SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Alloy Cybersecurity
Proactive prevention and protection
Mark Stockman,
Joe Nedelec, Bill Mackey
The Problem
Limited cybersecurity budgets
Bad guys are winning
“Cyber security requires a multi-
disciplinary approach. Efforts should be
made to educate and partner with
disciplines not always thought of as
related to cyber security.”
“Curative-not palliative-approaches are
needed to address causes rather than
symptoms of the continuing security
breaches in computer systems.”
Hoffman, L. 2010. GW Cyber Security Research and Policy Institute Report.
Stockman, Holt, Mackey, & Holiday, 2013 Cyberdeviance Study
“I’ve never had the need,
skillset, or knowledge”
“Been too busy to learn”
“Number 1 it is wrong.
Number 2, I would have
no idea where to start”
Why not hack? (or follow policy?)
Alloy Cybersecurity
School of Information Technology:
– Mark Stockman
School of Criminal Justice:
– Joe Nedelec
– Bill Mackey
Empirically driven, interdisciplinary team adding
human behavior to cyber.
Behavior/Decisions
2015 Verizon Data Breach Investigations Report
Cause of data breach by cause 2005-2015
(n=4,539)
What we know about data breaches by major
industry and cause of breach, 2005-2015 (n=3,899)
US crime rate per 100k
Bureau of Justice Statistics
Crime Science
Center for Problem Oriented Policing
Behavioral Economics
Data breach victim
• Customers
• Organization
• Employees
13
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
Non-malicious Insider Risk
Intermedia 2015 Insider Risk Report
Why not follow best practice?
Incentive structure
Why not follow best practice?
Individual characteristics
Levels of analysis
• Organization
• Department
• Individual/employee
Why not follow best practice?
Incentive structure
Individual characteristics
Cybervictimization Risk Model
Behavioral Cyberthreat Assessment
Identify risk at multiple levels
Organization, department, individual
Non-malicious behavior
23
Behavioral Cyberthreat Mitigation
Customized risk reduction strategies/training
Incentivize best practice
24
Analyze and Affect Behavior
 Alloy Breach Database
 Employee surveys/interviews
 Vulnerability reports*
 IT/Info Sec policies*
Alloy Cybersecurity
Mark Stockman
Associate Professor, Information
Technology
Joe Nedelec
Assistant Professor, Criminal Justice
Bill Mackey
Assistant Professor (ISU), Criminology
Mark Stockman is an Associate Professor at the University of Cincinnati serving
as a faculty member in the School of Information Technology teaching networking,
systems, and cybersecurity courses. His research interests include systems
administration, server virtualization, cloud computing management, and IT pedagogy.
With recent study of traditional criminology and crime prevention, his current
research focusses on cybersecurity. Specifically, Mark is investigating the
applicability of criminological theories in the digital realm or cybercrime science. Mr.
Stockman is the former Chair of the ACM Special Interest Group for Information
Technology Education (SIGITE), a community that has defined IT as an academic
discipline; and is also now active in a similar effort for the cyber sciences, the Cyber
Education Project (CEP). Along with industry experience prior to becoming a
professor, he holds a BS in Industrial and Systems Engineering from Ohio University,
Russ College of Engineering and Technology, and an MBA from Ohio University,
College of Business. – mark.stockman@uc.edu
Joe Nedelec received his undergraduate degrees (criminology and psychology)
and his master’s degree (criminology) from Simon Fraser University in Burnaby,
British Columbia. His doctoral degree (criminology) was received from Florida State
University. Dr. Nedelec’s primary research interests lie within biosocial criminology,
with specific focus on evolutionary psychology, life-history theory, digit ratio, and
behavioral genetics. He has published articles on biosocial criminology in a variety
of journals including Child Psychiatry and Human Development, Criminology,
Evolution and Human Behavior, Intelligence, Journal of Criminal Justice, Personality
and Individual Differences, and others. He has also incorporated topics related to
cybercrime and cyber-security into his research agenda and has a secondary
appointment with the School of Information Technology at UC. Dr. Nedelec teaches
in the areas of life-course/developmental criminology, cybercrime, research methods,
and statistics. He is also co-founder and current Vice President of the Biosocial
Criminology Association (www.biosocialcrim.org). – joseph.nedelec@uc.edu
Bill Mackey is an Assistant Professor at Indiana State University. His research
interests include: cybercriminology, social engineering, technological advances in
crime and crime prevention, white-collar crime, and criminological theory. Bill’s
current research is focused on correlates of human behavior in data breaches and
the application of criminological theory to cybercrime and breach prevention. Bill has
published works in the areas of social engineering, advanced crime prevention
technologies, and individual differences in both white-collar offenders and hackers.
Mr. Mackey is a member of the Cincinnati Bell Digital Forensics Working Group, the
National White-Collar Crime Research Consortium, and the American Society of
Criminology. He received a dual bachelor’s degree in psychology and criminology
from Iowa State University, a master’s degree in criminology from Indiana State
University, and is currently finishing his Ph.D. in criminology at the University of
Cincinnati. – William.Mackey@indstate.edu

