top of page
slide-01%20copy_edited.jpg
Cyber Symposium_edited.jpg

Events

Workshops/Symposiums

Upcoming Events

6th Annual OCRI Symposium: An Ecosystem for Advancing Cybersecurity Education, Workforce Development, and Economic Development 
 

October 16, 2024
 

Thanks to all who attended the 6th Annual OCRI Symposium, where participants had the chance to engage with leading experts, explore the latest trends and challenges in cybersecurity, and participate in hands-on activities. Breakout session speakers who shared presentations are linked below. 

 

Event Details:
 

  • Date: October 16th

  • Time: 9AM-4PM

  • Location: Digital Futures, University of Cincinnati

  • Address: 3080 Exploration Ave, Cincinnati, OH 45206

​

​Featured Speakers

​

​

​

​

​

​

​

​​​​​​​​

Woodruff.png
duffey.png

Featured Speaker: BG Matthew S. Woodruff, ATAG-Army, Ohio Army National Guard; and Keynote: Mike Duffey, Chancellor, Ohio Department of Higher Education.

​​Symposium Breakout Sessions

Breakout Session 1: 10:15 - 11:15AM

​​​​​Ohio Persistent Cyber Improvement (O-PCI) and Cybermindfulness,

Room 140            

 

Overview of OCRI’s innovative cybersecurity training program for local governments and how UD’s Cybermindfulness initiative played a starring role.

 

Presented by Peter Kobak, O-PCI, UC; Grant Neeley, PhD, University of  Dayton; Mina Al-Sada, MPA ‘25
 

peter-kobak.png
grant-neeley.png
mina-al-sada.png

​​​​​OCRI Cyber Library, Room 145

 

An overview of the OCRI Cyber Library. Explore content and ongoing library improvements. Learn how to access the library, contribute content and share improvement ideas.

 

Presented by Ryan Moore, Associate Professor-Educator, CECH, School of Information Technology, University of Cincinnati.

ryan-moore.png

Early IT: Designing and Launching the Early IT Microschool Powered by PAST Foundation, Room 150

 

The session will provide an in-depth overview of the innovative journey to design and launch the Early IT Microschool set to open Fall 2024. Attendees will gain insight into the strategic actions, collaborations, and detailed steps taken to bring this pioneering educational model to fruition.

​

Presented by Kathy D. Wright, EMBA, M.Ed., Director of Educator Experiences, PAST Foundation.

kathy-wright.png

Cyber Attacks: Pig Butchering Financial Scams, Room 262

 

Dive into the alarming world of financial deceit where we unravel the sophisticated web of online fraud. This session sheds light on the intricacies of 'pig butchering' scams, a chilling metaphor for the process by which fraudsters 'fatten' their victims with trust before financially 'slaughtering' them. Discover how these scammers operate, the psychological tactics they employ, and the digital platforms they frequent. Attendees will learn to identify the red flags of such scams, understand how to protect their personal information, and gain knowledge on preemptive measures to avoid becoming a victim.

 

Presented by Michael Jones, Associate Professor-Educator, Department of Economics, Lindner College of Business, University of Cincinnati.

michael-jones.png

​Safeguarding the Heart of It All: The Buckeye Blueprint for Critical Infrastructure Cybersecurity, Room 362

 

Explore Ohio’s innovative approach to protecting its critical infrastructure sectors, including energy, water, transportation, and public safety, from evolving cyber threats. Participants will gain insights into the state's comprehensive cybersecurity framework, which leverages advanced technologies, proactive defense strategies, and public-private partnerships to strengthen security and resilience. Key topics will include the role of the Ohio Cyber Reserve, a volunteer cyber force, in defending critical infrastructure. The OhCR is composed of cybersecurity professionals who are trained and deployed to assist local governments, public entities, and critical infrastructure operators in responding to and mitigating cyber incidents. This session will provide attendees with a blueprint for safeguarding Ohio's critical assets and discuss best practices that can be applied across the nation.

 

Presented by Benjamin Scott, Fortinet Systems Engineer, Public Sector, Ohio Cyber Reserve.

ben-scott.png

Breakout Session 2: 12:30 - 1:30PM

Ohio Cyber Range Demo/Cyber Exercise, Room 140

​

What’s next for the Ohio Cyber Range infrastructure innovation and expansion.

​

​Presented by Kevin Mamula, Associate Director of Technology and Exercise, Ohio Cyber Range Institute.

kevin-mamula.png

Digital Forensics: RPC Collaboration on Digital Forensics Programming, Room 145
 

How several Ohio Regional Programming Centers, with Digital Forensics expertise, collaborated to analyze, develop and share digital forensics curriculum across the state. 

​

Presented by Cassie Barlow, President, Strategic Ohio Council for Higher Education at SOCHE; Stanley Smith, University of Akron.

cassie-barlow.png
stanley-smith.png

Cyber Law, Room 150

​

In the Cyber Law breakout, this panel of legal experts will indicate the current status of Cyber Law with some indication of where we may be going. Experts will provide an overview of the Computer Fraud and Abuse Act, which is the federal criminal hacking law and discuss the Fourth Amendment's search and seizure requirements and its impact on law enforcement searches in cyberspace. Professor Ray will address a growing number of laws and regulatory actions define the requirement that an organization adopt "reasonable security" measures by reference to industry frameworks like NIST, CIS and others. This trend overlaps with the increase in more specific cybersecurity requirements in other contexts including federal contractor requirements and federal regulatory agencies. Division Counsel Patrick will talk about a regulator’s perspective on the importance of “bridging the gap” between the technical and legal sides to cybersecurity and why it is necessary for us to take a multidisciplinary approach.  Professor Klein will serve as moderator for the Q&A portion.


