SlideShare a Scribd company logo
1 of 7
1
Curriculum Vita
Connie Justice, D.Sc.
Email: cjustice(at)iupui(dot)edu
Phone: 317 752-3544
EDUCATION
D.Sc. 2015 Cybersecurity, Capitol Technology University, Laurel,
Maryland
MIS 2004 Information Science, Indiana University,
Bloomington, Indiana
GRAD CERT 2003 Information Assurance,Purdue University,West
Lafayette,Indiana
B.S.E.E. 1997 Purdue School of Engineering and Technology,
IUPUI,Indianapolis, Indiana
1980-1982 United States NavalAcademy,Annapolis, Maryland
OTHER EDUCATION
US ARMY 1990 Officer PersonnelManagement Course
GEORGIA
MILITARY
ACADEMY
1989 Officer Candidate School (Top 10%)
US ARMY 1984. Communications Security Equipment Course and Field System
Communications Security Course
US NAVY 1979 NavalAcademy Preparatory School
PROFESSIONALCERTIFICATIONS
Accessdata Mobile Examiner® 2012
Accessdata Certified Examiner® (ACE®) 2011
Certified Information Systems Security Professional (CISSP®) # 111852 2007
Certified Handheld Examiner 2007
Cisco Certified Network Administrator (CCNA). 2001
Microsoft Certified Systems Engineer (MCSE) 1998
A+ Certification 1996
Certified NetWare Administrator (CNA) 1996
PROFESSIONALAFFILIATIONS
Society for Information Management 2015-present
InfraGard, Federal Bureau of Investigation (FBI) program. 2008-present
American Society of Engineering Education (ASEE) 2007-present
Women in Technology 2007-present
The International Information Systems Security Certification
Consortium, Inc. (ISC2).
2007-present
Information Systems Security Association (ISSA) 2005-present
AWARDS AND HONORS
Senior Advisor, Cyber Security Advisory Board Simon Property Group, L.P March 2016-present
Outstanding Educator in Science, Technology or
Engineering
Women & Hi Tech Nominated 2014
Faculty Colloquium on Excellence in Teaching
(FACET)
Indiana University May 2010
Teaching Excellence Recognition Award Indiana University April 2004
PROFESSIONAL APPOINTMENTS AND ENGAGEMENT
ACADEMICAPPOINTMENTS
Clinical Associate Professor, 2014 to present,Computer Information and Graphics
Technology, Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN.
Clinical Assistant Professor, 2005 – 2014 – Computer Information and Graphics
Technology, Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN.
Technical Assistance Program (TAP), 2004 to present – Purdue University, West
Lafayette,IN.
Faculty, Center for Education in Information Assurance and Security (CERIAS), 2004
to present - Purdue University, West Lafayette,IN.
Visiting Clinical Assistant Professor, 2004-2005- Department of Computer and
Information Technology, Purdue School of Engineering and Technology, IUPUI,
Indianapolis, IN.
Research Associate, 2000-2004- Department of Computer and Information Technology,
Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN.
PROFESSIONALENGAGEMENT
Consultant, 1997 – Present- Justice Technologies
- Cybersecurity Strategy
o Consult on information assurance and risk assessments;
o Consult on cybersecurity strategies that increased the ability to withstand cyber-attacks;
o Produce risk assessments for various industries including healthcare,manufacturing, and
retail;
o Perform gap analysis for information and cybersecurity programs;
o Perform risk assessments and risk audits;
o Produce executive roadmaps for technology and process improvements.
- Executive and C-Suite Collaborations
o Provide guidance on cybersecurity risk, governance,and incident response as it relates
to complex technical, administrative, and physical security issues;
o Design cybersecurity education, training, and awarenessfor c-suite,executives,and
employees;
o Conduct cybersecurity education, training, and awareness for c-suite,executives,and
employees.
o Project Manage projects related to cybersecurity,risk management, and auditing;
o Formal risk management framework design and implementation to include: NIST,
HIPAA,PCI,and COBIT,and NIST Cybersecurity Framework.
Health Engineer, January 2007-May 2007-Veterans Administration, Indianapolis, IN
Lean Six Sigma Project: File Room Processing 100 Day Project
o Determined the legitimate needs for paper charts (voice of the customer analysis) and then
determine ways to meet these needs without storing paper charts on site (if possible)
o Determined what hard copy patient records could be eliminated with improved business
processes and enhanced use of the electronic health record (EHR); implement these
Developed detailed plans to include timelines and resources required for the removal of all
stored paper patient records
o Developed a system for timely retrieval of archived charts (e.g.,overnight vs. regular
mail)
IT Systems Manager, 2000-2003-Schmidt Associates, Indianapolis, IN
o Managed the IT budgets and expenditure on hardware and software.
o Developed & maintained company IT systems,software and databases. Recommended
and implemented improvements and efficiencies.
o Managed technical staff.
o Responsible for hardware and software installation, maintenance and repair.
o Reported to the Chief Financial Officer & Chief Executive Officer.
o Excellent time management,confidentiality & communication skills. Strong IT,
commercial, planning and budgeting skills.
o Managed server software and associated backup routines.
o Procured IT hardware, software and maintenance products & services. Responsible for the
recruitment and training of new staff.
o Managed the internal & hosted network infrastructure including: firewalls, servers,
switches and telephony.
DOCTORAL AND MASTERS MENTORING
Title Scholar Level Role Year
Meeting payment card industry data
