The 18th Annual Cyber Security Day will be held on October 28!
9:00 a.m. to 3:00 p.m. in the HUB, Ohio Room. 319 Pratt Drive, Indiana, PA 15705. Download the flyer.
Lunch is generously provided by our sponsors. Please by October 17, 2025.
The eighteenth annual Cyber Security Day is proudly sponsored by , , and the ÃÜÌÒÊÓÆµ Institute for Cyber Security. Contact Raj Ezekiel at sezekiel@iup.edu for more information or with any questions.
Each year, the Institute for Cyber Security, in collaboration with IT Support, hosts Cyber Security Day. This daylong event features nationally recognized security experts as well as speakers from law enforcement, government, the security industry, and academia. Cyber Security Day is open to the public, community colleges, and neighboring universities. Information on the eighteenth annual Cyber Security Day is below.
18th Annual Cybersecurity Day at ÃÜÌÒÊÓÆµ
Date: Tuesday, October 28, 2025
Time: 9:00 a.m. to 3:00 p.m.
Location: HUB Ohio Room, 319 Pratt Drive, Indiana, PA 15705
Audience: All are welcome to attend!
Refreshments: Snacks, beverages, and pizza are proudly provided by .
today!
Guest Speakers
Bryant Wysocki
Co-founder and CEO, Full Spectrum Research and Advanced Innovation Materials Corp.

Bryant T. Wysocki is a retired US Air Force officer, former Department of the Air Force senior executive, and now cofounder and CEO of Full Spectrum Research and Advanced Innovation Materials Corp, advancing science and technology for national security. As a DAF technical advisor and technical director at the Air Force Research Laboratory, he led global C5ISRT portfolios spanning quantum optics, laser physics, advanced photonics, information warfare, and cyber operations. He has represented the United States as a NATO science and technology delegate and as a US member of TTCP, fostering allied research and technology transition. Over three decades, he has bridged operations, research, and innovation.
Yat Fu
Chief Operating Officer, Full Spectrum Research

Yat Fu is a technology strategist, innovator, and cofounder of Full Spectrum Research, advancing AI, XR, digital twin, and serious gaming solutions for defense and commercial applications. A former US Air Force senior technologist and acting chief scientist for a major Air Force command, he brings over two decades of experience spanning C5ISRT, Multi-Level Security, Cyber Operations, and Mission Assurance. Renowned for bridging operational requirements with cutting-edge research and development, Yat consistently delivers solutions that address real-world challenges and accelerate mission impact.
Jon David
Managing Director and Cofounder, NR Labs

Jon David, a former director at Mandiant, boasts over 15 years of extensive experience in both private and DoD cybersecurity sectors. His expertise lies in enabling organizations to comprehend their threat landscape, strategically prioritize defenses, and effectively mitigate exposure to malicious threats. Throughout his career, David has played a pivotal role in aiding numerous enterprises across diverse industries in identifying and addressing vulnerabilities within complex environments. Drawing from this wealth of experience, he intimately understands the unique challenges each industry encounters when safeguarding its digital ecosystems.
Logan Zellem
Principle Security Architect, NR Labs
Logan Zellem is a principal security architect with over a decade of experience helping organizations strengthen their cybersecurity posture through secure design, automation, and identity-driven architecture. He has supported federal agencies, nonprofit organizations, and Fortune 500 companies in implementing privileged access orchestration, zero-trust principles, and compliance-focused automation that reduce risk and enhance efficiency. Known for his innovative approach and technical precision, Logan brings clarity and creativity to complex security challenges.
Kevin Slonka
Principal Information Security Consultant, Concurrent Technologies Corporation
Kevin Slonka is a principal information security consultant at Concurrent Technologies Corporation in Johnstown, Pennsylvania, and also an associate professor of computer science and cybersecurity at Saint Francis University in Loretto, Pennsylvania. Slonka’s industry career spans more than 25 years with various government contractors, such as CTC and Northrop Grumman, and also small organizations, such as Precision Business Solutions and Sourceree. He has done everything from IT to software and network engineering to his current roles as a small business cyber consultant and the information systems security manager for a three-letter agency contractor network.
Wayne Figurelle
Assistant Director, Penn State Institute for Computational and Data Sciences

