SlideShare a Scribd company logo
1 of 10
Download to read offline
DIATOMIC Cybersecurity
School of Information Technology:
– Mark Stockman
School of Criminal Justice:
– Joe Nedelec
– Bill Mackey
Proactive prevention and protection -
Empirically driven team adding human behavior
to cyber.
1
DIATOMIC Services
Behavioral Cyberthreat Assessment
– Identify risk at multiple levels
Organization, department, individual
– Non-malicious behavior
Behavioral Cyberthreat Mitigation
– Customized risk reduction strategies
– Incentivize best practice
2
Behavior/Decisions
Behavior/Decisions
3
2015 Verizon Data Breach Investigations Report
Non-malicious Insider Risk
4
Intermedia 2015 Insider Risk ReportIntermedia’s 2015 Insider Risk Report looks at the
security habits of 2000+ office workers according
to age, role, industry and other groupings.
The findings fly in the face of conventional
wisdom: the most tech-savvy employees are the
ones most likely to create risk.
SecuriSync,*Intermedia*AppID,*HostPilot,*and*Office*in*the*Cloud*are*either*registered*trademarks*or*trademarks*of*Intermedia.net,*Inc.*in*the*United*States*
and/or*other*countries. Office*365,*OneNote,*and*Active*Directory*are*either*registered*trademarks*or*trademarks*of*Microsoft*Corporation*in*the*United*
States*and/or*other*countries.*Google*Analytics,* Google*Apps*are,*Google*Drive,*and*Google*Keep*are*either*registered*trademarksor*trademarks*of*Google*
Inc. Intuit*and*QuickBooks*are*registered*trademarks*of*Intuit*Inc. McAfee*is*a*trademark*or*registered*trademark*of*McAfee,*Inc.*in*the*United*States*and*
other*countries.*Imperium,*RelevantID,*and*Verity*are*either*registered*trademarks*or*trademarks*of*Imperium*LLC*in*the*United*States*and/or*other*countries.
Participated in shadow IT?
5
Intermedia 2015 Insider Risk Report
$
41%
27%
59%
73%
IT Professionals All Respondents
Is it OK to install applications on your
computer without consulting IT?
Yes No
Analyze and Affect Behavior
 DIATOMIC Breach Database
 Employee surveys/interviews
 Vulnerability reports*
 IT/Info Sec policies*
6
DIATOMIC Services
Behavioral Cyberthreat Assessment
– Identify risk at multiple levels
Organization, department, individual
– Non-malicious behavior
Behavioral Cyberthreat Mitigation
– Customized risk reduction strategies
– Incentivize best practice
7
Mark Stockman is an Associate Professor at the University of Cincinnati serving as a
faculty member in the School of Information Technology teaching networking, systems,
and cybersecurity courses. His research interests include systems administration, server
virtualization, cloud computing management, and IT pedagogy. With recent study of
traditional criminology and crime prevention, his current research focusses on
cybersecurity. Specifically, Mark is investigating the applicability of criminological theories
in the digital realm or cybercrime science. Mr. Stockman is the former Chair of the ACM
Special Interest Group for Information Technology Education (SIGITE), a community that
has defined IT as an academic discipline; and is also now active in a similar effort for the
cyber sciences, the Cyber Education Project (CEP). Along with industry experience prior
to becoming a professor, he holds a BS in Industrial and Systems Engineering from Ohio
University, Russ College of Engineering and Technology, and an MBA from Ohio
University, College of Business. – mark.stockman@uc.edu
8
Joe Nedelec is an Assistant Professor at the University of Cincinnati in the prestigious
School of Criminal Justice. He received his undergraduate degrees (criminology and
psychology) and his master’s degree (criminology) from Simon Fraser University in
Burnaby, British Columbia. His doctoral degree (criminology) was received from Florida
State University. Dr. Nedelec’s primary research interests lie within biosocial criminology,
with specific focus on evolutionary psychology, life-history theory, digit ratio, and
behavioral genetics. He has published articles on biosocial criminology in a variety of
journals including Child Psychiatry and Human Development, Criminology, Evolution and
Human Behavior, Intelligence, Journal of Criminal Justice, Personality and Individual
Differences, and others. He has also incorporated topics related to cybercrime and
cyber-security into his research agenda and has a secondary appointment with the
School of Information Technology at UC. Dr. Nedelec teaches in the areas of life-
course/developmental criminology, cybercrime, research methods, and statistics. He is
also co-founder and current Vice President of the Biosocial Criminology Association
(www.biosocialcrim.org). – joseph.nedelec@uc.edu
9
Bill Mackey is a doctoral student at the University of Cincinnati. His research interests
include: cybercriminology, social engineering, technological advances in crime and crime
prevention, white-collar crime, and criminological theory. Bill’s current research is focused
on correlates of human behavior in data breaches and the application of criminological
theory to cybercrime and breach prevention. Bill has published works in the areas of
social engineering, advanced crime prevention technologies, and individual differences in
both white-collar offenders and hackers. Mr. Mackey is a member of the Cincinnati Bell
Digital Forensics Working Group, the National White-Collar Crime Research Consortium,
and the American Society of Criminology. He received a dual bachelor’s degree in
psychology and criminology from Iowa State University, a master’s degree in criminology
from Indiana State University, and is currently finishing his Ph.D. in criminology at the
University of Cincinnati. – william.mackey@uc.edu
10