security standards: Case study of a
college bookstore
Randall Magiera Doctoral Chair 2015-2016
Forenzix: An open source dynamic
malware analysis and digital
forensics tool
Nicholas Novotny Masters Chair 2014-2016
Improving administrative usability
of Jagwarz
Vicky Smith Masters Chair 2013-2015
How to improve processes using
student’s perspective: A case study
of the Living Lab
Liem Do Masters Chair 2011-2013
A phenomenological study of the
security of clinical research as
perceived by clinical researchers
Eric Schmidt Masters Chair 2011-2013
The utility and durability of skills
gained from an experiential
learning course in information
technology
Twila Dowell Masters Chair 2010-2012
The use of agile development
techniques in the small business
Tim Young Masters Member 2010-2012
PROFESSIONAL DEVELOPMENT
Course/Workshop Title Provider Date
Publishing Your Dissertation
Defcon Security Conference
Academic Coaching and Writing
DerbyCon, Louisville, KY
2015
2012
Internet Forensics SANS 2012
SANS Auditing Networks,
Perimeters,and Systems
SANS 2011
Digital Forensics Bootcamp Accessdata 2011
The Spy in my Pocket: A View to a
Kill - Attacks on Mobile Devices and
Users
SANS 2011
Certified Computer Examiner, Falls Church, Virginia 2011
Information Assurance and Security
Ethics Workshop
Purdue University, West Lafayette 2010
Cyber Games Workshop II, University of North Carolina Charlotte 2009
Community of Practice on the
Scholarship of Teaching and Learning
of Instructional Technology Impact
IUPUI 2006-2008
Cyber Games Workshop University of North Carolina at
Charlotte
2008
Mobile Forensics World Conference Chicago, IL 2008
Information Systems Auditor ISACA 2006
Administering MS SQL Server 2000
Database
Microsoft 2002
Upgrading Web Developing Skills
from ASP to MS ASP.NET
Microsoft 2002
Introduction to Cisco Router
Configuration (ICRC)
Cisco 1998
Sun Systems Administration Course Sun Microsystems 1997
Sun Systems Repair Course Sun Microsystems 1997
CURRICULUM ANDPROGRAMS CREATED
PROGRAMS CREATED
IT Academy,http://livlab.org/itacademy/ , a technology training environment. Started in 2012 as a pilot program to
develop into a self-sustaining business. Presently the IT Academy has become an official Pearson Vue testing
center and has hosted one classroom CompTIA course and one online CompTIA course.
The “Living Lab,” http://livlab.org,an IT experiential learning clinic, started in 2001. Students have the
opportunity to work on projects for clients such as Simon Property Group, L.P.,Horizon House, Indiana Youth
Group, Indiana Department of Natural Resources,UITS, IUPUI Surplus, and the Living Lab (LL) itself, which
serves as the backbone of many networking services used by the CIT, CGT and OLS programs within the Purdue
School of Engineering & Technology at IUPUI. Approximately250 projects have been completed in the LL inthe
areas of cybersecurity,database,networking,andwebdesign. Students who complete the Living Lab course
walk away with not only college credit toward their degree,but resume-worthy IT professional experience to
share with potential employers. The unique combination of academic rigor and professional standards and
implementation of business environment policies provide students the opportunity to not only put their newly
acquired skills to the test,but also provides students the much needed exposure to a professional work setting.
Security Track in the Computer and Information Technology B.S. Degree Program,2007.
IT Assessment Center,IUPUI,2005.Offered security and network assessment services,performed by me and
students under my supervision, to small and medium companies and organizations.
Network Security Certificate Program,2004. The Network Security Certificate (NSC) provides information
assurance and security education and training to students and professionals. Information assurance and security
professionals are responsible for the policies and technologies used to safeguard the information systems
infrastructure of a company.
Networking Track in the Computer and Information Technology Degree Program,2003.
GRANTS/FELLOWSHIPS INTEACHING
Title
Granting
Agency
Role Amount Dates
CETA ExF: An Open Source
Cybersecurity Experiential
Framework. Submitted for
consideration to CNS-Secure and
Trustworthy Cyberspace
National
Science
Foundation
(NSF)
PI 300,000
Pending
Dec 2015
Service Learning Course
Development Grant
Indiana
University
PI 3,000
May
2013-
April
2014
Proximity Malware Coping
Schemes in Smartphone-based
Mobile Networks
Indiana
University
Co-PI 3,000
Jan 2011-
Dec. 2011
Service Learning Assistants Indiana
University
PI 1,500
Jan 2011-
Dec.2011
Global Environment for Network
Innovations (GENI) Travel Grant NSF Recipient 2,000 Dec 2011
Establishment of the Indiana Health
Information Technology Extension
Center
Higher
Education
Investigator 19,259
Feb 2010-
March
2011
Boyer's Scholar's Faculty
Development Grant
Indiana
University
PI 5,000 2009-1010
Faculty Podcasting Initiative,
"Interdisciplinary Investigation of
Mobile Broadband Learning in the
21st Century
Indiana
University
/University
Information
Technology
Services (UITS)
Co-PI 7,340
Summer
2008
Engaged School and
Interdisciplinary Community
Partnership Initiatives
E&T, Bill
Conrad
Investigator 13,000 2008
Mobile Forensics in Healthcare
Multidisciplinar
y Undergraduate
Research
Institute
(MURI)
PI 2,000 Fall 2007
George Washington University
(GWU) Information Security Grant
George
Washington
University
PI 30,000
Jan 2006-
Dec 2007
Course Development in
Trustworthy Computing Microsoft PI 50,000
May
2006-May
2008
