Content | Navigation |

2018 Keynote Speakers

Jay Beale

Jay Beale

CTO, COO
InGuardians, Inc.

Jay Beale is an information security specialist, well known for his work on mitigation technology, specifically in the form of operating system and application hardening. He's written two of the most popular tools in this space: Bastille UNIX/Linux, a system lockdown and audit tool that introduced a vital security-training component, and the Center for Internet Security's Unix Scoring Tool. Both are used worldwide throughout private industry and government.

Through Bastille and his work with the Center, Jay has provided leadership in the Linux system hardening space, participating in efforts to set, audit and implement standards for Linux/Unix security within industry and government. In the past, Jay was a member of the HoneyNet Project and worked actively on the OVAL project, working with government and industry to standardize and improve the field of vulnerability assessment. 

Jay has served as an invited speaker at a variety of conferences worldwide as well as government symposia. He's written columns and articles for Information Security Magazine, SecurityFocus and SecurityPortal.com. He has worked on five books in the Information Security space. Three of these make up his Open Source Security Series, while two are technical works of fiction in the "Stealing the Network" series.

Jay works as an information security analyst with InGuardians, a firm he co-founded with Ed Skoudis, Mike Poor, Jim Alderson and Bob Hillery. He formerly led the MandrakeSoft/Mandriva Security team.

Presentation PDF: Cyber Security Is Our Shared Responsibility - What Are We Dealing With and What Do We Need To Do?

Avis Yates Rivers

Avis Yates Rivers

CEO
Technology Concepts Group International, LLC (TCGi)

Avis Yates Rivers is the President and CEO of Technology Concepts Group International, LLC (TCGi), a global asset, expense and procurement management firm founded in 2008.  TCGi provides Tail Spend, Software License Management, Telecom Expense Management and IT Procurement Services to Fortune 500 companies. In 2017, TCGi was ranked #3 of the 50 Fastest-Growing Women Owned/Led Companies by WPO/American Express.

Avis's accolades include the White House Champion of Change in STEM, awarded by President Barack Obama for her work with NCWIT.  Avis chronicles her tech experience in her first book, Necessary Inclusion: Embracing the Changing Faces of Technology, released in January 2017. She was selected to serve on New Jersey Governor Phil Murphy's transition team as a co-chair of the Government Technology and Innovation Committee in 2017.

Presentation Powerpoint: Necessary Inclusion - Embracing the Changing Faces of Technology

Tony Aukland

Tony Aukland

Information Systems Security Analyst
ND Information Technology Department & NDSLIC 

Tony Aukland, has been in Information Technology for 25 years, 20 years alone with the State of North Dakota.  He is employed by the Information Technology Department and attached to the NDSLIC, North Dakota State and Local Intelligence Center, as an IT Security Analyst focusing on Cybersecurity.  A native of Devils Lake, North Dakota, Tony graduated from Valley City State University with degrees in Math Education and Computer Science.  He and his wife, Donna, reside in Bismarck and have 3 children.

Presentation: Cybersecurity Education in North Dakota

Dedra Chamberlain

CEO
Cirrus Identity, Inc.

Dedra is founder and CEO of Cirrus Identity, the Swiss army knife of digital identity management. Cirrus Identity offers a suite of hosted identity solutions that enable the complete outsourcing of guest account management for large enterprise, including social identity integration, a SAML Identity Provider of Last Resort,  invitation of guest users by trusted enterprise account holders, and account linking. Dedra was formerly Deputy Director of Identity and Access Management at UC Berkeley and UCSF, and chaired the workgroup responsible for crafting the University of California's system-wide identity strategy. She has participated in numerous nation-wide identity strategy workgroups and speaks regularly at IT conferences. Her goal is to take the friction and frustration out of secure access to online services.

Presentation: Right-Sizing Security - Enabling Both Security and Ease of Access

Kelvin J. Daniels

Sr. Technology Consultent
Network Center Communications

Kelvin Daniels has been in the IT industry for 14 years.  In that time frame he has gained experience as a Security Specialist, BCP Analyst, CSSR, Compliancy and Process Analyst, Managed Network Design Implementation, and Technology Consulting.  He currently serves his community in the FM-AM Rotary and also as the Sector Chief of IT for North Dakota InfraGard.