Weitere ähnliche Inhalte

Was ist angesagt?

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber securityzapp0
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationDan Michaluk
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Class 12 digital ethics and netiquette
Class 12 digital ethics and netiquetteClass 12 digital ethics and netiquette
Class 12 digital ethics and netiquetteShawn Lennie
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 

Was ist angesagt? (20)

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Class 12 digital ethics and netiquette
Class 12 digital ethics and netiquetteClass 12 digital ethics and netiquette
Class 12 digital ethics and netiquette
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
February Ed Report[4]-Chanel
February Ed Report[4]-ChanelFebruary Ed Report[4]-Chanel
February Ed Report[4]-Chanel
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
интернет
интернетинтернет
интернет
 
Forensics
ForensicsForensics
Forensics
 

Andere mochten auch

Burman GSC Gurgaon
Burman GSC GurgaonBurman GSC Gurgaon
Burman GSC GurgaonManish Kumar
 
Isomorphic JavaScript: #DevBeat Master Class
Isomorphic JavaScript: #DevBeat Master ClassIsomorphic JavaScript: #DevBeat Master Class
Isomorphic JavaScript: #DevBeat Master ClassSpike Brehm
 
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016Everett Sizemore
 
Strategies to Drive Web Traffic in the Real Estate World
Strategies to Drive Web Traffic in the Real Estate WorldStrategies to Drive Web Traffic in the Real Estate World
Strategies to Drive Web Traffic in the Real Estate WorldRand Fishkin
 
Perfect Starts: How to Get the Right Traffic with a Content Audit
Perfect Starts: How to Get the Right Traffic with a Content AuditPerfect Starts: How to Get the Right Traffic with a Content Audit
Perfect Starts: How to Get the Right Traffic with a Content AuditMichael King
 
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...Rand Fishkin
 
SEO: Crawl Budget Optimierung & Onsite SEO
SEO: Crawl Budget Optimierung & Onsite SEOSEO: Crawl Budget Optimierung & Onsite SEO
SEO: Crawl Budget Optimierung & Onsite SEOPhilipp Klöckner
 
Crawl Budget Optimization - SMX München 2016
Crawl Budget Optimization - SMX München 2016Crawl Budget Optimization - SMX München 2016
Crawl Budget Optimization - SMX München 2016Bastian Grimm
 
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation Model
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation ModelIncorporating Clicks, Attention and Satisfaction into a SERP Evaluation Model
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation ModelRand Fishkin
 
The Paradox of Great Content
The Paradox of Great ContentThe Paradox of Great Content
The Paradox of Great ContentRand Fishkin
 
Link Building's Tipping Point
Link Building's Tipping PointLink Building's Tipping Point
Link Building's Tipping PointRand Fishkin
 
The Remarkable SEO Power of Republishing
The Remarkable SEO Power of RepublishingThe Remarkable SEO Power of Republishing
The Remarkable SEO Power of RepublishingRand Fishkin
 
Tesina power point caiani federica
Tesina power point caiani federicaTesina power point caiani federica
Tesina power point caiani federicaritaleuzzi
 

Andere mochten auch (14)