Wireless Security Assessment Tool
Development MURI Co-PI 3,000 Fall 2006
IT Assessment Center IUPUI Solutions
Center
Co-PI 41,142 2005
IT Risk Assessment Technical and
Non-Technical: Research and
Implementation
MURI PI 4,500 Fall 2005
Information Assurance and Security
Curriculum and Faculty
Development
NSF 0423803 PI 118,312
May
2004-July
2008
GRANTS/FELLOWSHIPS IN SERVICE
Title Granting Agency Role Amount Dates
Technical
Assistance Program
(TAP)
Purdue University, West
Lafayette
PI 70,000 July 2015 - June
2016
Technical
Assistance Program
Purdue University, West
Lafayette
PI 70,000 July 2014-June
2015
Technical
Assistance Program
Purdue University, West
Lafayette
PI 70,000 July 2013-June
2014
Technical
Assistance Program
Purdue University, West
Lafayette
PI 53,000 July 2012 - June
2013
Technical
Assistance Program
Purdue University, West
Lafayette
PI 46, 891 July 2011-June
2012
Technical
Assistance Program
Purdue University, West
Lafayette
PI 46, 891 July 2010-June
2011
Technical
Assistance Program
Purdue University, West
Lafayette
PI 29,336 July 2009-June
2010
Technical
Assistance Program
Purdue University, West
Lafayette
PI 29,236 July 2008-June
2009
Technical
Assistance Program
Purdue University, West
Lafayette
PI 21,699 July 2007-June
2008
Technical
Assistance Program
Purdue University, West
Lafayette
PI 7,902 July 2006-June
2007
PUBLICATIONS
TEACHING
Manuscript
Justice, C. (2015). Learners’ Perceived Efficacy of a Cybersecurity Competition Relating to Job Readiness: A
Qualitative Study (Unpublished doctoral dissertation). Capitol Technology University, Laurel, Maryland.
Refereed Proceedings
Novotny, N.,Jones, J., Rushabh, V.,Balaska, J., Justice, C. (2015, December). Honeypot Network
Forensics. Works-In-Progress Research session presented at the Annual Computer Security Applications
Conference,Los Angeles, CA.
Justice C.F. (2015). Learner’s perceptions of a cybersecurity competition as it relates to knowledge, skills, and
abilities (KSA’s). NICE (National Initiative for Cybersecurity Education) Conference,San Diego, CA.,
November 3-5, 2015. Plenary Panelon Cybersecurity Competitions.
Novotny, N. & Justice C.F. (2015). Hashing algorithms and their use in digital forensicsinvestigations.Workshop
presented at The High Impact Technology Exchange Conference,Portland, Oregon, 27-30 July.
Smith, V. & Justice C.F. (2015). The Living Lab: How to implement an experiential learning laboratory. Workshop
presented at The High Impact Technology Exchange Conference,Portland, Oregon, 27-30 July.
Justice, C. , Fernandez, E., & Do, L. (2013). Utilizing Qualitative Analysis to Determine Effectiveness of The
Living Lab on Graduates, 7th International Technology, Education and Development Conference, March 4-6,
Valencia, Spain.
Justice, C.F., & Do, Liem. (2012). IT Experiential Learning: The Living Lab. Frontiers in Education,October 3-6,
2012, Seattle, Washington.
Justice, C.F. (2011). Project Management in the Living Lab: Merging Industry Best Practices with Experiential
Learning. Society forApplied Learning Technologies,February 15-17, 2012, Orlando, FL.
Dellacca, D. & Justice, C. (2007). Building Tomorrow’s Information Assurance Workforce through Experiential
Learning. Proc. of the 40th Hawaii International Conference on SystemSciences (HICSS-39). doi:
10.1109/HICSS.2007.118 (6 cites in Google Scholar)
Justice, C. & Fernandez, E. (2007). Living Labs: Putting Theory into Practice, Proceedingsof 5th Annual Hawaii
International Conference on Education,January 6-9.
Dark, M., Justice, C.& Morales, L. (2005). A Methodology for Developing and Disseminating Curriculum Resource
Material in Information Security. Colloquium for Information Systems Security Education (CISSE) Conference
Proceedings.
Justice, C. & Fernandez, E. (2004). Developing a Network Security Certificate Program. Proceedings of the Eighth
Interamerican Conference on Engineering and Technology Education (INTERTECH 2004), June 14-18, 2004.
Abstract
Justice, C.F. & Barnes,S. (2013). Integrating IT Business Partnership into Experiential Learning. 2013 Conference
for Industry and Education Collaboration (CIEC),February 6-8, 2013, Phoenix, AZ.
SERVICE
Journal Articles
Russ, A.L.,Saleem, J.J.,Justice C.F., Hagg H., Woodbridge, P.A.,& Doebbeling, B.N. (2010). Electronic Health
Information in Use:Characteristics that Support Employee Workflow and Patient Care, Health Informatics
Journal,16(4),287-305. (7 cites in Google Scholar)
Saleem, J.J.,Russ, A.L.,Justice, C.F., Hagg, H.,Ebright, P.R.,Woodbridge, P.A.,& Doebbeling, B.N. (2009).
Exploring the persistence of paper with the electronic health record. International Journal of Medical
Informatics,78(9),618-628. doi: 10.1016/j.ijmedinf.2009.04.001 (49 cites in Google Scholar)
Refereed Proceedings
Justice, C., Wu, H.,& Walton, E. (2009). Mobile Forensics in Healthcare. Eighth International Conference on
Mobile Business (ICMB 2009), Dalian, China, June 27-28, 255-260. doi: 10.1109/ICMB.2009.51
Russ, A. L., Saleem, J. J., Justice, C. F., Hagg, H.,Woodbridge, P. A.,& Doebbeling, B. N. (2009, October).
Healthcare Workers' Perceptions of Information in the Electronic Health Record. In Proceedings of the Human
Factors and Ergonomics Society Annual Meeting (Vol. 53, No. 11, pp. 635-639). SAGE Publications.
Saleem, J.J.,Russ, A.L.,Justice, C.F., Hagg, H, Woodbridge, P.A. & Doebbeling, B.N. (2008). Paper Use with the
Electronic Medical Record: An Important Supplement or Negative Circumvention? Proceedings of the Human
Factors and Ergonomics Society 52nd Annual Meeting.(3 cites in Google Scholar)