Kevin Fishbeck

Kevin Fishbeck

Professor of Computer Information Systems
University of Mary

Kevin Fishbeck, Ph.D. has been a Professor of Computer Information Systems at the University of Mary since 2001. He earned a BS and an MA in Business Education from Northern State University, and a Ph.D. Teaching and Learning from the University of North Dakota. Previously, Fishbeck taught at Bismarck State College (1997-2001) and at Sitting Bull College. Fishbeck helped revitalize the computer information systems curriculum and created a new major, Information Technology Management. He is certified by Microsoft and Cisco, and is the CEO and owner of Fishbeck Technology Consulting, providing expertise to local churches, schools and small businesses.

Evan Francen

CEO
FRSecure LLC

Evan Francen is a passionate information security expert who serves businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security. He is considered to be an “information security evangelist”. 

Prior to establishing FRSecure, Evan spent more than 15 years as a leading information security professional and corporate leader in both private and public companies. He is well-versed in governmental and industry-specific regulations, standards and guidelines including ISO/IEC 27002 (17799:2005), HIPAA, GLBA, PCI-DSS, FDA CFR Part 11, SOX and COBIT, but also understands the intricacies in aligning compliance with business objectives. Most recently, and prior to establishing FRSecure LLC, Evan established the formal information security programs for four publicly-traded companies; Corel Corporation (CREL), Mattersight Corporation (MATR), MGI Pharma(MOGN) and Eisai Ltd (TSE).

Richard Frovarp

Senior Software Engineer
North Dakota State University, ECI

Richard Frovarp is a Senior Software Engineer with North Dakota State University in the Enterprise Computing and Infrastructure department. At NDSU he develops and maintains systems that create and manage accounts across a wide variety of systems, making sure that system that weren’t designed to work together do. He is also responsible for the federated authentication systems at NDSU, including the InCommon

Presentation: Turning Your IoT Against You

Will Gavin

Solution Architect
Giga-Green Technologies

Will Gavin is an avid security administrator and co-founder of Giga-Green Technologies Inc, a local Fargo IT security and consulting firm.

Technology advances faster than most organizations can successfully adopt and deploy it. This leads to an exciting chase to maintain security and compliance in a changing security architecture. Will prides himself on the ability and dedication to redesign and seamlessly implement new security controls for private, public, and government institutions. Will is also the President and co-founder of the Fargo chapter of IAMCP, International Association of Microsoft Channel Partners.

Weston Hecker

Principal Application Security Engineer
NCR Corporation

Weston Hecker has been pen-testing for 13 years and has 15 years of experience doing security research and programming. He is currently working for NCR. Weston has recently spoken at Defcon 22, 23, 24 and 25 Blackhat 2016 Enterprise Connect 2016, ISC2-Security Congress, SC-Congress Toronto, BSIDESBoston, HOPE 11 and at over 50 other speaking engagements from telecom regional events to Universities on security subject matter. Weston works with a major university's research project with Department of Homeland Security on 911 emergency systems and attack mitigation. He attended school in Minneapolis Minnesota and studied Computer Science and Geophysics. Weston found several vulnerabilities in very popular software and firmware, including Microsoft, Qualcomm, Samsung, HTC, Verizon.

Presentation Powerpoint: What Happens When you Scam a Hacker's Grandma

Michael Krause

Supervisory Special Agent
FBI Minneapolis

Supervisory Special Agent Michael Krause has managed cyber intrusions and computer forensics for the Minneapolis FBI since 2012. Over his 18 year FBI career, SSA Krause has served in several FBI offices including Albuquerque, the Criminal Justice Information Systems, and the Office of General Counsel. In addition to his current assignment, he has conducted and managed several investigative assignments to include drug enterprise and terrorism investigations, intelligence operations, and information technology systems development. Before entering the FBI, SSA Krause directed comprehensive crime prevention and community development programs for the City of Baltimore, supported non-profit and business development in the Baltics, and practiced law in Iowa. SSA Krause holds a Juris Doctorate and a Bachelors of Business Administration in Accounting from the University of Iowa.

Presentation Powerpoint: Engaging Law Enforcement: The Myths and Realities

Aamir Lakhani (AKA Dr. Chaos)

Senior Security Strategist
Fortinet

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cyber criminal groups.

