Sample of Speaking Engagements
Keynote Speaker​
Data Centric Security Models, Life Sciences Data Privacy, Integrity & Security Summit
Cynthia as Little Red Hood on
at New England
Cyber Security Awareness Day
​
Conferences, Seminars, Workshops and Conference Moderator
-
Women in CyberSecurity at IPG and Agencies - Oct. 2021
-
VIP Host - ISE Executive Forum - Feb. 2020
-
IPG CISO Summit - April 2019
-
Infosecurity NYC - Panel – Finding & Keeping Talent: Building an effective cyber security team in a highly competitive market - Nov. 2018
-
NJBIA Women Business Leaders Forum – Panel – Overcoming the Confidence Gap – Challenges of Being a Woman in Tech - Sept. 2018
-
OWASP Central NJ Vulnerability Testing Infrastructure – June 2018
-
ISACA NYC - GDPR Panel - May 2018
-
Emerging Technologies Conference at NJIT - Moderator - May 2018
-
Social Engineering Conference at NJCU - Moderator - May 2017
-
NJCU's 5th Annual Northeast Regional Security Education Symposium, March 2017
-
OWASP Central NJ - Whiteboard S-SDLC, Feb. 2017
-
Turning Hackers Gold (Data) into Straw, NYMJCSC, Oct. 2016
-
The Business of Hacking with Healthcare Focus, Secure Boston – Healthcare 2016
-
Finding the Lurking Hacker, Congress 2016, Sept. 2016
-
DevOps – Whiteboard Discussion, OWASP Long Island, Aug. 2016
-
Women in Cyber Security Panel Moderator, Hope Conference – July 2016
-
Detecting Insiders and those Masquerading as Insiders, High Tech Crimes Investigations Association Jan. 2016
-
The Board needs You, Evanta CISO Executive Roundtable, May 2015
-
Data Centric Security Models, Life Sciences Data Privacy, Integrity & Security Summit – Keynote speaker –
-
Advanced Persistent Threat, Healthcare Roadshow NYC & Boston, June 2015
-
Detecting the malicious insider (and those masquerading as malicious insiders) NYMJCSC, Oct. 2015
-
CISO Executive Roundtable - Boston – Discussion leader Nov. 2014
-
Healthcare Biometrics Summit, 2014
-
Life Science Data Privacy, Integrity and Security Summit, 2013
-
Digital Signature Workshop June 2010
-
Identity Theft: Personal and Organizational Impacts, HealthSec, Sept. 2005
-
An Application Framework, HealthSec, Sept. 2004
-
Building an Application Security Program, Burton Group Catalyst Conference – Europe, Oct. 2004
-
Holistic Application Security, NJ ISSA Chapter 2003
-
PC Expo 2002
-
Telecommunications OSS Security Vulnerabilities, National Security Telecommunications Advisory Committee’s (NSTAC), National Security Information Exchange, Dec. 2001
-
Designing 24 X Forever Infrastructure, ISSA’s Computer Security Seminar, May 2001 & Computer Measurements Group, Dec. 2000
-
Intrusion Detection Mechanisms, European Security Forum, May 1998
-
Hacker Tools and Techniques, RSA Conference, January 1998 & American Management Association, May 1998
-
Smart Cards, SecureCom97, September 1997
-
Public Key Infrastructure/Certificate Authorities, Bellcore’s Southeast Asia Security Symposium, May 1997
-
Internet Security, Bellcore’s Southeast Asia Security Symposium, May 1997
-
NT Security, Bellcore’s Southeast Asia Security Symposium, May 1997
-
Smart Cards Security Issues, Bellcore’s Southeast Asia Security Symposium, May 1997
-
Introduction to Computer and Network Security, Bellcore’s Southeast Asia Security Symposium, May 1997
-
Trends in Hacker Tools and Techniques, SecureCOMM’97, April 1997
-
Security Considerations of Wireless Data and Internet Access, SecureCOMM ‘97, April 1997
-
One-time Passcodes have been Compromised, SecureCOMM ‘97, April 1997
-
Hacker Software Demonstration, DIMACS, Dec. 1996
-
Blocking Java Applets at the Firewall, TSARS, Sept. 1996
-
Lucent’s Inferno/Limbo Interactive Mult-Media OS, TSARS, Sept. 1996
-
Security Implications of IP Stacks, TSARS, Sept. 1996
-
Intrusion Testing, Bell Atlantic/Bellcore Security Symposium, June 1996
-
Secure Virtual Private Networks, LANs, WANs, & Firewalls, TSARS, March 1996
-
IPX Firewalls, TSARS, November 1995
-
Security for WANs, LANs, and MANs, Computer Security, Audit and Control, The second Annual Irish International Conference, September 1995
-
Inherent Vulnerabilities of One-Time Passcode Mechanisms, IEEE LAN Conference, Sept., 1995
-
Introduction to Internet Firewalls, RACF Knowledge Expo. 95, June 1995
-
Overview of TCP/IP Security, Security and Network Security Symposium, May 1995
-
Review of Router Security Issues, Security and Network Security Symposium, May 1995
-
IRC - The Hackers’ Latest Communications Tool, Security and Network Security Symposium, May 1995
-
FireWatch: A Firewall Testing and Monitoring Tool, Telecommunications Security, Awareness,
-
Research and Standards Group (TSARS), February 1995
-
UNIX Security, NYC Security Users Group, August 1994
-
Internet Security, ISSA, Fall 1994
-
TCP/IP Packet Monitoring Tools, Security and Network Security Symposium, May 1994