More Related Content

What's hot

SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
IJNSA Journal
 
Resume Tony Welker
Resume Tony WelkerResume Tony Welker
Resume Tony Welker
Tony Welker
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Tammy Clark
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
Wasib Ahmed
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 

What's hot (20)

Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 
CV of IT Security Professional
CV of IT Security ProfessionalCV of IT Security Professional
CV of IT Security Professional
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Resume Tony Welker
Resume Tony WelkerResume Tony Welker
Resume Tony Welker
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno   nisd2013 - transforming cybersecuritySarwono sutikno   nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
 
Charity Winkler
Charity WinklerCharity Winkler
Charity Winkler
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 

Viewers also liked (16)

帛琉五日
帛琉五日帛琉五日
帛琉五日
 
Binary search trees (1)
Binary search trees (1)Binary search trees (1)
Binary search trees (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
20160304埃及10日 直客版
20160304埃及10日 直客版20160304埃及10日 直客版
20160304埃及10日 直客版
 
--**
--**--**
--**
 
環球影城六日
環球影城六日環球影城六日
環球影城六日
 
20131006張家界八日
20131006張家界八日20131006張家界八日
20131006張家界八日
 
Vacante en Director de Ventas - Esri Colombia
Vacante en Director de Ventas - Esri ColombiaVacante en Director de Ventas - Esri Colombia
Vacante en Director de Ventas - Esri Colombia
 
Power point in ped5 herwin
Power point in ped5 herwinPower point in ped5 herwin
Power point in ped5 herwin
 
Slide Da Atividade Educacional
Slide Da Atividade EducacionalSlide Da Atividade Educacional
Slide Da Atividade Educacional
 
