SlideShare a Scribd company logo
1 of 21
DIATOMIC Cybersecurity
Proactive prevention and protection
Mark Stockman,
Joe Nedelec, Bill Mackey
1
Interdisciplinary Approach
School of Information Technology:
– Mark Stockman
School of Criminal Justice:
– Joe Nedelec
– Bill Mackey
Empirically driven team adding human behavior to
cyber.
2
Services
Behavioral Cyberthreat Assessment
– Identify risk at multiple levels
Organization, department, individual
– Non-malicious behavior
Behavioral Cyberthreat Mitigation
– Customized risk reduction strategies
– Incentivize best practice
3
Behavior/Decisions
2015 Verizon Data Breach Investigations Report
4
5
Cause of data breach by cause
2005-2015 (n=4,539)
6
Cause of data breach in financial sector
2005-2015 (n=592)
7
What we know about data breaches by major
industry and cause of breach, 2005-2015 (n=3,899)
8
Cause of breach in financial sector
2005-2015 (n=592)
US crime rate per 100k
Bureau of Justice Statistics
9
Crime Science
Center for Problem Oriented Policing
10
Behavioral Economics 11
Stockman, Holt, Mackey, & Holiday, 2013 Cyberdeviance Study
“I’ve never had the need,
skillset, or knowledge”
“Been too busy to learn”
“Number 1 it is wrong.
Number 2, I would have
no idea where to start”
Why not hack? (or follow policy?)12
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
13
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
14
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
15
Analyze and Affect Behavior
 DIATOMIC Breach Database
 Employee surveys/interviews
 Vulnerability reports*
 IT/Info Sec policies*
16
Services
Behavioral Cyberthreat Assessment
– Identify risk at multiple levels
Organization, department, individual
– Non-malicious behavior
Behavioral Cyberthreat Mitigation
– Customized risk reduction strategies
– Incentivize best practice
17
DIATOMIC Cybersecurity
Mark Stockman
Associate Professor, Information
Technology
Joe Nedelec
Assistant Professor, Criminal Justice
Bill Mackey
Doctoral Student, Criminal Justice
18
Mark Stockman is an Associate Professor at the University of Cincinnati serving
as a faculty member in the School of Information Technology teaching networking,
systems, and cybersecurity courses. His research interests include systems
administration, server virtualization, cloud computing management, and IT pedagogy.
With recent study of traditional criminology and crime prevention, his current
research focusses on cybersecurity. Specifically, Mark is investigating the
applicability of criminological theories in the digital realm or cybercrime science. Mr.
Stockman is the former Chair of the ACM Special Interest Group for Information
Technology Education (SIGITE), a community that has defined IT as an academic
discipline; and is also now active in a similar effort for the cyber sciences, the Cyber
Education Project (CEP). Along with industry experience prior to becoming a
professor, he holds a BS in Industrial and Systems Engineering from Ohio University,
Russ College of Engineering and Technology, and an MBA from Ohio University,
College of Business. – mark.stockman@uc.edu
19
Joe Nedelec received his undergraduate degrees (criminology and psychology)
and his master’s degree (criminology) from Simon Fraser University in Burnaby,
British Columbia. His doctoral degree (criminology) was received from Florida State
University. Dr. Nedelec’s primary research interests lie within biosocial criminology,
with specific focus on evolutionary psychology, life-history theory, digit ratio, and
behavioral genetics. He has published articles on biosocial criminology in a variety
of journals including Child Psychiatry and Human Development, Criminology,
Evolution and Human Behavior, Intelligence, Journal of Criminal Justice, Personality
and Individual Differences, and others. He has also incorporated topics related to
cybercrime and cyber-security into his research agenda and has a secondary
appointment with the School of Information Technology at UC. Dr. Nedelec teaches
in the areas of life-course/developmental criminology, cybercrime, research methods,
and statistics. He is also co-founder and current Vice President of the Biosocial
Criminology Association (www.biosocialcrim.org). – joseph.nedelec@uc.edu
20
Bill Mackey is a doctoral student at the University of Cincinnati. His research
interests include: cybercriminology, social engineering, technological advances in
crime and crime prevention, white-collar crime, and criminological theory. Bill’s
current research is focused on correlates of human behavior in data breaches and
the application of criminological theory to cybercrime and breach prevention. Bill has
published works in the areas of social engineering, advanced crime prevention
technologies, and individual differences in both white-collar offenders and hackers.
Mr. Mackey is a member of the Cincinnati Bell Digital Forensics Working Group, the
National White-Collar Crime Research Consortium, and the American Society of
Criminology. He received a dual bachelor’s degree in psychology and criminology
from Iowa State University, a master’s degree in criminology from Indiana State
University, and is currently finishing his Ph.D. in criminology at the University of
Cincinnati. – william.mackey@uc.edu
21