Frontend talk for backenders
Frontend talk for backendersFrontend talk for backenders
Frontend talk for backenders
 
Burman GSC Gurgaon
Burman GSC GurgaonBurman GSC Gurgaon
Burman GSC Gurgaon
 
Isomorphic JavaScript: #DevBeat Master Class
Isomorphic JavaScript: #DevBeat Master ClassIsomorphic JavaScript: #DevBeat Master Class
Isomorphic JavaScript: #DevBeat Master Class
 
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016
Cut The Cruft - Everett Sizemore - MozTalk Denver - 2016
 
Strategies to Drive Web Traffic in the Real Estate World
Strategies to Drive Web Traffic in the Real Estate WorldStrategies to Drive Web Traffic in the Real Estate World
Strategies to Drive Web Traffic in the Real Estate World
 
Perfect Starts: How to Get the Right Traffic with a Content Audit
Perfect Starts: How to Get the Right Traffic with a Content AuditPerfect Starts: How to Get the Right Traffic with a Content Audit
Perfect Starts: How to Get the Right Traffic with a Content Audit
 
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...
Fight Back Against Back: How Search Engines & Social Networks' AI Impacts Mar...
 
SEO: Crawl Budget Optimierung & Onsite SEO
SEO: Crawl Budget Optimierung & Onsite SEOSEO: Crawl Budget Optimierung & Onsite SEO
SEO: Crawl Budget Optimierung & Onsite SEO
 
Crawl Budget Optimization - SMX München 2016
Crawl Budget Optimization - SMX München 2016Crawl Budget Optimization - SMX München 2016
Crawl Budget Optimization - SMX München 2016
 
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation Model
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation ModelIncorporating Clicks, Attention and Satisfaction into a SERP Evaluation Model
Incorporating Clicks, Attention and Satisfaction into a SERP Evaluation Model
 
The Paradox of Great Content
The Paradox of Great ContentThe Paradox of Great Content
The Paradox of Great Content
 
Link Building's Tipping Point
Link Building's Tipping PointLink Building's Tipping Point
Link Building's Tipping Point
 
The Remarkable SEO Power of Republishing
The Remarkable SEO Power of RepublishingThe Remarkable SEO Power of Republishing
The Remarkable SEO Power of Republishing
 
Tesina power point caiani federica
Tesina power point caiani federicaTesina power point caiani federica
Tesina power point caiani federica
 

Ähnlich wie Alloy Cybersecurity

The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxtodd241
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 

Ähnlich wie Alloy Cybersecurity (20)

The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
Web profile
Web profileWeb profile
Web profile
 
Web profile
Web profileWeb profile
Web profile
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Alloy Cybersecurity