Bijoux ronaldo
Bijoux   ronaldoBijoux   ronaldo
Bijoux ronaldo
 
14 recursion
14 recursion14 recursion
14 recursion
 
CVJM Update NYAMBE-F (2)
CVJM Update NYAMBE-F (2)CVJM Update NYAMBE-F (2)
CVJM Update NYAMBE-F (2)
 
Palestra Mariana
Palestra MarianaPalestra Mariana
Palestra Mariana
 
Manual conciliação ok
Manual conciliação  okManual conciliação  ok
Manual conciliação ok
 
Linea de tiempo de literatura por monica llumiquinga
Linea de tiempo de literatura por monica llumiquingaLinea de tiempo de literatura por monica llumiquinga
Linea de tiempo de literatura por monica llumiquinga
 

Similar to ConnieJusticeCV-2016

it--jamestoddyoung-
it--jamestoddyoung-it--jamestoddyoung-
it--jamestoddyoung-
James Young
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
Donna Robeck
 
Ben Resume updated 2015
Ben Resume updated 2015Ben Resume updated 2015
Ben Resume updated 2015
Ben Broseke
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
Adel Zayed
 
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedNetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
Kevin Moore MSIT, MISM
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupport
Terence Mcleod
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
360 BSI
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016
Byron Jackson
 

Similar to ConnieJusticeCV-2016 (20)

Resume IT Security Consultant
Resume IT Security ConsultantResume IT Security Consultant
Resume IT Security Consultant
 
Resume sat 8 23 2016
Resume sat 8 23 2016Resume sat 8 23 2016
Resume sat 8 23 2016
 
James pirrie resume 2019
James pirrie resume  2019 James pirrie resume  2019
James pirrie resume 2019
 
Llewellyn Link Resume
Llewellyn Link ResumeLlewellyn Link Resume
Llewellyn Link Resume
 
it--jamestoddyoung-
it--jamestoddyoung-it--jamestoddyoung-
it--jamestoddyoung-
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 
ITSPEC~1
ITSPEC~1ITSPEC~1
ITSPEC~1
 
Resume-Daniel Lozen-Kowalski1
Resume-Daniel Lozen-Kowalski1Resume-Daniel Lozen-Kowalski1
Resume-Daniel Lozen-Kowalski1
 
Ben Resume updated 2015
Ben Resume updated 2015Ben Resume updated 2015
Ben Resume updated 2015
 
ITFocused
ITFocusedITFocused
ITFocused
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedNetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupport
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Jake Streit 4.3
Jake Streit 4.3Jake Streit 4.3
Jake Streit 4.3
 