More Related Content

What's hot

Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsMEDEA Awards
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neriaejay_neri
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]Videoguy
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safelyAlexander Decker
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 

What's hot (20)

Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
 
ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Cybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and ManagersCybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and Managers
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Jenevie
JenevieJenevie
Jenevie
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 

Viewers also liked

Predict future-make-decision
Predict future-make-decisionPredict future-make-decision
Predict future-make-decisionderosaMSKCC
 
මාස-60-කින-අලුත-රටක
මාස-60-කින-අලුත-රටකමාස-60-කින-අලුත-රටක
මාස-60-කින-අලුත-රටකsinhalasongs
 
Entrenamiento aerobico da menos calorias
Entrenamiento aerobico da menos caloriasEntrenamiento aerobico da menos calorias
Entrenamiento aerobico da menos caloriasJavier Capucho Cardenas
 
portfolio Ellen basisschoollessen
portfolio Ellen basisschoollessenportfolio Ellen basisschoollessen
portfolio Ellen basisschoollessenEllenWelschen
 
Central Park Fleur Villas
Central Park Fleur VillasCentral Park Fleur Villas
Central Park Fleur VillasManish Kumar
 
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)Anna Riyell de Lara
 
LTspice getting started guide [2011]
LTspice getting started guide [2011]LTspice getting started guide [2011]
LTspice getting started guide [2011]Sunu Pradana
 
Panel 2 - Goods & Services Tax (GST)
Panel 2 - Goods & Services Tax (GST)Panel 2 - Goods & Services Tax (GST)
Panel 2 - Goods & Services Tax (GST)taxsutra
 
Benami transaction amendments comparison 2016
Benami transaction amendments comparison 2016 Benami transaction amendments comparison 2016
Benami transaction amendments comparison 2016 GAURAV KR SHARMA
 
Penggunaan layanan Google
Penggunaan layanan GooglePenggunaan layanan Google
Penggunaan layanan GoogleSunu Pradana
 

Viewers also liked (17)

Predict future-make-decision
Predict future-make-decisionPredict future-make-decision
Predict future-make-decision
 
මාස-60-කින-අලුත-රටක
මාස-60-කින-අලුත-රටකමාස-60-කින-අලුත-රටක
මාස-60-කින-අලුත-රටක
 
scilab
scilabscilab
scilab
 
jhkj
jhkjjhkj
jhkj
 
Observaciones sobre la Prueba Nacional...
Observaciones sobre la Prueba Nacional...Observaciones sobre la Prueba Nacional...
Observaciones sobre la Prueba Nacional...
 
Entrenamiento aerobico da menos calorias
Entrenamiento aerobico da menos caloriasEntrenamiento aerobico da menos calorias
Entrenamiento aerobico da menos calorias
 
Lima-Zarate
Lima-ZarateLima-Zarate
Lima-Zarate
 
Trust Issues
Trust IssuesTrust Issues
Trust Issues
 
portfolio Ellen basisschoollessen
portfolio Ellen basisschoollessenportfolio Ellen basisschoollessen
portfolio Ellen basisschoollessen
 
Central Park Fleur Villas
Central Park Fleur VillasCentral Park Fleur Villas
Central Park Fleur Villas
 
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)
Anna Riyell A. de Lara (Quantity Surveyor) - (10.1.16)
 
Aquaponics Egypt
Aquaponics EgyptAquaponics Egypt
Aquaponics Egypt
 
LTspice getting started guide [2011]
LTspice getting started guide [2011]LTspice getting started guide [2011]
LTspice getting started guide [2011]
 
Office of CFO
Office of CFOOffice of CFO
Office of CFO
 
Panel 2 - Goods & Services Tax (GST)
Panel 2 - Goods & Services Tax (GST)Panel 2 - Goods & Services Tax (GST)
Panel 2 - Goods & Services Tax (GST)
 
Benami transaction amendments comparison 2016
Benami transaction amendments comparison 2016 Benami transaction amendments comparison 2016
Benami transaction amendments comparison 2016
 
Penggunaan layanan Google
Penggunaan layanan GooglePenggunaan layanan Google
Penggunaan layanan Google
 

Similar to Alloy Cybersecurity Intro

System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Cyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensCyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensRenee Franco
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxtodd241
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos Isaris
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Angel Rodriguez
 

Similar to Alloy Cybersecurity Intro (20)

System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Cyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensCyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On Teens
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
CyberCrime Essay
CyberCrime EssayCyberCrime Essay
CyberCrime Essay
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 

Recently uploaded

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Recently uploaded (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

