DIATOMIC is a team from the University of Cincinnati that provides cybersecurity services focused on analyzing human behavior to assess and mitigate cybersecurity risks. The team includes Mark Stockman from the School of Information Technology, Joe Nedelec and Bill Mackey from the School of Criminal Justice. DIATOMIC's services involve identifying cybersecurity risks at multiple levels of an organization based on non-malicious employee behavior. They then develop customized strategies to incentivize best practices and reduce risks.
Empowering Africa's Next Generation: The AI Leadership Blueprint
Alloy Cybersecurity Intro
1. DIATOMIC Cybersecurity
School of Information Technology:
– Mark Stockman
School of Criminal Justice:
– Joe Nedelec
– Bill Mackey
Proactive prevention and protection -
Empirically driven team adding human behavior
to cyber.
1
4. Non-malicious Insider Risk
4
Intermedia 2015 Insider Risk ReportIntermedia’s 2015 Insider Risk Report looks at the
security habits of 2000+ office workers according
to age, role, industry and other groupings.
The findings fly in the face of conventional
wisdom: the most tech-savvy employees are the
ones most likely to create risk.
SecuriSync,*Intermedia*AppID,*HostPilot,*and*Office*in*the*Cloud*are*either*registered*trademarks*or*trademarks*of*Intermedia.net,*Inc.*in*the*United*States*
and/or*other*countries. Office*365,*OneNote,*and*Active*Directory*are*either*registered*trademarks*or*trademarks*of*Microsoft*Corporation*in*the*United*
States*and/or*other*countries.*Google*Analytics,* Google*Apps*are,*Google*Drive,*and*Google*Keep*are*either*registered*trademarksor*trademarks*of*Google*
Inc. Intuit*and*QuickBooks*are*registered*trademarks*of*Intuit*Inc. McAfee*is*a*trademark*or*registered*trademark*of*McAfee,*Inc.*in*the*United*States*and*
other*countries.*Imperium,*RelevantID,*and*Verity*are*either*registered*trademarks*or*trademarks*of*Imperium*LLC*in*the*United*States*and/or*other*countries.
5. Participated in shadow IT?
5
Intermedia 2015 Insider Risk Report
$
41%
27%
59%
73%
IT Professionals All Respondents
Is it OK to install applications on your
computer without consulting IT?
Yes No
8. Mark Stockman is an Associate Professor at the University of Cincinnati serving as a
faculty member in the School of Information Technology teaching networking, systems,
and cybersecurity courses. His research interests include systems administration, server
virtualization, cloud computing management, and IT pedagogy. With recent study of
traditional criminology and crime prevention, his current research focusses on
cybersecurity. Specifically, Mark is investigating the applicability of criminological theories
in the digital realm or cybercrime science. Mr. Stockman is the former Chair of the ACM
Special Interest Group for Information Technology Education (SIGITE), a community that
has defined IT as an academic discipline; and is also now active in a similar effort for the
cyber sciences, the Cyber Education Project (CEP). Along with industry experience prior
to becoming a professor, he holds a BS in Industrial and Systems Engineering from Ohio
University, Russ College of Engineering and Technology, and an MBA from Ohio
University, College of Business. – mark.stockman@uc.edu
8
9. Joe Nedelec is an Assistant Professor at the University of Cincinnati in the prestigious
School of Criminal Justice. He received his undergraduate degrees (criminology and
psychology) and his master’s degree (criminology) from Simon Fraser University in
Burnaby, British Columbia. His doctoral degree (criminology) was received from Florida
State University. Dr. Nedelec’s primary research interests lie within biosocial criminology,
with specific focus on evolutionary psychology, life-history theory, digit ratio, and
behavioral genetics. He has published articles on biosocial criminology in a variety of
journals including Child Psychiatry and Human Development, Criminology, Evolution and
Human Behavior, Intelligence, Journal of Criminal Justice, Personality and Individual
Differences, and others. He has also incorporated topics related to cybercrime and
cyber-security into his research agenda and has a secondary appointment with the
School of Information Technology at UC. Dr. Nedelec teaches in the areas of life-
course/developmental criminology, cybercrime, research methods, and statistics. He is
also co-founder and current Vice President of the Biosocial Criminology Association
(www.biosocialcrim.org). – joseph.nedelec@uc.edu
9
10. Bill Mackey is a doctoral student at the University of Cincinnati. His research interests
include: cybercriminology, social engineering, technological advances in crime and crime
prevention, white-collar crime, and criminological theory. Bill’s current research is focused
on correlates of human behavior in data breaches and the application of criminological
theory to cybercrime and breach prevention. Bill has published works in the areas of
social engineering, advanced crime prevention technologies, and individual differences in
both white-collar offenders and hackers. Mr. Mackey is a member of the Cincinnati Bell
Digital Forensics Working Group, the National White-Collar Crime Research Consortium,
and the American Society of Criminology. He received a dual bachelor’s degree in
psychology and criminology from Iowa State University, a master’s degree in criminology
from Indiana State University, and is currently finishing his Ph.D. in criminology at the
University of Cincinnati. – william.mackey@uc.edu
10