ConnieJusticeCV-2016

  • 1. 1 Curriculum Vita Connie Justice, D.Sc. Email: cjustice(at)iupui(dot)edu Phone: 317 752-3544 EDUCATION D.Sc. 2015 Cybersecurity, Capitol Technology University, Laurel, Maryland MIS 2004 Information Science, Indiana University, Bloomington, Indiana GRAD CERT 2003 Information Assurance,Purdue University,West Lafayette,Indiana B.S.E.E. 1997 Purdue School of Engineering and Technology, IUPUI,Indianapolis, Indiana 1980-1982 United States NavalAcademy,Annapolis, Maryland OTHER EDUCATION US ARMY 1990 Officer PersonnelManagement Course GEORGIA MILITARY ACADEMY 1989 Officer Candidate School (Top 10%) US ARMY 1984. Communications Security Equipment Course and Field System Communications Security Course US NAVY 1979 NavalAcademy Preparatory School PROFESSIONALCERTIFICATIONS Accessdata Mobile Examiner® 2012 Accessdata Certified Examiner® (ACE®) 2011 Certified Information Systems Security Professional (CISSP®) # 111852 2007 Certified Handheld Examiner 2007 Cisco Certified Network Administrator (CCNA). 2001 Microsoft Certified Systems Engineer (MCSE) 1998 A+ Certification 1996 Certified NetWare Administrator (CNA) 1996 PROFESSIONALAFFILIATIONS Society for Information Management 2015-present InfraGard, Federal Bureau of Investigation (FBI) program. 2008-present American Society of Engineering Education (ASEE) 2007-present Women in Technology 2007-present The International Information Systems Security Certification Consortium, Inc. (ISC2). 2007-present Information Systems Security Association (ISSA) 2005-present AWARDS AND HONORS Senior Advisor, Cyber Security Advisory Board Simon Property Group, L.P March 2016-present Outstanding Educator in Science, Technology or Engineering Women & Hi Tech Nominated 2014 Faculty Colloquium on Excellence in Teaching (FACET) Indiana University May 2010 Teaching Excellence Recognition Award Indiana University April 2004
  • 2. PROFESSIONAL APPOINTMENTS AND ENGAGEMENT ACADEMICAPPOINTMENTS Clinical Associate Professor, 2014 to present,Computer Information and Graphics Technology, Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN. Clinical Assistant Professor, 2005 – 2014 – Computer Information and Graphics Technology, Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN. Technical Assistance Program (TAP), 2004 to present – Purdue University, West Lafayette,IN. Faculty, Center for Education in Information Assurance and Security (CERIAS), 2004 to present - Purdue University, West Lafayette,IN. Visiting Clinical Assistant Professor, 2004-2005- Department of Computer and Information Technology, Purdue School of Engineering and Technology, IUPUI, Indianapolis, IN. Research Associate, 2000-2004- Department of Computer and Information Technology, Purdue School of Engineering and Technology, IUPUI,Indianapolis, IN. PROFESSIONALENGAGEMENT Consultant, 1997 – Present- Justice Technologies - Cybersecurity Strategy o Consult on information assurance and risk assessments; o Consult on cybersecurity strategies that increased the ability to withstand cyber-attacks; o Produce risk assessments for various industries including healthcare,manufacturing, and retail; o Perform gap analysis for information and cybersecurity programs; o Perform risk assessments and risk audits; o Produce executive roadmaps for technology and process improvements. - Executive and C-Suite Collaborations o Provide guidance on cybersecurity risk, governance,and incident response as it relates to complex technical, administrative, and physical security issues; o Design cybersecurity education, training, and awarenessfor c-suite,executives,and employees; o Conduct cybersecurity education, training, and awareness for c-suite,executives,and employees. o Project Manage projects related to cybersecurity,risk management, and auditing; o Formal risk management framework design and implementation to include: NIST, HIPAA,PCI,and COBIT,and NIST Cybersecurity Framework. Health Engineer, January 2007-May 2007-Veterans Administration, Indianapolis, IN Lean Six Sigma Project: File Room Processing 100 Day Project o Determined the legitimate needs for paper charts (voice of the customer analysis) and then determine ways to meet these needs without storing paper charts on site (if possible) o Determined what hard copy patient records could be eliminated with improved business processes and enhanced use of the electronic health record (EHR); implement these Developed detailed plans to include timelines and resources required for the removal of all stored paper patient records o Developed a system for timely retrieval of archived charts (e.g.,overnight vs. regular mail)
  • 3. IT Systems Manager, 2000-2003-Schmidt Associates, Indianapolis, IN o Managed the IT budgets and expenditure on hardware and software. o Developed & maintained company IT systems,software and databases. Recommended and implemented improvements and efficiencies. o Managed technical staff. o Responsible for hardware and software installation, maintenance and repair. o Reported to the Chief Financial Officer & Chief Executive Officer. o Excellent time management,confidentiality & communication skills. Strong IT, commercial, planning and budgeting skills. o Managed server software and associated backup routines. o Procured IT hardware, software and maintenance products & services. Responsible for the recruitment and training of new staff. o Managed the internal & hosted network infrastructure including: firewalls, servers, switches and telephony. DOCTORAL AND MASTERS MENTORING Title Scholar Level Role Year Meeting payment card