Alloy Cybersecurity Intro

  • 1. DIATOMIC Cybersecurity School of Information Technology: – Mark Stockman School of Criminal Justice: – Joe Nedelec – Bill Mackey Proactive prevention and protection - Empirically driven team adding human behavior to cyber. 1
  • 2. DIATOMIC Services Behavioral Cyberthreat Assessment – Identify risk at multiple levels Organization, department, individual – Non-malicious behavior Behavioral Cyberthreat Mitigation – Customized risk reduction strategies – Incentivize best practice 2
  • 4. Non-malicious Insider Risk 4 Intermedia 2015 Insider Risk ReportIntermedia’s 2015 Insider Risk Report looks at the security habits of 2000+ office workers according to age, role, industry and other groupings. The findings fly in the face of conventional wisdom: the most tech-savvy employees are the ones most likely to create risk. SecuriSync,*Intermedia*AppID,*HostPilot,*and*Office*in*the*Cloud*are*either*registered*trademarks*or*trademarks*of*Intermedia.net,*Inc.*in*the*United*States* and/or*other*countries. Office*365,*OneNote,*and*Active*Directory*are*either*registered*trademarks*or*trademarks*of*Microsoft*Corporation*in*the*United* States*and/or*other*countries.*Google*Analytics,* Google*Apps*are,*Google*Drive,*and*Google*Keep*are*either*registered*trademarksor*trademarks*of*Google* Inc. Intuit*and*QuickBooks*are*registered*trademarks*of*Intuit*Inc. McAfee*is*a*trademark*or*registered*trademark*of*McAfee,*Inc.*in*the*United*States*and* other*countries.*Imperium,*RelevantID,*and*Verity*are*either*registered*trademarks*or*trademarks*of*Imperium*LLC*in*the*United*States*and/or*other*countries.
  • 5. Participated in shadow IT? 5 Intermedia 2015 Insider Risk Report $ 41% 27% 59% 73% IT Professionals All Respondents Is it OK to install applications on your computer without consulting IT? Yes No
  • 6. Analyze and Affect Behavior  DIATOMIC Breach Database  Employee surveys/interviews  Vulnerability reports*  IT/Info Sec policies* 6
  • 7. DIATOMIC Services Behavioral Cyberthreat Assessment – Identify risk at multiple levels Organization, department, individual – Non-malicious behavior Behavioral Cyberthreat Mitigation – Customized risk reduction strategies – Incentivize best practice 7
  • 8. Mark Stockman is an Associate Professor at the University of Cincinnati serving as a faculty member in the School of Information Technology teaching networking, systems, and cybersecurity courses. His research interests include systems administration, server virtualization, cloud computing management, and IT pedagogy. With recent study of traditional criminology and crime prevention, his current research focusses on cybersecurity. Specifically, Mark is investigating the applicability of criminological theories in the digital realm or cybercrime science. Mr. Stockman is the former Chair of the ACM Special Interest Group for Information Technology Education (SIGITE), a community that has defined IT as an academic discipline; and is also now active in a similar effort for the cyber sciences, the Cyber Education Project (CEP). Along with industry experience prior to becoming a professor, he holds a BS in Industrial and Systems Engineering from Ohio University, Russ College of Engineering and Technology, and an MBA from Ohio University, College of Business. – mark.stockman@uc.edu 8
  • 9. Joe Nedelec is an Assistant Professor at the University of Cincinnati in the prestigious School of Criminal Justice. He received his undergraduate degrees (criminology and psychology) and his master’s degree (criminology) from Simon Fraser University in Burnaby, British Columbia. His doctoral degree (criminology) was received from Florida State University. Dr. Nedelec’s primary research interests lie within biosocial criminology, with specific focus on evolutionary psychology, life-history theory, digit ratio, and behavioral genetics. He has published articles on biosocial criminology in a variety of journals including Child Psychiatry and Human Development, Criminology, Evolution and Human Behavior, Intelligence, Journal of Criminal Justice, Personality and Individual Differences, and others. He has also incorporated topics related to cybercrime and cyber-security into his research agenda and has a secondary appointment with the School of Information Technology at UC. Dr. Nedelec teaches in the areas of life- course/developmental criminology, cybercrime, research methods, and statistics. He is also co-founder and current Vice President of the Biosocial Criminology Association (www.biosocialcrim.org). – joseph.nedelec@uc.edu 9
  • 10. Bill Mackey is a doctoral student at the University of Cincinnati. His research interests include: cybercriminology, social engineering, technological advances in crime and crime prevention, white-collar crime, and criminological theory. Bill’s current research is focused on correlates of human behavior in data breaches and the application of criminological theory to cybercrime and breach prevention. Bill has published works in the areas of social engineering, advanced crime prevention technologies, and individual differences in both white-collar offenders and hackers. Mr. Mackey is a member of the Cincinnati Bell Digital Forensics Working Group, the National White-Collar Crime Research Consortium, and the American Society of Criminology. He received a dual bachelor’s degree in psychology and criminology from Iowa State University, a master’s degree in criminology from Indiana State University, and is currently finishing his Ph.D. in criminology at the University of Cincinnati. – william.mackey@uc.edu 10