top of page

Sample of Speaking Engagements

Keynote Speaker​

Data Centric Security Models, Life Sciences Data Privacy, Integrity & Security Summit 

Cynthia as Little Red Hood on

 at New England 

Cyber Security Awareness Day

​

Conferences, Seminars, Workshops and Conference  Moderator
  • Women in CyberSecurity at IPG and Agencies - Oct. 2021

  • VIP Host - ISE Executive Forum - Feb. 2020 

  • IPG CISO Summit - April 2019

  • Infosecurity NYC  - Panel – Finding & Keeping Talent: Building an effective cyber security team in a highly competitive market  - Nov. 2018

  • NJBIA Women Business Leaders Forum –  Panel – Overcoming the Confidence Gap – Challenges of Being a Woman in Tech - Sept. 2018

  • OWASP Central NJ Vulnerability Testing Infrastructure – June 2018

  • ISACA NYC - GDPR Panel - May 2018

  • Emerging Technologies Conference at NJIT - Moderator - May 2018

  • Social Engineering Conference at NJCU - Moderator - May 2017

  • NJCU's 5th Annual Northeast Regional Security Education Symposium, March 2017

  • OWASP Central NJ - Whiteboard S-SDLC,  Feb. 2017

  • Turning Hackers Gold (Data) into Straw, NYMJCSC, Oct. 2016

  • The Business of Hacking with Healthcare Focus, Secure Boston – Healthcare 2016

  • Finding the Lurking Hacker, Congress 2016, Sept. 2016

  • DevOps – Whiteboard Discussion, OWASP Long Island, Aug. 2016

  • Women in Cyber Security Panel Moderator, Hope Conference – July 2016

  • Detecting Insiders and those Masquerading as Insiders, High Tech Crimes Investigations Association Jan. 2016 

  • The Board needs You,  Evanta CISO Executive Roundtable,  May 2015

  • Data Centric Security Models, Life Sciences Data Privacy, Integrity & Security Summit – Keynote speaker –

  • Advanced Persistent Threat, Healthcare Roadshow NYC & Boston, June 2015

  • Detecting the malicious insider (and those masquerading as malicious insiders) NYMJCSC, Oct. 2015

  • CISO Executive Roundtable - Boston – Discussion leader Nov.  2014

  • Healthcare Biometrics Summit, 2014

  • Life Science Data Privacy, Integrity and Security Summit, 2013

  • Digital Signature Workshop June 2010

  • Identity Theft: Personal and Organizational Impacts, HealthSec, Sept. 2005

  • An Application Framework, HealthSec, Sept. 2004

  • Building an Application Security Program, Burton Group Catalyst Conference – Europe, Oct. 2004

  • Holistic Application Security, NJ ISSA Chapter 2003

  • PC Expo 2002

  • Telecommunications OSS Security Vulnerabilities, National Security Telecommunications Advisory Committee’s (NSTAC), National Security Information Exchange, Dec. 2001

  • Designing 24 X Forever Infrastructure, ISSA’s Computer Security Seminar, May 2001 & Computer Measurements Group, Dec. 2000

  • Intrusion Detection Mechanisms, European Security Forum, May 1998

  • Hacker Tools and Techniques, RSA Conference, January 1998 & American Management Association, May 1998

  • Smart Cards, SecureCom97, September 1997

  • Public Key Infrastructure/Certificate Authorities, Bellcore’s Southeast Asia Security Symposium, May 1997

  • Internet Security, Bellcore’s Southeast Asia Security Symposium, May 1997

  • NT Security, Bellcore’s Southeast Asia Security Symposium, May 1997

  • Smart Cards Security Issues, Bellcore’s Southeast Asia Security Symposium, May 1997

  • Introduction to Computer and Network Security, Bellcore’s Southeast Asia Security Symposium, May 1997

  • Trends in Hacker Tools and Techniques, SecureCOMM’97, April 1997

  • Security Considerations of Wireless Data and Internet Access, SecureCOMM ‘97, April 1997

  • One-time Passcodes have been Compromised, SecureCOMM ‘97, April 1997

  • Hacker Software Demonstration, DIMACS, Dec. 1996

  • Blocking Java Applets at the Firewall, TSARS, Sept. 1996

  • Lucent’s Inferno/Limbo Interactive Mult-Media OS, TSARS, Sept. 1996

  • Security Implications of IP Stacks, TSARS, Sept. 1996

  • Intrusion Testing,  Bell Atlantic/Bellcore Security Symposium, June 1996

  • Secure Virtual Private Networks, LANs, WANs, & Firewalls, TSARS, March 1996

  • IPX Firewalls, TSARS, November 1995

  • Security for WANs, LANs, and  MANs,   Computer Security, Audit and Control, The second  Annual Irish International Conference, September 1995

  • Inherent Vulnerabilities of One-Time Passcode Mechanisms, IEEE LAN Conference, Sept., 1995

  • Introduction to Internet Firewalls,  RACF Knowledge Expo. 95, June 1995

  • Overview of TCP/IP Security, Security and Network Security Symposium, May 1995

  • Review of Router Security Issues, Security and Network Security Symposium, May 1995

  • IRC - The Hackers’ Latest Communications Tool, Security and Network Security Symposium, May 1995

  • FireWatch: A Firewall Testing and Monitoring Tool, Telecommunications Security, Awareness,

  • Research and Standards Group (TSARS), February 1995

  • UNIX Security, NYC Security Users Group, August 1994

  • Internet Security, ISSA, Fall 1994

  • TCP/IP Packet  Monitoring Tools, Security and Network Security  Symposium, May 1994

bottom of page