industry data security standards: Case study of a college bookstore Randall Magiera Doctoral Chair 2015-2016 Forenzix: An open source dynamic malware analysis and digital forensics tool Nicholas Novotny Masters Chair 2014-2016 Improving administrative usability of Jagwarz Vicky Smith Masters Chair 2013-2015 How to improve processes using student’s perspective: A case study of the Living Lab Liem Do Masters Chair 2011-2013 A phenomenological study of the security of clinical research as perceived by clinical researchers Eric Schmidt Masters Chair 2011-2013 The utility and durability of skills gained from an experiential learning course in information technology Twila Dowell Masters Chair 2010-2012 The use of agile development techniques in the small business Tim Young Masters Member 2010-2012 PROFESSIONAL DEVELOPMENT Course/Workshop Title Provider Date Publishing Your Dissertation Defcon Security Conference Academic Coaching and Writing DerbyCon, Louisville, KY 2015 2012 Internet Forensics SANS 2012 SANS Auditing Networks, Perimeters,and Systems SANS 2011 Digital Forensics Bootcamp Accessdata 2011 The Spy in my Pocket: A View to a Kill - Attacks on Mobile Devices and Users SANS 2011 Certified Computer Examiner, Falls Church, Virginia 2011 Information Assurance and Security Ethics Workshop Purdue University, West Lafayette 2010
  • 4. Cyber Games Workshop II, University of North Carolina Charlotte 2009 Community of Practice on the Scholarship of Teaching and Learning of Instructional Technology Impact IUPUI 2006-2008 Cyber Games Workshop University of North Carolina at Charlotte 2008 Mobile Forensics World Conference Chicago, IL 2008 Information Systems Auditor ISACA 2006 Administering MS SQL Server 2000 Database Microsoft 2002 Upgrading Web Developing Skills from ASP to MS ASP.NET Microsoft 2002 Introduction to Cisco Router Configuration (ICRC) Cisco 1998 Sun Systems Administration Course Sun Microsystems 1997 Sun Systems Repair Course Sun Microsystems 1997 CURRICULUM ANDPROGRAMS CREATED PROGRAMS CREATED IT Academy,http://livlab.org/itacademy/ , a technology training environment. Started in 2012 as a pilot program to develop into a self-sustaining business. Presently the IT Academy has become an official Pearson Vue testing center and has hosted one classroom CompTIA course and one online CompTIA course. The “Living Lab,” http://livlab.org,an IT experiential learning clinic, started in 2001. Students have the opportunity to work on projects for clients such as Simon Property Group, L.P.,Horizon House, Indiana Youth Group, Indiana Department of Natural Resources,UITS, IUPUI Surplus, and the Living Lab (LL) itself, which serves as the backbone of many networking services used by the CIT, CGT and OLS programs within the Purdue School of Engineering & Technology at IUPUI. Approximately250 projects have been completed in the LL inthe areas of cybersecurity,database,networking,andwebdesign. Students who complete the Living Lab course walk away with not only college credit toward their degree,but resume-worthy IT professional experience to share with potential employers. The unique combination of academic rigor and professional standards and implementation of business environment policies provide students the opportunity to not only put their newly acquired skills to the test,but also provides students the much needed exposure to a professional work setting. Security Track in the Computer and Information Technology B.S. Degree Program,2007. IT Assessment Center,IUPUI,2005.Offered security and network assessment services,performed by me and students under my supervision, to small and medium companies and organizations. Network Security Certificate Program,2004. The Network Security Certificate (NSC) provides information assurance and security education and training to students and professionals. Information assurance and security professionals are responsible for the policies and technologies used to safeguard the information systems infrastructure of a company. Networking Track in the Computer and Information Technology Degree Program,2003. GRANTS/FELLOWSHIPS INTEACHING Title Granting Agency Role Amount Dates CETA ExF: An Open Source Cybersecurity Experiential Framework. Submitted for consideration to CNS-Secure and Trustworthy Cyberspace National Science Foundation (NSF) PI 300,000 Pending Dec 2015 Service Learning Course Development Grant Indiana University PI 3,000 May 2013- April 2014 Proximity Malware Coping Schemes in Smartphone-based Mobile Networks Indiana University Co-PI 3,000 Jan 2011- Dec. 2011
  • 5. Service Learning Assistants Indiana University PI 1,500 Jan 2011- Dec.2011 Global Environment for Network Innovations (GENI) Travel Grant NSF Recipient 2,000 Dec 2011 Establishment of the Indiana Health Information Technology Extension Center Higher Education Investigator 19,259 Feb 2010- March 2011 Boyer's Scholar's Faculty Development Grant Indiana University PI 5,000 2009-1010 Faculty Podcasting Initiative, "Interdisciplinary Investigation of Mobile Broadband Learning in the 21st Century Indiana University /University Information Technology Services (UITS) Co-PI 7,340 Summer 2008 Engaged School and Interdisciplinary Community Partnership Initiatives E&T, Bill Conrad Investigator 13,000 2008 Mobile Forensics in Healthcare Multidisciplinar y Undergraduate Research Institute (MURI) PI 2,000 Fall 2007 George Washington University (GWU) Information Security Grant George Washington University PI 30,000 Jan 2006- Dec 2007 Course Development in Trustworthy Computing Microsoft PI 50,000 