Wayne Figurelle is assistant director at the Institute for Computational and Data Science Sciences at Penn State University. Wayne has over 25 years of experience as a senior manager, with a focus in computer engineering. Figurelle joined Penn State in 2001 as senior technical specialist of the Pennsylvania Technical Assistance Program and was promoted to director of PennTAP in 2006. He has also served as director of Industrial Innovation Programs and the EDA University Center in the Penn State College of Engineering. He joined ICS as assistant director in 2014. Prior to joining Penn State, he held positions at Raytheon and Link Computer Corporation.
Ken Miller
Chief Technology Office, KeystoneREN
Ken Miller is the chief technology officer of KeystoneREN, where he leads the research and education network and designs cyberinfrastructure data architecture initiatives across Pennsylvania. Ken was previously a member of the Science Engagement Team at ESnet. At ESnet, he focused on network performance and science engagement, specializing in perfSONAR and Data Transfer Node optimization, and supported the Engagement and Performance Operations Center. Prior to ESnet, Ken led the design of Penn State’s NSF CC* Science DMZ, integrating advanced network telemetry and researcher engagement to scale secure research data workflows across multiple campuses. He also developed a sustainability model to extend the Science DMZ’s lifecycle and continuous improvement beyond its original NSF investment.
Tommy Chin
Doctoral Student and Financial Industry Professional
Tommy Chin is a doctoral student in computer science and a financial industry professional. As part of his doctoral studies, Tommy’s research explores the intersection of cybersecurity, artificial intelligence, and secure software development. Drawing from more than a decade of industry experience, he has led initiatives in cybersecurity training, vulnerability research, and large-scale data analysis. Tommy has authored several peer-reviewed publications, serves as a reviewer for security conferences, and holds multiple patents.
Michael Castillo
Cofounder, TPG Consulting

