Speakers


Let's play a little game of meet-the-speaker

Mohsen Beheshti

Chair and Professor
Computer Science Department
California State University, Dominguez Hills

Master's program demonstration

1:30pm - 2:15pm at LSU 323

Jeff Boleman

Jeff Boleman, M.S.C.S., is a Cognitive Technical Architect and IBM Systems Cloud Lead for North America with IBM. He is an experienced IT thought leader for technical sales, consulting, software development, financial services and academia. He brings his BS and MS in Computer Science education combined with real world experience to applied areas including cloud, automation and large scale architecture needed for ERP, HPC, Big Data and AI/ML/DL. Jeff has written and been an adjunct instructor on operating systems, systems architecture, networking, virtualization and cloud. His two most recently published white papers from 2018 and 2019 address the skills needed for a cloud enabled workforce and cloud deployment methodologies.

Artificial Intelligence

10:15am - 11:15am at Ballroom B

IBM Speed Mentoring #2

3:30pm - 4:15pm at LSU 326 - 327

Abanoub Ghaly

Abanoub is a Toro Alumni! He also previously served on the board for the 2nd Annual ToroHack. Abanoub graduated in 2018 with a Cyber Security degree (Honors in Major). He worked in the entertainment industry as a Cyber Security analyst while he was undergraduate. Once Abanoub graduated, he joined Accenture as a consulting analyst. As a consultant, he worked on a different roles/projects. His current role is Azure Cloud Architecture.

Azure Cloud Architecture

3:30pm - 4:15pm at Ballroom B

Kevin Haley

Kevin Haley is a Director in the Security Technology and Response group where he is responsible for ensuring the security content gathered from Symantec’s Global Intelligence Network is actionable for its customers. In his role, Kevin educates customers on security issues and serves as a media expert to explain security content and share how Symantec’s telemetry and solutions protect customers from complex internet threats and other security risks. Kevin was named one of the “100 People You Should Know 2018” by CRN, which “spotlights some of the channels’ best and brightest people who may not be as visible as some channel chiefs or CEOs, but are just as important to the partner community. Consider them the channel’s unsung heroes.” Kevin served as a technical advisor for Anthony E. Zuiker's digital crime thriller, “Cybergeddon” and shared his security expertise in the documentary “Most Dangerous Town”. He also frequently appears as a security expert for The Today Show, NBC Nightly News, Good Morning America, MSNBC, USA Today, New York Times, Forbes, Dow Jones and many other top-tier media outlets.

Hacks, Jacks, and Attacks - The Threat Landscape Today And What It Means For Tomorrow

1:30pm - 2:15pm at Ballroom B

Tristan Henning

Tristan is a security enthusiast and ex-locksmith with years of experience legally picking locks, cracking safes, and stealing cars. He believes in the power of the proliferation of security information and increased consumer awareness to drive innovation in security technology.

Lockpicking Exhibition

11:30am - 4:15pm at LSU 322

Tim Krugh

Writing a bio
is hard, I do infosec,
clowns are scary. whoa.

Tim has been fighting malware,patching systems,and scanning for vulns on the blue team for several years,and is always trying to learn more. Next up: red team

Life outside of security includes amateur cooking and reading lots of fiction.

Twitter: @w00k_

Why Did I Click That? Learning From An Account Takeover

2:30pm - 3:15pm at Ballroom B

Amol Mishal

Amol is a recent graduate of CSUDH. After working in fields ranging from Door-to-Door sales to Durable Medical Equipment, he found his passion in the field of Cyber Security. In 2016, Amol and his team of two other fellow students won the CAHSI Hackathon. This sparked his passion in Penetration Testing and Ethical Hacking. The following year, he became Vice President of the club and helped others learn more about Cyber Security and Pen Testing through regular training clinics. Since graduating, Amol worked as a private consultant for small businesses until he joined Accenture as a Security Analyst. He is currently a part of the Cyber Defense team in Threat and Vulnerability Management and is pursuing the EC-Council’s Certified Ethical Hacker qualification.