May 2006-May 2008 Wireless Security Assessment Tool Development MURI Co-PI 3,000 Fall 2006 IT Assessment Center IUPUI Solutions Center Co-PI 41,142 2005 IT Risk Assessment Technical and Non-Technical: Research and Implementation MURI PI 4,500 Fall 2005 Information Assurance and Security Curriculum and Faculty Development NSF 0423803 PI 118,312 May 2004-July 2008 GRANTS/FELLOWSHIPS IN SERVICE Title Granting Agency Role Amount Dates Technical Assistance Program (TAP) Purdue University, West Lafayette PI 70,000 July 2015 - June 2016 Technical Assistance Program Purdue University, West Lafayette PI 70,000 July 2014-June 2015 Technical Assistance Program Purdue University, West Lafayette PI 70,000 July 2013-June 2014 Technical Assistance Program Purdue University, West Lafayette PI 53,000 July 2012 - June 2013 Technical Assistance Program Purdue University, West Lafayette PI 46, 891 July 2011-June 2012 Technical Assistance Program Purdue University, West Lafayette PI 46, 891 July 2010-June 2011 Technical Assistance Program Purdue University, West Lafayette PI 29,336 July 2009-June 2010
  • 6. Technical Assistance Program Purdue University, West Lafayette PI 29,236 July 2008-June 2009 Technical Assistance Program Purdue University, West Lafayette PI 21,699 July 2007-June 2008 Technical Assistance Program Purdue University, West Lafayette PI 7,902 July 2006-June 2007 PUBLICATIONS TEACHING Manuscript Justice, C. (2015). Learners’ Perceived Efficacy of a Cybersecurity Competition Relating to Job Readiness: A Qualitative Study (Unpublished doctoral dissertation). Capitol Technology University, Laurel, Maryland. Refereed Proceedings Novotny, N.,Jones, J., Rushabh, V.,Balaska, J., Justice, C. (2015, December). Honeypot Network Forensics. Works-In-Progress Research session presented at the Annual Computer Security Applications Conference,Los Angeles, CA. Justice C.F. (2015). Learner’s perceptions of a cybersecurity competition as it relates to knowledge, skills, and abilities (KSA’s). NICE (National Initiative for Cybersecurity Education) Conference,San Diego, CA., November 3-5, 2015. Plenary Panelon Cybersecurity Competitions. Novotny, N. & Justice C.F. (2015). Hashing algorithms and their use in digital forensicsinvestigations.Workshop presented at The High Impact Technology Exchange Conference,Portland, Oregon, 27-30 July. Smith, V. & Justice C.F. (2015). The Living Lab: How to implement an experiential learning laboratory. Workshop presented at The High Impact Technology Exchange Conference,Portland, Oregon, 27-30 July. Justice, C. , Fernandez, E., & Do, L. (2013). Utilizing Qualitative Analysis to Determine Effectiveness of The Living Lab on Graduates, 7th International Technology, Education and Development Conference, March 4-6, Valencia, Spain. Justice, C.F., & Do, Liem. (2012). IT Experiential Learning: The Living Lab. Frontiers in Education,October 3-6, 2012, Seattle, Washington. Justice, C.F. (2011). Project Management in the Living Lab: Merging Industry Best Practices with Experiential Learning. Society forApplied Learning Technologies,February 15-17, 2012, Orlando, FL. Dellacca, D. & Justice, C. (2007). Building Tomorrow’s Information Assurance Workforce through Experiential Learning. Proc. of the 40th Hawaii International Conference on SystemSciences (HICSS-39). doi: 10.1109/HICSS.2007.118 (6 cites in Google Scholar) Justice, C. & Fernandez, E. (2007). Living Labs: Putting Theory into Practice, Proceedingsof 5th Annual Hawaii International Conference on Education,January 6-9. Dark, M., Justice, C.& Morales, L. (2005). A Methodology for Developing and Disseminating Curriculum Resource Material in Information Security. Colloquium for Information Systems Security Education (CISSE) Conference Proceedings. Justice, C. & Fernandez, E. (2004). Developing a Network Security Certificate Program. Proceedings of the Eighth Interamerican Conference on Engineering and Technology Education (INTERTECH 2004), June 14-18, 2004. Abstract Justice, C.F. & Barnes,S. (2013). Integrating IT Business Partnership into Experiential Learning. 2013 Conference for Industry and Education Collaboration (CIEC),February 6-8, 2013, Phoenix, AZ. SERVICE Journal Articles Russ, A.L.,Saleem, J.J.,Justice C.F., Hagg H., Woodbridge, P.A.,& Doebbeling, B.N. (2010). Electronic Health Information in Use:Characteristics that Support Employee Workflow and Patient Care, Health Informatics Journal,16(4),287-305. (7 cites in Google Scholar) Saleem, J.J.,Russ, A.L.,Justice, C.F., Hagg, H.,Ebright, P.R.,Woodbridge, P.A.,& Doebbeling, B.N. (2009). Exploring the persistence of paper with the electronic health record. International Journal of Medical Informatics,78(9),618-628. doi: 10.1016/j.ijmedinf.2009.04.001 (49 cites in Google Scholar) Refereed Proceedings Justice, C., Wu, H.,& Walton, E. (2009). Mobile Forensics in Healthcare. Eighth International Conference on Mobile Business (ICMB 2009), Dalian, China, June 27-28, 255-260. doi: 10.1109/ICMB.2009.51
  • 7. Russ, A. L., Saleem, J. J., Justice, C. F., Hagg, H.,Woodbridge, P. A.,& Doebbeling, B. N. (2009, October). Healthcare Workers' Perceptions of Information in the Electronic Health Record. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 53, No. 11, pp. 635-639). SAGE Publications. Saleem, J.J.,Russ, A.L.,Justice, C.F., Hagg, H, Woodbridge, P.A. & Doebbeling, B.N. (2008). Paper Use with the Electronic Medical Record: An Important Supplement or Negative Circumvention? Proceedings of the Human Factors and Ergonomics Society 52nd Annual Meeting.(3 cites in Google Scholar)