Sponsors

 

No albums to show

 

Follow Us

Upcoming events

Menu
Log in

nATIONAL cYBERSECURITY sTUDENT aSSOCIATION


STUDENT SPOTLIGHT

Research Paper
on Artificial Intelligence in Cybersecurity
SP25

Michael Twining
Cybersecurity Undergraduate, Utica University

Michael Twining is a cybersecurity professional driven by an insatiable appetite to solve complex challenges, understand intricate systems, and leverage his knowledge to make the world a safer place. He is set to graduate with a Bachelor of Science in Cybersecurity, specializing in Cyber Operations, from Utica University in May 2025 and holds industry certifications, including CompTIA Security+ and ISC2 Certified in Cybersecurity. Though his professional journey began outside the traditional IT and information security domains, Michael’s determination and perseverance have positioned him towards excelling in the cybersecurity field. His passion for expanding his expertise has led him to explore various domains within cybersecurity, continuously pushing himself to develop new skills and stay ahead of evolving threats.

Outside of his professional and academic pursuits, Michael enjoys playing piano, gaming on PlayStation, kayaking, hiking, and taking long walks. He firmly believes that if one has the ability to make things better, it is both a moral and professional obligation to do so. This ethos drives his active participation in community initiatives, including volunteering as a scholarship review panelist for the Center for Cyber Safety and Education. Additionally, Michael was recently invited to attend the prestigious US Cyber Camp hosted by the US Cyber Challenge, further demonstrating his commitment to personal and professional growth in the field of cybersecurity.

Download the Research paper HERE
Check out the presentation recording on YouTube.
AI in Cybersecurity | LLM and ML Algorithm Vulnerabilities



This material is based on work supported by the National Science Foundation (NSF) under Grant Number DUE-1204533DUE-1601150, and DUE-2054753Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of NSF.

© 2025 National CyberWatch Center PRIVACY POLICY / TERMS OF USE



Powered by Wild Apricot Membership Software