More Related Content

What's hot

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsMEDEA Awards
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review deleyoboy7
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...MajedahAlkharji
 
Reality Mining
Reality MiningReality Mining
Reality MiningCI&T
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]Videoguy
 

What's hot (20)

Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review dele
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Review questions
Review questionsReview questions
Review questions
 
Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
 
Reality Mining
Reality MiningReality Mining
Reality Mining
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 

Viewers also liked

Deliver the right message at the right time
Deliver the right message at the right timeDeliver the right message at the right time
Deliver the right message at the right timeLander Janssens
 
Mayfair sub £5m Market Insight 2016
Mayfair sub £5m Market Insight 2016Mayfair sub £5m Market Insight 2016
Mayfair sub £5m Market Insight 2016Harvey Cyzer
 
Technology for Urology
Technology for UrologyTechnology for Urology
Technology for UrologyBella Friedman
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Growth & Development - 4-6 months
Growth & Development - 4-6 monthsGrowth & Development - 4-6 months
Growth & Development - 4-6 monthshealthskool
 
Black Money Act - Sandeep Jhunjhunwala - ICSI Study Circle
Black Money Act - Sandeep Jhunjhunwala - ICSI Study CircleBlack Money Act - Sandeep Jhunjhunwala - ICSI Study Circle
Black Money Act - Sandeep Jhunjhunwala - ICSI Study CircleSandeep Jhunjhunwala
 
TXC173_Payless_SpiralCopy
TXC173_Payless_SpiralCopyTXC173_Payless_SpiralCopy
TXC173_Payless_SpiralCopyGinina Lingat
 
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...Brocade
 
Tequipalcatalogo
TequipalcatalogoTequipalcatalogo
Tequipalcatalogotishval
 

Viewers also liked (13)

Reflejo del verdadero éxito
Reflejo del verdadero éxitoReflejo del verdadero éxito
Reflejo del verdadero éxito
 
Metafisica cristiana conny mendez
Metafisica cristiana   conny mendez Metafisica cristiana   conny mendez
Metafisica cristiana conny mendez
 
Oracle's Cloud Strategy
Oracle's Cloud StrategyOracle's Cloud Strategy
Oracle's Cloud Strategy
 
Deliver the right message at the right time
Deliver the right message at the right timeDeliver the right message at the right time
Deliver the right message at the right time
 
Mayfair sub £5m Market Insight 2016
Mayfair sub £5m Market Insight 2016Mayfair sub £5m Market Insight 2016
Mayfair sub £5m Market Insight 2016
 
Technology for Urology
Technology for UrologyTechnology for Urology
Technology for Urology
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Growth & Development - 4-6 months
Growth & Development - 4-6 monthsGrowth & Development - 4-6 months
Growth & Development - 4-6 months
 
Black Money Act - Sandeep Jhunjhunwala - ICSI Study Circle
Black Money Act - Sandeep Jhunjhunwala - ICSI Study CircleBlack Money Act - Sandeep Jhunjhunwala - ICSI Study Circle
Black Money Act - Sandeep Jhunjhunwala - ICSI Study Circle
 
TXC173_Payless_SpiralCopy
TXC173_Payless_SpiralCopyTXC173_Payless_SpiralCopy
TXC173_Payless_SpiralCopy
 
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...
Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constra...
 
история и современность пензенского района
история и современность пензенского районаистория и современность пензенского района
история и современность пензенского района
 
Tequipalcatalogo
TequipalcatalogoTequipalcatalogo
Tequipalcatalogo
 

Similar to Alloy Cybersecurity

Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxtodd241
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Angel Rodriguez
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speedjcichelli
 

Similar to Alloy Cybersecurity (20)

Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Alloy Cybersecurity

  • 1. DIATOMIC Cybersecurity Proactive prevention and protection Mark Stockman, Joe Nedelec, Bill Mackey 1
  • 2. Interdisciplinary Approach School of Information Technology: – Mark Stockman School of Criminal Justice: – Joe Nedelec – Bill Mackey Empirically driven team adding human behavior to cyber. 2
  • 3. Services Behavioral Cyberthreat Assessment – Identify risk at multiple levels Organization, department, individual – Non-malicious behavior Behavioral Cyberthreat Mitigation – Customized risk reduction strategies – Incentivize best practice 3
  • 4. Behavior/Decisions 2015 Verizon Data Breach Investigations Report 4
  • 5. 5 Cause of data breach by cause 2005-2015 (n=4,539)
  • 6. 6 Cause of data breach in financial sector 2005-2015 (n=592)
  • 7. 7 What we know about data breaches by major industry and cause of breach, 2005-2015 (n=3,899)
  • 8. 8 Cause of breach in financial sector 2005-2015 (n=592)
  • 9. US crime rate per 100k Bureau of Justice Statistics 9
  • 10. Crime Science Center for Problem Oriented Policing 10
  • 12. Stockman, Holt, Mackey, & Holiday, 2013 Cyberdeviance Study “I’ve never had the need, skillset, or knowledge” “Been too busy to learn” “Number 1 it is wrong. Number 2, I would have no idea where to start” Why not hack? (or follow policy?)12
  • 13. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report 13
  • 14. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report 14
  • 15. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report 15
  • 16. Analyze and Affect Behavior  DIATOMIC Breach Database  Employee surveys/interviews  Vulnerability reports*  IT/Info Sec policies* 16
  • 17. Services Behavioral Cyberthreat Assessment – Identify risk at multiple levels Organization, department, individual – Non-malicious behavior Behavioral Cyberthreat Mitigation – Customized risk reduction strategies – Incentivize best practice 17
  • 18. DIATOMIC Cybersecurity Mark Stockman Associate Professor, Information Technology Joe Nedelec Assistant Professor, Criminal Justice Bill Mackey Doctoral Student, Criminal Justice 18
  • 19. Mark Stockman is an Associate Professor at the University of Cincinnati serving as a faculty member in the School of Information Technology teaching networking, systems, and cybersecurity courses. His research interests include systems administration, server virtualization, cloud computing management, and IT pedagogy. With recent study of traditional criminology and crime prevention, his current research focusses on cybersecurity. Specifically, Mark is investigating the applicability of criminological theories in the digital realm or cybercrime science. Mr. Stockman is the former Chair of the ACM Special Interest Group for Information Technology Education (SIGITE), a community that has defined IT as an academic discipline; and is also now active in a similar effort for the cyber sciences, the Cyber Education Project (CEP). Along with industry experience prior to becoming a professor, he holds a BS in Industrial and Systems Engineering from Ohio University, Russ College of Engineering and Technology, and an MBA from Ohio University, College of Business. – mark.stockman@uc.edu 19
  • 20. Joe Nedelec received his undergraduate degrees (criminology and psychology) and his master’s degree (criminology) from Simon Fraser University in Burnaby, British Columbia. His doctoral degree (criminology) was received from Florida State University. Dr. Nedelec’s primary research interests lie within biosocial criminology, with specific focus on evolutionary psychology, life-history theory, digit ratio, and behavioral genetics. He has published articles on biosocial criminology in a variety of journals including Child Psychiatry and Human Development, Criminology, Evolution and Human Behavior, Intelligence, Journal of Criminal Justice, Personality and Individual Differences, and others. He has also incorporated topics related to cybercrime and cyber-security into his research agenda and has a secondary appointment with the School of Information Technology at UC. Dr. Nedelec teaches in the areas of life-course/developmental criminology, cybercrime, research methods, and statistics. He is also co-founder and current Vice President of the Biosocial Criminology Association (www.biosocialcrim.org). – joseph.nedelec@uc.edu 20
  • 21. Bill Mackey is a doctoral student at the University of Cincinnati. His research interests include: cybercriminology, social engineering, technological advances in crime and crime prevention, white-collar crime, and criminological theory. Bill’s current research is focused on correlates of human behavior in data breaches and the application of criminological theory to cybercrime and breach prevention. Bill has published works in the areas of social engineering, advanced crime prevention technologies, and individual differences in both white-collar offenders and hackers. Mr. Mackey is a member of the Cincinnati Bell Digital Forensics Working Group, the National White-Collar Crime Research Consortium, and the American Society of Criminology. He received a dual bachelor’s degree in psychology and criminology from Iowa State University, a master’s degree in criminology from Indiana State University, and is currently finishing his Ph.D. in criminology at the University of Cincinnati. – william.mackey@uc.edu 21