Lubbock Christian University

Cyber Security Symposium

Thursday, October 26, 2023
8:30 AM - 11:30 AM
Baker Conference Center
2102 Dover Ave.
Lubbock, TX 79407

With human error playing a key part in 88% of cybersecurity breaches according to a recent Stanford University study, managing employee cyber risk is essential for your organization to steer clear of a user-related data breach and to demonstrate regulatory compliance.

Security Awareness is more than just checking the box, it’s about changing behaviors within your organization. And with more employees working remotely, either sometimes or routinely, the increase of cyber threats makes them and your organization more vulnerable. 

CoNetrix and Lubbock Christian University are teaming up to provide you with practical cybersicurity training that inform best practices for any organization with employees who conduct business digitally.


Scott J. Warren, Ph.D.
Department of Learning Technologies
University of North Texas

Scott Warren is a Professor of Learning Technologies in the College of Information at the University of North Texas. He has studied the design and ethical use of learning with innovative technologies such as games and simulations in complex education and training contexts for more than 20 years. As part of this work, he co-developed the Ethical Choices with Educational Technology frameworks for use in the evaluation of potential information technology adoption for training, instruction, and learning design. As a researcher in logistics and operations management, his research also includes how stakeholders employ systemic evaluation approaches with business firms as part of improving organizational learning and performance improvement through gains to efficiency and effectiveness with information technology adoption. His recent NSF-grant-funded work examines the use of sensor suites and eye-tracking data to inform how best to engage in cognitive load reduction for workers in complex warehouse environments containing autonomous robots, artificial intelligence tools, and extended reality device.

“Balancing Innovation and Security: AI and Cybersecurity in Policy and Practice”

Artificial intelligence (AI) has the potential to revolutionize the way we work and live, but it also poses new cybersecurity challenges. As AI becomes more accessible to everyone, including criminals, we need to develop new policies and practices to protect ourselves.

In this session, we will discuss the following:

  • The opportunities of AI to support radical innovation in the workplace, research, and education
  • The inherent risks of AI, such as AI hallucinations, malicious code injections, and data hostage-taking
  • How to balance the value of AI for innovation with the challenges it poses to organizational security
  • How to create policies and practices that allow users to benefit from AI tools while also protecting them from exploitation

Benjamin (BJ) Taylor, CISA, CISSP
Compliance and Security Consultant

Benjamin has always been fascinated by the interactions of people, how life is perceived, and how both internal and external factors impact people's actions.  He earned a B.B.A in Accounting and an M.Ed in Educational Leadership.  He has spent time as a Teacher, Administrator, and an Auditor before becoming the Training Manager for CoNetrix Security.

Kaua Pickett, (ISC)2 Certified in Cybersecurity
Security Support Technician

While earning her BA in Mathematics, Kaua worked at the campus IT support desk and explored potential careers in IT through summer internships. While she spent time working in IT support and data analytics, she landed on cybersecurity and now works in CoNetrix Security where she serves as a Security Support Technician. In this role, she assists with security audits, penetration tests, and training of entry-level staff. In her free time, she enjoys cooking, tinkering, and solving mystery games.

"More Than Phish in the Sea: Social Engineering"

You’ve been told time and time again “don’t click that link,” but what about “don’t answer that quiz,” or “don’t post that picture.” These are just some of the ways that bad actors are getting information about you so they can hack into your business. In this session, Kaua and BJ will explore various forms of social engineering, what makes them successful, and ways to protect yourself, your loved ones, and your business from social engineering attacks.

Jeff Mustin

With a career spanning multiple sectors, Jeff Mustin is a seasoned professional at the intersection of real-world security experience and academic expertise.

Jeff's journey began as an F-16 pilot in the U.S. Air Force, where he gained invaluable insights into strategy and execution. Afterwards, he worked at Northrop Grumman, a leading global security company, and taught Cybersecurity Law and Policy as an Adjunct Professor at Texas Tech University’s School of Law.

Today, Jeff serves as an entrepreneur and strategist at CAS Labs, LLC, a strategy and innovation consulting firm. Founded in 2015, CAS Labs fuses real-world expertise with academic insight, setting a standard for excellence in the field. CAS Labs seeks to serve both the nation and the private sector in diverse and impactful ways by addressing complex challenges in the cybersecurity landscape and beyond. warehouse environments containing autonomous robots, artificial intelligence tools, and extended reality device.

Continental breakfast will be provided by CoNetrix.