Finding a Career After Graduating

11:30am - 12:15pm at Ballroom B

Digital Footprints and Social Engineering

2:30pm - 3:15pm at LSU 323

Rhaphiel Molinar

Rhaphiel Molinar went to California State University of Long Beach after graduation from High School. Shortly found the opportunity to grow at Digital Watchdog, where he started with DVR analog CCTV support. From there, he shifted to the Network based servers and IP cameras and became a level 3 technician and IP camera lead. That entails assisting with large server configurations with up to 124 IP cameras per server (now one upward of 200). It also involves assistance with RAID configurations for storage as well as Network Attached Storage. He spends most of my time explaining how a network even works to the people installing it.

Working as a Level 2 Technician

3:30pm - 4:15pm at LSU 320

Punita Patel

Punita Patel is the Lead Employer Engagement Specialist and Career Coach at the Career Center. She is responsible for engaging companies, non-profit organizations and government entities to recruit DH students and alums. Ms. Patel has over 10 years of experience in coaching underrepresented students on career choices, academic success and job placement. Prior to Dominguez Hills, she was the Director of Development at a non-profit organization in the San Fernando Valley where she sought out strategic partnerships, fundraise and write grants to government and foundation organizations. She received her Bachelor of Arts in Liberal Studies and Master of Science in Counseling at California State University, Northridge.

Resume Writing Workshop For STEM And Computer Science

10:15am - 11:15am at LSU 323

Eyesha Powers

Eysha Powers designs and develops cryptography software for IBM enterprise systems. She has expertise in cryptographic key usage and management, data encryption and decryption, signature generation and verification, key algorithms, hash methods and crypto coprocessor management.

IBM Women in STEM Fireside Chat

10:15am - 11:15am at LSU 326 - 327

IBM Speed Mentoring #1

11:30am - 12:15pm at LSU 326 - 327

Securing IoT Data with Pervasive Encryption

1:30pm - 2:15pm at LSU 320

The Encryption Pyramid: Choosing The Level That Works For You

2:30pm - 3:15pm at LSU 320

IBM Speed Mentoring #2

3:30pm - 4:15pm at LSU 326 - 327

Alex Romero

Product leader with over 10 years experience making products people love. My passion for solving ambiguous problems is second only to my love for building things that people find useful, intriguing, helpful, and ideally beautiful. In my history that's included everything from video games, to enterprise-grade SaaS analytics products, and even a multitude of audio compositions spanning pretty much any/all genres.

CSUDH to Dodgers

3:30pm - 4:15pm at LSU 323

Jesse Rodgers

I love solving problems that integrate technology, creativity, and simplicity as the core solution. I ampassionate about human-centered design, data driven decisions, and building great software that matters. I enjoy driving a shared vision that brings new products and features to life with a kick-ass team.

Transition from Space-X to Security

3:30pm - 4:15pm at LSU 323

Alex Speaks

I use my passion for learning and my expertise in cutting edge software and services to help mission driven businesses and organizations be more effective at what they do.

Specialties: Cloud native operations, Containerization, Automation, Linux administration, Configuration management, Continuous integration, network security, disaster recovery, education, public speaking.

History of Hacking

11:30am - 12:15pm at LSU 320

Xinlin Wang

Xinlin Wang is a Senior Technical Staff Member, Master Inventor, and the member of Academy of Technology in IBM. She is the chief Architect of IBM Watson IoT Blockchain Solution, providing technical leadership to IBM IoT Blockchain development teams. Xinlin is the author of over 40 journal and conference publications, an inventor with more than 40 issued patents and patent applications.

IBM Women in STEM Fireside Chat

10:15am - 11:15am at LSU 326 - 327

IBM Speed Mentoring #1

11:30am - 12:15pm at LSU 326 - 327

Professional Development

1:30pm - 2:15pm at LSU 326 - 327

Blockchain Applications

2:30pm - 3:15pm at LSU 326 - 327

IBM Speed Mentoring #2

3:30pm - 4:15pm at LSU 326 - 327

Cody Wood

Cody Wood worked for a period of time in mining (not data) operations in the high desert of California. His initial interests in the security space started at a very early age, but he never really put any effort into pursuing those endeavors. About four years ago that all changed. After getting kicked out of a .NET programming bootcamp in Houston, TX he interned at a hackerspace and started working at the best company for aspiring inexperienced hackers (Whitehat Security). Specializing in the general vertical of application security with a non-traditional background has provided him with some interesting lessons. He currently works as a appsec product support engineer at Signal Sciences and recently moved to Ogden, Utah.

Security On a College Budget

10:15am - 11:15am at LSU 320