Jamie Maguire

Security Engineer
High Point Networks

Jamie Maguire is an information security professional with 7+ years of experience working in IT. Hisemphasis is in vulnerability scanning and network defense. During his 7 years Jamie has gained a large amount of experience in various roles such as end user support, network administration, and enterprise vulnerability scanning and management.

Most recently Jamie has begun performing Security Assessments, Network Penetration Testing and Social Engineering Exercises for small and medium sized businesses in various industries. Jamie understands that different businesses have different needs and concerns, and tailors his assessments to best fit the customer’s unique needs.

Jamie currently holds the Comptia Security+ certification and graduated from Minnesota State University Moorhead in 2012 with a Bachelor’s degree in Computer Information Technology and a minor in Leadership studies.

Jared Martin

Information Security Project Manager
National Information Solutions Cooperative (NISC)

Jared Martin, NISC Information Security Project Manager, is the Rapid7 Nexpose, InsightIDR, and Jamf Pro administrator for NISC. His current focus is developing an employee choice program (Mac vs PC) by proving Macs can be effectively and securely deployed into NISC’s enterprise environment.

Martin has been with the IT cooperative for 11 years, starting in the technical implementation division. In 2013 he moved to the Information Security team where he worked on Member-based security solutions and internal security projects.

Martin graduated from University of Jamestown in 2006 with a bachelor’s degree in Management Information Science and minors in Business Administration and Information Technology.

Kevin Noltan

Kevin Nolten

Director of Academic Outreach
Cyber Innovation CenterNational Integrated Cyber Education Research Center

Kevin Nolten serves as Director of Academic Outreach for the Cyber Innovation Center, headquartered in Bossier City, Louisiana. In this role, he is responsible for the operations of the National Integrated Cyber Education Research Center (NICERC) where he oversees the development and distribution of STEM, cyber, and computer science curricula, professional development, and other resources for K-12 educators, school systems, and state departments of education across the country. Kevin’s passion and visionary philosophy empowers educators and school systems with resources and confidence to transform classrooms into 21 st century learning environments. Prior to joining the Cyber Innovation Center, Kevin served as an Assistant Principal of a K-8 school in Louisiana. Kevin is a graduate of Louisiana State University with a Bachelor of Science degree and a Master’s in Business Administration.

Presentation: Cyber Innovation Center

Jill Peterson

ECISoftware Engineer
North Dakota State University, ECI

Jill is a software engineer at North Dakota State University with nearly two decades of experience in the higher education IT industry. Jill At NDSU she develops and maintains the university’s official content management system and is unofficially the user experience and accessibility advocate on the development team. She is also a co-owner of a mobile software development company that created a popular app for a multi-protocol home automation controller.

Presentation: Turning Your IoT Against You

Mike Saunders

Mike Saunders

Owner
Hardwater Information Security

Mike's love of IT started in the third grade when he discovered he could view the code of BASIC programs on an Apple ][e. Mike now performs penetration testing and vulnerability assessments for a multinational agribusiness corporation. He also owns and operates Hardwater Information Security, an information security consulting company.  He has held many information technology and IT security positions, including developer, network administrator, system administrator, security architect and security incident handler. Mike holds the OSCP, ISC2 CISSP, and GIAC GPEN, GWAPT, GMOB, and GCIH certifications. Mike has spoken at a number of security conferences including DerbyCon, BSides Minneapolis, BSides Winnipeg, MISC.conf, and the NDSU Cyber Security Conference.  When he is not at work, he is an avid kayak fisherman and member of a local horn rock band.

Nick See

CIS Instructor
Bismarck State College

Nicklos See has been teaching CIS and CSCI courses at Bismarck State College for 20 years. He holds a CIS Master of Science degree from Boston University, with a concentration in security. Additionally, Nicklos has earned a number of networking, operating systems, and security certifications.

Theresa Semmens

Chief Information Security Officer and Assistant Vice President
University of Miami

As a member of University of Miami Information Technology’s Executive Cabinet, Theresa Semmens serves a key role by working closely with senior administration, academic leaders, health system leaders, and the university community to optimize our organization's information technology security. She is an advocate for the University of Miami's information security needs, and is responsible for the development and delivery of a comprehensive information security strategy. In her position, she leads the development and implementation of a security program that leverages collaborations and university-wide resources, facilitates information security governance, advises senior leadership on security direction and resource investments, and designs appropriate policies to manage information security risk.
 