  • 1. Alloy Cybersecurity Proactive prevention and protection Mark Stockman, Joe Nedelec, Bill Mackey
  • 2. The Problem Limited cybersecurity budgets Bad guys are winning
  • 3. “Cyber security requires a multi- disciplinary approach. Efforts should be made to educate and partner with disciplines not always thought of as related to cyber security.” “Curative-not palliative-approaches are needed to address causes rather than symptoms of the continuing security breaches in computer systems.” Hoffman, L. 2010. GW Cyber Security Research and Policy Institute Report.
  • 4. Stockman, Holt, Mackey, & Holiday, 2013 Cyberdeviance Study “I’ve never had the need, skillset, or knowledge” “Been too busy to learn” “Number 1 it is wrong. Number 2, I would have no idea where to start” Why not hack? (or follow policy?)
  • 5. Alloy Cybersecurity School of Information Technology: – Mark Stockman School of Criminal Justice: – Joe Nedelec – Bill Mackey Empirically driven, interdisciplinary team adding human behavior to cyber.
  • 6. Behavior/Decisions 2015 Verizon Data Breach Investigations Report
  • 7. Cause of data breach by cause 2005-2015 (n=4,539)
  • 8.
  • 9. What we know about data breaches by major industry and cause of breach, 2005-2015 (n=3,899)
  • 10. US crime rate per 100k Bureau of Justice Statistics
  • 11. Crime Science Center for Problem Oriented Policing
  • 13. Data breach victim • Customers • Organization • Employees 13
  • 14. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report
  • 15. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report
  • 16. Non-malicious Insider Risk Intermedia 2015 Insider Risk Report
  • 17. Why not follow best practice? Incentive structure
  • 18. Why not follow best practice? Individual characteristics
  • 19. Levels of analysis • Organization • Department • Individual/employee
  • 20. Why not follow best practice? Incentive structure Individual characteristics
  • 22.
  • 23. Behavioral Cyberthreat Assessment Identify risk at multiple levels Organization, department, individual Non-malicious behavior 23
  • 24. Behavioral Cyberthreat Mitigation Customized risk reduction strategies/training Incentivize best practice 24
  • 25. Analyze and Affect Behavior  Alloy Breach Database  Employee surveys/interviews  Vulnerability reports*  IT/Info Sec policies*
  • 26. Alloy Cybersecurity Mark Stockman Associate Professor, Information Technology Joe Nedelec Assistant Professor, Criminal Justice Bill Mackey Assistant Professor (ISU), Criminology
  • 27. Mark Stockman is an Associate Professor at the University of Cincinnati serving as a faculty member in the School of Information Technology teaching networking, systems, and cybersecurity courses. His research interests include systems administration, server virtualization, cloud computing management, and IT pedagogy. With recent study of traditional criminology and crime prevention, his current research focusses on cybersecurity. Specifically, Mark is investigating the applicability of criminological theories in the digital realm or cybercrime science. Mr. Stockman is the former Chair of the ACM Special Interest Group for Information Technology Education (SIGITE), a community that has defined IT as an academic discipline; and is also now active in a similar effort for the cyber sciences, the Cyber Education Project (CEP). Along with industry experience prior to becoming a professor, he holds a BS in Industrial and Systems Engineering from Ohio University, Russ College of Engineering and Technology, and an MBA from Ohio University, College of Business. – mark.stockman@uc.edu
  • 28. Joe Nedelec received his undergraduate degrees (criminology and psychology) and his master’s degree (criminology) from Simon Fraser University in Burnaby, British Columbia. His doctoral degree (criminology) was received from Florida State University. Dr. Nedelec’s primary research interests lie within biosocial criminology, with specific focus on evolutionary psychology, life-history theory, digit ratio, and behavioral genetics. He has published articles on biosocial criminology in a variety of journals including Child Psychiatry and Human Development, Criminology, Evolution and Human Behavior, Intelligence, Journal of Criminal Justice, Personality and Individual Differences, and others. He has also incorporated topics related to cybercrime and cyber-security into his research agenda and has a secondary appointment with the School of Information Technology at UC. Dr. Nedelec teaches in the areas of life-course/developmental criminology, cybercrime, research methods, and statistics. He is also co-founder and current Vice President of the Biosocial Criminology Association (www.biosocialcrim.org). – joseph.nedelec@uc.edu
  • 29. Bill Mackey is an Assistant Professor at Indiana State University. His research interests include: cybercriminology, social engineering, technological advances in crime and crime prevention, white-collar crime, and criminological theory. Bill’s current research is focused on correlates of human behavior in data breaches and the application of criminological theory to cybercrime and breach prevention. Bill has published works in the areas of social engineering, advanced crime prevention technologies, and individual differences in both white-collar offenders and hackers. Mr. Mackey is a member of the Cincinnati Bell Digital Forensics Working Group, the National White-Collar Crime Research Consortium, and the American Society of Criminology. He received a dual bachelor’s degree in psychology and criminology from Iowa State University, a master’s degree in criminology from Indiana State University, and is currently finishing his Ph.D. in criminology at the University of Cincinnati. – William.Mackey@indstate.edu

Hinweis der Redaktion

  1. Experian too, lack of attention on cyber after acquisitions
  2. Maybe you are ok, but your supply chain? Shadow IT? Hypothesis based on crime prevention literature.
  3. Maybe you are ok, but your supply chain? Shadow IT? Hypothesis based on crime prevention literature.
  4. Maybe you are ok, but your supply chain? Shadow IT? Hypothesis based on crime prevention literature.