Presented by Albert Klein, Jr., PhD, JD, Assistant Professor-Educator, Political Science, UC; Brian Ray, JD, Associate Dean for Faculty Development and Online Programs and Leon M. and Gloria Plevin Professor of Law; Director, Center for Cybersecurity and Privacy Protection, Cleveland State University; Roger Patrick, Jr., JD, Division Counsel, Ohio Dept. of Commerce, Div. of Securities. 

al-klein.png
brian-ray.png
roger-patrick.png

Cyber Attacks: The Role of Cryptocurrency in Pig Butchering Scams, Room 262

​

This session unveils how the difficult-to-trace nature of cryptocurrencies has become a fertile ground for scammers. Participants will gain in-depth insights into the mechanics of pig butchering scams, focusing on how victims are enticed into investing in deceitful DeFi projects and crypto ventures. The presentation will highlight the challenges and risks posed by the anonymity and lack of regulation in the cryptocurrency ecosystem.

​

Presented by Michael Jones, Associate Professor-Educator, Department of Economics, Lindner College of Business, University of Cincinnati.

michael-jones.png

Programming with Hacking: A Hands-On Approach to Cybersecurity Education, Room 362

 

Cybersecurity education with a practical approach to learning hacking techniques and their 
ethical applications.


Presented by Marc Cahay, PhD, Professor and Department Head, Electrical and Computer Engineering, College of Engineering and Applied Science, UC; Phu H. Phung, PhD, Associate Professor, Computer Science, College of Arts and Sciences, Director of the Intelligent Systems Security Lab, University of Dayton.

marc-cahay.png
phu-phung.png

Breakout Session 3: 2:15 - 3:15PM

NICE Framework, Room 140

 

How the National Initiative for Cybersecurity Education (NICE) framework can develop a skilled cybersecurity workforce and enhance education.

 

Presented by Mark Bell, Cybersecurity Outreach Coordinator, Ohio Adjutant General’s Department; Bekah Michael, Associate Professor - Educator, School of Information Technology, UC, and Executive Staff Director, Ohio Cyber Range Institute, University of Cincinnati.

mark-bell.png
bekah-michael.png

Workforce Development Pathways: Regional Programming Center Workforce Development Initiatives, Room 145

 

Highlighting workplace initiatives being executed by the Cin-Day Cyber RPC and Strategic Ohio Council for Higher Education (SOCHE) and the University of Akron to build the next generation of Information Technology and Cyber leaders. Cin-Day Cyber RPC and SOCHE are using multiple student initiatives (Miami Valley Intern Academy, SOCHE Intern, Defense Associated Graduate Student Innovators), placing hundreds of students into internships at businesses across the State annually. The University of Akron is providing pathways to underserved high schools and diverse students with limited resources, with an opportunity to participate in cybersecurity, cyber forensics, and basic networking education.

 

Presented by Cassie Barlow, PhD, President, SOCHE; Stanley Smith, Professor of Practice and Cyber Range Coordinator, University of Akron.

cassie-barlow.png
stanley-smith.png

Small Business Program: Ohio Cybersecurity for Small Business Pilot Program, Room 150

 

This program provides complementary services to expand the existing outreach being done by the Ohio Cyber Range Institute and the Ohio Cyber Collaboration Committee for critical infrastructure and local government to help raise the cybersecurity posture of Ohio’s nearly 1 million small businesses and help to ensure that Ohio continues to be a vital part of the manufacturing supply chain by offering free educational services based on NIST Cybersecurity Framework that can be used by small businesses to help them show compliance with the Ohio Data Protection Act. The Program will further target small manufacturers who are the backbone of the manufacturing supply chain which is the largest economic sector in the state of Ohio.

 

Presented by Vimal Buck, Senior Researcher in the Center for Design and Manufacturing Excellence at The Ohio State University; Olivia Hernandez, PhD, Lead Engineer, Center for Design and Manufacturing Excellence, The Ohio State University.

vimal-buck.png
olivia-hernandez.png

Cyber Attacks: Case Studies and Workshop with AnChain.AI, Room 262

 

Participants will be guided through interactive case studies, demonstrating how blockchain forensics and analytics tools can unveil the intricate web of transactions behind pig butchering schemes. This session is designed to equip attendees with the practical skills needed to utilize AnChain.AI software for investigating suspicious blockchain activities. Ideal for cybersecurity professionals and those with an interest in blockchain applications, this workshop promises to provide hands-on insights into combating fraud in the blockchain space.

 

Presented by Michael Jones, PhD, Associate Professor-Educator, Economics Department, Lindner College of Business, University of Cincinnati.

michael-jones.png

K-12 Education: Leveraging Community Connections to Bring Cyber to Students, Room 362

 

A collaborative group of RPCs working together to bring experience to the next generation of cyber defenders. The group annually collaborated to host an Information Assurance Forum for regional business and campus communities. Having a cyber club in every high school did not seem practical because of limited numbers of students, and expertise in the region. they realized that using a scouting troop can reach across school districts to allow more resources to be shared. The BSA Cybersecurity Exploring Post 323 was established in Fall 2019, with a local business leading, and partners from industry, the city school system and nearby university. Monthly meetings included topics such as career paths, ethics, networks, Linux commands and tools, and culminated with a Capture the Flag activity on the Ohio Cyber Range. ​

 

Presented by Lynn Child, President, CentraComm Communications, LLC, Findlay, Ohio​; Helen Schneider, PhD, Associate Professor and Chair of Computer Science, University of Findlay.

lynn-child.png
helen-schneider.png

Past Events

stateofOhio.png

Workshops

Workshops

 

MicrosoftTeams-image (9).png

Bootcamps/Cyber Exercises

Bootcamps/Cyber Exercises

 

bottom of page