Prior to joining UMIT, Semmens worked for North Dakota State University (NDSU) as a CISO. There, she was responsible for creating, overseeing, coordinating, and evaluating processes to build an information security vision and strategy, which included: security policies, procedures and risk management, and assessment. While at NDSU, she reviewed contracts, software and service licenses, and agreements that contained IT components of security and regulatory compliance – in particular, evaluating matters related to HIPAA, FERPA, GLBA, and applicable protection of information and privacy laws. She partnered with vice presidents, deans, directors, chairs, faculty, staff, and students on needs and projects that required and included elements of information security. She also developed and managed the information security awareness and training programs.

Semmens earned two master's degrees, one in business administration and another in management, from the University of Mary, North Dakota.

Presentation Powerpoint: Me Timbers 'R' Shivering! Planning and Implementing Disaster Recovery and Business Continuity in the Throes of Hurricane Irma

Natalie Vanatta

Natalie Vanatta

U.S. Army Cyber Officer and Deputy Chief of Research 
Army Cyber Institute

Natalie Vanatta is a U.S. Army Cyber officer and currently serves as the Deputy Chief of Research at the Army Cyber Institute (an Army "think tank"). Here she focuses on bringing private industry, academia and government agencies together to explore and solve cyber challenges facing the U.S. Army in the next 3-10 years. She holds a Ph.D. in applied mathematics, as well as degrees in computer engineering and systems engineering. She previously served as the Distinguished Visiting Professor at the National Security Agency.

Presentation: This Way to the Dark Metaverse: Threatcasting Tomorrow's Threats

Troy Walker

Director of Enterprise Security and Governance
MDU Resources Group, Inc.

Troy Walker serves as the Director of Enterprise Security and Governance for MDU Resources. In his role, Troy is responsible for Cyber security, governance and the service desk. Troy has been with MDU Resources for 25+ years. He and his wife, Dina, reside in Bismarck and have two children. Troy enjoys the outdoors in his free time.

Calvin Weeks

Manager, Computer Forensics
Eide Bailey & Oklahoma State University

Calvin regularly engages in investigations involving technology, including the electronic forensic examination of documents, email, network activity, internet history, deleted data, dates and times associated with stored and transmitted data, modified data, hiding of information, images, communication links, video, audio, music, intellectual property, malicious applications, database storage and additional electronic discovery investigative artifacts. He has testimony and court experience in state and federal jurisdictions. In addition, Calvin is a certified police officer with experience in law enforcement, investigations and cyber security.

Calvin has worked with clients since 1985. They can expect that Calvin will not only find the right answers for the immediate needs, but identify the long-term solutions to best serve the client. Calvin will be there for the client today and for what tomorrow brings.

Outside of work, Calvin enjoys using his knowledge and skills to educate parents and teens on the dangers of the internet and the technology they use. Calvin engages with teens and their families through PC gaming and fellowship in fun activities. Calvin spends his unplugged time with family at the family's cabin.

Presentation Powerpoint: I have Many Checklists: How Do I Get Started with Cybersecurity

Eric Wilkens

System Engineer
Arvig

Eric Wilkens, Ph.D., has been with Arvig for 2+ years as the System Engineer responsible for system engineering and information security. He has been in Information Technology for 20 years including 7 years in the banking industry as a System Engineer and Senior Information Security Specialist and 10 years as full-time faculty teaching information security and networking. Eric also currently serves in the North Dakota Air National Guard.

Eric currently holds several certifications including SANS GSEC, CCNA Security and CCNA Switching and Routing. He holds a Masters in Computer Information Systems and a Doctorate in Information Technology specializing in Information Assurance and Security.


Student Focused. Land Grant. Research University.

Follow NDSU
  • Facebook
  • Twitter
  • RSS
  • Google Maps

North Dakota State University
Phone: +1 (701) 231-7961 / Fax: (701) 270-1231
Campus address: Quentin Burdick Building 206
Physical/delivery address: 1320 Albrecht Blvd, Fargo, ND 58102
Mailing address: NDSU Dept. 4500 / PO Box 6050 / Fargo, ND 58108-6050
Page manager: Office of the Vice President for Information Technology

Last Updated: Monday, April 09, 2018 2:13:33 PM
Privacy Statement