{"id":546,"date":"2026-02-16T16:13:00","date_gmt":"2026-02-16T21:13:00","guid":{"rendered":"https:\/\/sites.udmercy.edu\/cyberclub\/?p=546"},"modified":"2026-03-26T16:19:55","modified_gmt":"2026-03-26T20:19:55","slug":"02-16-26-cybersecurity-consulting-speaker-udm-alum-john-boyak-returns02-16-26","status":"publish","type":"post","link":"https:\/\/sites.udmercy.edu\/cyberclub\/2026\/02\/16\/02-16-26-cybersecurity-consulting-speaker-udm-alum-john-boyak-returns02-16-26\/","title":{"rendered":"02\/16\/26 &#8211; Cybersecurity Consulting Speaker: UDM Alum John Boyak Returns02\/16\/26 &#8211;"},"content":{"rendered":"\n<p>At our February meeting, we welcomed John Boyak, UDM alum and current cybersecurity consultant at Plante Moran, as our guest speaker. John shared his expertise in conducting security audits and supporting digital forensics engagements, offering members valuable insights into the consulting side of cybersecurity and what a career on that path really looks like. His presentation covered the day-to-day realities of working as a cybersecurity consultant at a major firm, including how engagements are scoped, what clients expect, and the skills that matter most on the job.<\/p>\n\n\n\n\t<div class='ngg-imagebrowser default-view'\n\t\tid='ngg-imagebrowser-f8907915d4ef841098ea7f4799e2286c-546'\n\t\tdata-nextgen-gallery-id=\"f8907915d4ef841098ea7f4799e2286c\">\n\n\t\t<h3>Group Photo<\/h3>\n\n\t\t<div id=\"ngg-image-0\" class=\"pic\" \n\t\t\t\t\t>\n\t\t<a href='https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/cybersecurity-consulting\/IMG_20260219_134727.jpg'\n\t\t\ttitle='Photo with all officers, members, and the speaker'\n\t\t\tdata-src=\"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/cybersecurity-consulting\/IMG_20260219_134727.jpg\"\n\t\t\tdata-thumbnail=\"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/cybersecurity-consulting\/thumbs\/thumbs-IMG_20260219_134727.jpg\"\n\t\t\tdata-image-id=\"140\"\n\t\t\tdata-title=\"Group Photo\"\n\t\t\tdata-description=\"Photo with all officers, members, and the speaker\"\n\t\t\tclass=\"ngg-simplelightbox\" rel=\"f8907915d4ef841098ea7f4799e2286c\">\n\t\t\t<img title='Group Photo'\n\t\t\t\talt='Group Photo'\n\t\t\t\tsrc='https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/cybersecurity-consulting\/IMG_20260219_134727.jpg'\/>\n\t\t<\/a>\n\t\t\n\t\t<\/div>\n\t\t<div class='ngg-imagebrowser-nav'>\n\n\t\t\t<div class='back'>\n\t\t\t\t<a class='ngg-browser-prev'\n\t\t\t\t\tid='ngg-prev-142'\n\t\t\t\t\thref='https:\/\/sites.udmercy.edu\/cyberclub\/2026\/02\/16\/02-16-26-cybersecurity-consulting-speaker-udm-alum-john-boyak-returns02-16-26\/nggallery\/image\/img_9701\/'>\n\t\t\t\t\t<i class=\"fa fa-chevron-left\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class='next'>\n\t\t\t\t<a class='ngg-browser-next'\n\t\t\t\t\tid='ngg-next-141'\n\t\t\t\t\thref='https:\/\/sites.udmercy.edu\/cyberclub\/2026\/02\/16\/02-16-26-cybersecurity-consulting-speaker-udm-alum-john-boyak-returns02-16-26\/nggallery\/image\/img_9647\/'>\n\t\t\t\t\t<i class=\"fa fa-chevron-right\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class='counter'>\n\t\t\t\tImage\t\t\t\t1\t\t\t\tof\t\t\t\t3\t\t\t<\/div>\n\n\t\t\t<div class='ngg-imagebrowser-desc'>\n\t\t\t\t<p>Photo with all officers, members, and the speaker<\/p>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<p>We thank John for taking the time to return to campus and share his experience with current students.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At our February meeting, we welcomed John Boyak, UDM alum and current cybersecurity consultant at Plante Moran, as our guest speaker. John shared his expertise &hellip;<\/p>\n","protected":false},"author":699,"featured_media":552,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":142},"categories":[8],"tags":[],"jetpack_featured_media_url":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/2026\/03\/nggallery_import\/IMG_9701.JPG","_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/546"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/users\/699"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/comments?post=546"}],"version-history":[{"count":1,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/546\/revisions"}],"predecessor-version":[{"id":551,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/546\/revisions\/551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media\/552"}],"wp:attachment":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media?parent=546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/categories?post=546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/tags?post=546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}