Tickets on sale now!

LESS THAN 100 TICKETS LEFT!!! 

SecureWV is committed to keeping our small conference look and feel, so accordingly we will be limiting ticket sales to 400. Be sure to get yours before they run out!

Days
Hours
Minutes
Seconds
ITS SECUREWV TIME!!!!!!!!!

Our Sponsors

Top-Shelf Sponsors

Gold Sponsors

Bronze Sponsors

Edu Sponsors

Apply to be a Sponsor

Capture the Flag

CTF is BACK!!!! Check out the Details for how to prepare and what it will contain.

LockPick Lair

THERE WILL BE LOCKS! The Lockpick Village is a physical security demonstration and participation area. Learn about the vulnerabilities of various locking devices and practice on locks of various levels of difficulty to try it yourself.

Resume Workshop

HEY YOU! YOUR RESUME SUCKS! Is your resume not getting noticed? Let our resident expert give you real world tips and advice on your resume. Click above to Register!

Talk Schedule

Schedule is subject to change and maybe without notice.

Track One

Sponsor Load-in

Time Schedule

8:00 AM -

Room

Gates Open

Time Schedule

9:00 AM -

Room

Matt Scheurer

Don't Stop Believing on this Journey

Time Schedule

10:00 AM - 10:50 AM

Room

Room 217-215

Ryan Gebauer

AI, Cyber, and Where We Really Are

Time Schedule

11:00 AM - 11:50 AM

Room

Room 217-215

Lunch

Lunch

Time Schedule

12:00 PM - 12:59 PM

Room

James McQuiggan

AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals

Time Schedule

1:00 PM - 1:50 PM

Room

Room 217-215

Philip Polstra

Philip Polstra

More Forensics Fun with Bash

Time Schedule

2:00 PM - 2:50 PM

Room

Room 217-215

Hudson Bush

Hudson Bush

Informing Your Security Roadmap with Threat Modeling

Time Schedule

3:00 PM - 3:50 PM

Room

Room 217-215

Karinne Bessette

Karinne Bessette

Essential Microsoft 365 security features crash course

Time Schedule

4:00 PM - 4:50 PM

Room

Room 217-215

Adam Compton

Hillbilly Storytime: Fails, Fumbles, and Finding a My Way in InfoSec

Time Schedule

9:00 AM - 9:50 AM

Room

Room 217-215

Blank User Image

Brandon Curnutte

Amateur Radio 101

Time Schedule

10:00 AM - 10:50 AM

Room

Room 217-215

Branden Miller

Branden Miller

What Texas Urban Legends Taught Me About Information Security

Time Schedule

11:00 AM - 11:50 AM

Room

Room 217-215

Lunch

Lunch

Time Schedule

12:00 PM - 12:59 PM

Room

Tuan Phan

Tuan Phan

Become Digital Forensic SuperStar

Time Schedule

1:00 PM - 1:50 PM

Room

Room 217-215

Matt Scheurer

Lies, Telephony, and Hacking History

Time Schedule

2:00 PM - 2:50 PM

Room

Room 217-215

Shane McCombs

Helping Our Children Thrive on the Internet

Time Schedule

3:00 PM - 3:50 PM

Room

Room 217-215

Blank User Image

Ryan Ashley

AI Enhanced Hacks: Model in the Middle

Time Schedule

4:00 PM - 4:50 PM

Room

Room 217-215

Track Two

Nick Kelly

Nick Kelly

I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity

Time Schedule

11:00 AM - 11:50 AM

Room

Room 214-213

Lunch

Lunch

Time Schedule

12:00 PM - 12:59 PM

Room

Dwayne McDaniel

Dwayne McDaniel

Who Goes There? Actively Detecting Intruders With Cyber Deception Tools

Time Schedule

1:00 PM - 1:50 PM

Room

Room 214-213

Micah Brown

Zero to GRC Hero

Time Schedule

2:00 PM - 2:50 PM

Room

Room 214-213

Blank User Image

Jody Ogle & Brad McGee

Cyber Security Convergence, Where IT and OT meet

Time Schedule

3:00 PM - 3:50 PM

Room

Room 214-213

Adam Beatty

Adam Beatty

Cybersecurity Certifications: Is that the Question, Vulnerability, or Exploit?

Time Schedule

4:00 PM - 4:50 PM

Room

Room 214-213

Erich Kron

Cyber Warzone: Establishing Your First Line of Digital Defense

Time Schedule

10:00 AM - 10:50 AM

Room

Room 214-213

Blank User Image

D. Cody Cutright

Introduction to Satellite Link Security Standards with CryptoLib

Time Schedule

11:00 AM - 11:50 AM

Room

Room 214-213

Lunch

Lunch

Time Schedule

12:00 PM - 12:59 PM

Room

Dwayne McDaniel

Dwayne McDaniel

Championing Security: Scaling Security At Every Level

Time Schedule

1:00 PM - 1:50 PM

Room

Room 214-213

Bill Gardner

Bill Gardner

Leveraging neurodiverse individuals to help fill the cyber skill shortage

Time Schedule

2:00 PM - 2:50 PM

Room

Room 214-213

Chris Griffin

What is Trust?

Time Schedule

3:00 PM - 3:50 PM

Room

Room 214-213

Joshua Gilliland

Joshua Gilliland

Comparing Machine Learning Algorithms for IoT Threat Detection and Prevention

Time Schedule

4:00 PM - 4:50 PM

Room

Room 214-213

X