies as the Security Engineering Manager for the The Heartland area.

- The 90s Called and They Want Their Email Security Back! 

Cybertatanka LogoTim Pospisil

- Tatanka Panel Discussion


Cybertatanka LogoDustin Thorne

- Tatanka Panel Discussion


Cybertatanka LogoDana Turner

- Tatanka Panel Discussion


Ronald WoernerRonald Woerner, Forrester Research
Ron Woerner, Senior Security and Risk Consultant at Forrester has more than 20 years of IT and security experience as a noted consultant, keynote speaker, educator, blogger, and podcaster. At Forrester, he focuses on building cybersecurity and Zero Trust programs for large organizations and US Federal Agencies. Ron also teaches at Bellevue University, an NSA Center of Academic Excellence. He is a member of the ISC2 North American Advisory Committee, the RSA conference program committee, has numerous technology degrees, and is passionate about building the next generation of cyber professionals.

- Zero Trust ≠ Zero Risk

Cloud Security Awareness
Jacob Charles, Bison Cloud Solutions

Prerequisite: Basic understanding of what the cloud is and the pay as you go pricing model.

Cloud security has unique challenges that need to be understood. This presentation provides an awareness of what security issues we are facing in the cloud, and provides a foundation on how to overcome these challenges.

Experience: Beginner, Intermediate

Cyber Tatanka Panel Discussion
Dana Turner, Dustin Thorne and Tim Pospisil

Moderator: Patrick Wright

Dana Turner, Dustin Thorne and Tim Pospisil will talk about outcomes and lessons learned from Cyber Tatanka.

Impact of Open Source Intelligence of Offensive Security and Investigative Practices
Md Rashedul Hasan, University of Nebraska-Lincoln

Prerequisite: Basic knowledge of information security

OSINT, or open source intelligence, is the practice of collecting information from published or otherwise publicly available sources. OSINT operations, whether practiced by IT security pros, malicious hackers or state-sanctioned intelligence operatives, use advanced techniques to search through the vast haystack of visible data to find the needles they're looking for to achieve their goals—and learn information that many don't realize is public. Open source in this context doesn't refer to the open source software movement, although many OSINT tools are open source; instead, it describes the public nature of the data being analyzed. See how OSINT is being utilized on cyber security practices on a regular basis and how counter intelligence are utilizing this to mine information for investigative purposes.

Experience: Beginner, Intermediate, Advanced

It's Okay to Walk Away

Karla Carter, Bellevue University

Prerequisites: An interest in the human factors of cybersecurity.

The ability to say "no" is an underemphasized yet critically important skill. This presentation delves into the psychological aspect of disagreeableness from the Five Factor Personality Model, linking it to key decision-making processes in cybersecurity. The talk identifies five principal areas where the power of "no" is most directly relevant: Social Engineering, Hardware and Software, Vendor Relationships, Product Development, and Data Collection. By focusing on real-world examples, this presentation will argue that being able to decline, defer, or walk away is not just a personal trait but a professional necessity. Note: Elephants not included. Honey Badgers sold separately.

Experience: Beginner, Intermediate, Advanced

Out of Sight, Out of Control: Asset Intelligence
Michael A. Atkinson, Armis

Prerequisites: An open mind and a willingness (among some of them, preferably) to ask questions and make this more of a discussion and less of a lecture.

We discuss the changed IT asset landscape and how asset intelligence is key to understanding what you have, where it is, and what vulnerabilities and other risks are associated with those assets. This is particularly important for those organizations in state government, local government and education as they never or nearly never know what kinds of unagentable devices are on their networks, much less where they are or what they're doing.

Experience: Beginner, Intermediate, Advanced

The 90s Called and They Want Their Email Security Back!
Julie Paul, Check Point Software Technologies

How to keep your business flowing and the importance of a modern API-based email security.

Experience: Beginner, Intermediate, Advanced

Zero Trust ≠ Zero Risk
Ronald Woerner, Forrester Research

Zero Trust is the buzzword of the 2020s. Vendors are selling it, the U.S. Federal Government requires it and organizations are implementing it. But what does it really mean (I mean really beyond the hype)? In this session, you’ll hear what Zero Trust really means in 2023 from a technical member of the organization that started it all. You’ll also learn why Zero Trust is needed to combat threats and how to accelerate your cybersecurity program. We’ll take a deep dive into the Zero Trust pillars (or components): Identity, Device, Workloads, Network, Data, Visibility and Analytics, and Orchestration and Automation. We’ll also talk about technologies that make Zero Trust possible and how to use them to accelerate your cybersecurity program such as Identity and Credential Access Management (ICAM), Policy Decision Points (PDP) and Policy Enforcement Points (PEP). Zero Trust ain’t going away so prepare yourself and your organization in this session.

Experience: Advanced


Sponsor Levels

Sponsor Registration

Clicking on the Sponsor Registration button will take you away from the Southeast Community College website and to a secure third-party site for registration.

checkpoint palo alto
americom logo Axonius logo
Elastic logo Fortinet logo
HBS logo  

Platinum Sponsor $3,000 (Limit 7)

  • Premier table placement in Main Hallway
  • Table and two chairs
  • Complimentary Tickets: 3 (additional tickets may be purchased at attendee rates)

Tyler Logo Tenable logo
Absolute Gold Sponsor
Armis Gold Sponsor

Gold Sponsor $2,000 (Limit 7)

  • Table placement in 1st floor South Hallway
  • Table and two chairs
  • Complimentary Tickets: 2 (additional tickets may be purchased at attendee rates)

Diamond Lunch Sponsor $10,000 (Limit 1)

  • Table placement next to banquet hall in a high-traffic area next to auditorium
  • Two table and four chairs
  • Complimentary Tickets: 5 (additional tickets may be purchased at attendee rates)

Each sponsor will receive the following:

  • Logo published on our conference website
  • Logo printed in conference guide
  • Room for one standup banner (not to exceed 3’ wide x 6’tall) by your table
  • Access to Electrical - sponsors must bring their own extension cord.  The conference center does not have any available to lend.
  • WIFI access

Sponsor Information (PDF)

Nebraska Innovation Campus (NIC) Conference Center
2021 Transformation Drive, Lincoln NE

First Floor Map (PDF)

Second Floor Map (PDF)

Please review the Parking Information for all of the parking options around the Conference Center.


State of Nebraska OCIO



SCC Continuing Education




Business & Professional Development Schedule

Business & Professional Development schedule


Your Path to Personal & Professional Development