Michael J. Castillo is an accomplished IT and cybersecurity leader with over 25 years of experience supporting complex enterprise, higher education, and government environments. Michael’s unique background includes serving as a practitioner in those demanding roles, as well as spending a decade at Palo Alto Networks, giving him a rare dual perspective on security strategy and execution. In late 2023, he cofounded TPG Consulting (The Palo Guys), a firm specializing in advanced Palo Alto Networks solutions, from high-level architecture to detailed deployment. Michael holds an MS in information security, a BS in political science, and multiple industry certifications, including the CISSP and PCNSE.
Presentation Details
Assurance Satellite Operations
- Session Time: 9:10 a.m. to 9:50 a.m.
- Presented By: Bryant Wysocki and Yat Fu
- Abstract: Space systems underpin much of our global infrastructure across communications, finance, weather, navigation, and defense, creating a global dependency that adversaries and criminals increasingly probe. This talk explores the evolving threat landscape, the critical role space systems play, and where space operations are likely headed. We’ll review recent trends and key takeaways from incidents and events, such as simple satellite hacks and findings from AFRL’s Hack-A-Sat program. Then we’ll outline select mission-assurance practices: secure-by-design architectures, disciplined operations, minimal systems, and hardware roots of trust, such as AFRL’s T-CORE secure processor. The goal is simple: keep critical space missions trustworthy and online.
From Campus to Career: Making Moves, Not Mistakes
- Session Time: 9:50 a.m. to 10:30 a.m.
- Presented By: Jon David and Logan Zellem, NR Labs
- Abstract: Undergraduate students are generally motivated, self-educating, and technical, but may need assistance in securing and maintaining industry employment after graduation. This presentation will provide students with résumé and interview tips, do’s and don’ts for their first year of employment, and personal anecdotes on mistakes recent graduates tend to make. In addition, incident response stories will be shared for students to gain first-hand knowledge of real-world situations.
Cyber as a Defense (War) Contractor
- Session Time: 10:35 a.m. to 11:15 a.m.
- Presented By: Kevin Slonka
- Abstract: This presentation is split into two parts: a discussion of the security clearance process to work on classified programs and a journey through Slonka’s career, showcasing the various roles available to people in the cyber field.
The Science DMZ: A Security Framework for High-Performance Data Transfer
- Session Time: 11:15 a.m. to 11:55 a.m.
- Presented By: Wayne Figurelle and Ken Miller
- Abstract: Modern research demands networks that are both high-speed, consistent latency, and highly secure—a balance traditional security architectures often fail to achieve. The Science DMZ framework provides a purpose-built security architecture that enables performant, policy-compliant data movement between campuses, research facilities, and cloud environments. By segmenting science traffic into dedicated performance enclaves and integrating security through visibility, flow analytics, and host-based controls, the Science DMZ bridges the gap between cybersecurity and scientific productivity. This session explores how institutions can implement Science DMZ principles to accelerate large-scale data transfers, align with emerging compliance frameworks (NIST, CMMC, and NSF CC*), and foster a trusted environment for collaboration across the research and education ecosystem.
The Intersection of Software Development, AI, and Security
- Session Time: 1:20 p.m. to 2:00 p.m.
- Presented By: Tommy Chin
- Abstract: Recent advancements in artificial intelligence have transformed and redefined how software code is created and secured. This presentation explores two emerging dimensions of AI transformation. The first examines “vibe coding,” where developers rely on AI-generated suggestions with minimal comprehension, creating efficiency gains but also new security risks. The second highlights advances in AI-driven bug detection and repair, where machine learning and program analysis are used to identify and fix vulnerabilities at scale. Drawn by experiences as a semifinalist from the DARPA AIxCC (AI Cyber Challenge) competition, this presentation will share insights on how autonomous systems can balance AI-generated code with rigorous testing. Together, these two dimensions illuminate AI’s dual role in both introducing and mitigating software vulnerabilities.
From Y2K to Zero Trust: A 25-Year Journey in IT and Cybersecurity
- Session Time: 2:00 p.m. to 2:40 p.m.
- Presented By: Michael Castillo
- Abstract: The transition from pre-Y2K enterprise IT to the modern threat landscape is arguably the most significant shift in business history. This session offers a deep-dive, first-hand account of that journey through the lens of a 25+ year veteran in information technology and cybersecurity. Beginning with a foundation in networking and systems architecture during the era of basic perimeter defenses, this talk traces the career path from hands-on practitioner supporting complex environments to serving a crucial 10-year tenure at a cybersecurity market leader. The session culminates in the 2023 decision to transition from corporate leadership to entrepreneurship with the cofounding of TPG Consulting (The Palo Guys). Michael will share the essential lessons learned across two decades.
More Information
For more information about Cyber Security Day at ÃÜÌÒÊÓÆµ, please contact Waleed Farag, Director, Institute for Cybersecurity, at farag@iup.edu, 724-357-7995.
Previous Events
Each year, the Institute for Cyber Security, in collaboration with IT Services, hosts Cyber Security Day (known previously as Information Assurance Day). This day-long event features nationally recognized security experts as well as speakers from the government, the security industry, and academia. Cyber Security Day is open to all ÃÜÌÒÊÓÆµ members, the public, community colleges, and neighboring universities.
Below is brief information about previous years’ events.
16th Annual Cyber Security Day - October 31, 2023
Topics included: cybersecurity workforce development, cybersecurity awareness month, building a cybersecurity career, advanced computing ecosystems, and active cyber defenses
15th Annual Cyber Security Day - October 18, 2022
Topics included: countermeasures and risk management, evolution of FBI investigations, information warfare, and security design for systems
14th Annual Cyber Security Day - October 26, 2021
Topics included: blockchains, cybersecurity tools, cyber war, and cybersecurity careers
13th Annual Cyber Security Day - October 20, 2020
Topics included: privacy, digital rights, digital resilience, and cybersecurity employment
12th Annual Cyber Security Day - October 29, 2019
Topics included: IoT, career opportunities, cyberscience and geoinformatics, and cybersecurity in higher education
11th Annual Cyber Security Day - October 30, 2018
Topics included: machine learning, future threats, ransomware, and the changing landscape
10th Annual Cyber Security Day - October 26, 2017
Topics included: phishing, cyber power, the employment landscape, and current challenges
9th Annual Information Assurance Day - November 3, 2016
Topics included: innovation, wireless security, cybersecurity awareness, combating cybercrime, and cyberspace operations
7th Annual Information Assurance Day - October 30, 2014
Topics included: centric access control, security awareness, social engineering, and computer forensics
6th Annual Information Assurance - November 7, 2013
Topics included: hypervision framework, cybersecurity jobs, police and computer forensics, and database systems
5th Annual Information Assurance Day - November 1, 2012
Topics included: electronic voting, improving privacy, computer crime investigation, and mobile device security
4th Annual Information Assurance Day - November 10, 2011
Topics included: threat monitoring, red team approaches, enterprise security, and cybercrime
3rd Annual Information Assurance Day - November 9, 2010
Topics included: cloud forensics, cybercrime, and network security, among others
2nd Annual Information Assurance Day - November 5, 2009
Topics included: current and emerging threats in health care security and digital forensics
1st Annual Information Assurance Day - November 7, 2008
Topics included: incident response, new and evolving threats, and creating value from vulnerability