PhD, MPSA, MBA | CISO, US Centers for Disease Control and Prevention
While there still remains some administrative processing to be done in the next week or so, I am excited to announce that I have completed all requirements for my PhD in Cybersecurity Leadership from Capitol Technology University!
This has been a very long, very hard journey. It was a journey fraught with long nights, working weekends, lost family time, and some serious stress and anxiety. Thank you to those that made this possible including (but certainly not limited to): Tracy Irish, PhD, Matt Wyandt, Ph.D., Richard Baker, Nikki Robinson, DSc, PhD, and Amy Murdock.
So weird to update my title to include "Dr. Lewis" but its kinda growing on me!
#PhDone
UNLV is introducing an online Master of Science degree in cybersecurity in Spring 2025. Developed jointly by the Lee Business School and College of Engineering, the master’s in cybersecurity will become the state’s first online and hybrid interdisciplinary degree option to match the growing demand for cybersecurity professionals. Learn more using the link in our bio! #DiscoverUNLV#graduatedegree#UNLV#business#engineering
🎓 Exciting milestones achieved!
I am thrilled to share that I completed my Master's studies in Computer Engineering (curriculum: Cybersecurity and Software Platforms) at Università degli Studi di Genova in October 2024. This journey has been both challenging and rewarding, setting a strong foundation for the future.
In November, I embarked on the next phase of my journey: a PhD in Cybersecurity and Reliable Artificial Intelligence, also at the University of Genova. I am deeply honored to continue working under the mentorship of Professors Fabio Roli and Antonio Cinà, who guided me during my Master's thesis and are now supporting my PhD endeavors.
Looking forward to contributing to advancements in these critical fields and sharing insights along the way! 🚀
#PhD#ArtificialIntelligence#Cybersecurity
I am thrilled to announce that I have successfully completed my Master's degree with Distinction in War and Society, specializing in a dissertation on cybersecurity and the theories of war. It has been an incredible journey of research, learning, and growth, and I am grateful for all the support I have received along the way.
My dissertation explored the intersection of cybersecurity and warfare theories focusing on how digital threats are reshaping traditional conceptions of conflict in the modern world. My thesis stated that aggressive and kinetically destructive cyberattacks should be viewed as an act of war and mode of warfare due to their contemporary weaponry equivalents and physical damage that can be caused. The thesis also evaluated the role played by more passive cyberattacks that map and direct future more aggressive assaults on a states cyberspace. It was a challenging yet rewarding experience, and I am proud of the work I have done.
As I look ahead, I am eager to continue exploring this fascinating area of study and contribute to the growing field of cybersecurity and conflict analysis. Whether through academic research, policy-making, or strategy, I am passionate about understanding and addressing the evolving nature of security in our increasingly interconnected world.
If anyone has opportunities or ideas related to cybersecurity, war studies, or related fields, I would love to connect and discuss how we can collaborate.
Thank you again to everyone who has supported me during this academic journey. Onward to the next chapter! 🌍🔐💻
#WarAndSociety#Cybersecurity#TheoriesOfWar#MastersWithDistinction#FutureOpportunities#WarStudies#CyberConflict
In my research, I delve into the urgent need for a holistic approach to cybersecurity, given the increasingly sophisticated and pervasive landscape of cyber threats. This approach combines cybersecurity, cyber behavioral sciences, digital forensics, and predictive modeling, emphasizing the necessity for a comprehensive strategy.
🔒 Cyber Forensics Behavioral Analysis (CFBA) Model:
Central to my study is the CFBA model, a promising development that integrates behavioral insights into technical cybersecurity frameworks. This approach has the potential to significantly improve identification, prevention, and response strategies against cyber threats, particularly those originating from Autonomous System Numbers (ASNs).
🤖 Advanced Predictive Models and Machine Learning:
I underscore the vital role of advanced predictive models and machine learning in recognizing and counteracting cyber threats. By championing interdisciplinary strategies that blend cyberpsychology, digital forensics, and cybersecurity, I aim to demonstrate the value of collaboration in moving beyond traditional boundaries. This study not only delves into psychological underpinnings but also analyzes network behavior, combining Open-Source Intelligence (OSINT), threat intelligence, and threat databases to assign a "behavioral score" to each threat. This innovative approach quantifies the risk associated with different cyber threats, offering a clearer perspective on cybersecurity.
📊 Cyber Behavioral Forensics Matrix (CBFM):
I present a comprehensive framework, the CBFM, designed to augment cybersecurity measures by fusing insights from behavioral sciences with technical forensics. This framework highlights the importance of adaptability and a proactive approach in cybersecurity, promoting a multidisciplinary methodology to deepen our understanding and effectively neutralize dynamic threats in the digital era.
🔍 Unified Cybersecurity Strategy:
I advocate for a unified cybersecurity strategy that blends behavioral insights with predictive modeling and digital forensics to efficiently tackle the complex dimensions of cyber threats. I call for continued research and cross-disciplinary cooperation to forge new solutions and propel forward the domain of forensic cyberpsychology, a field that applies psychological principles to understand and counteract cyber threats, within the cybersecurity landscape.
https://lnkd.in/ehWQfY7n#ForensicCyberpsychology#Cyberpsychology#Cybersecurity#DigitalForensics#CyberBehavioralSciences#CFBA#CFBM#PredictiveModeling#InterdisciplinaryResearch
A warm welcome -and short interview- of Arthur C. who joined DTU - Technical University of Denmark and our 🔒💡👾 cyber-deception group 🕵️♂️💻🔍 as a PhD student!
-tell us a bit about yourself 👤🌍✨!
-Hi, I’m Arthur Cordeiro, and on September 1st, I officially began my PhD journey at DTU. As a passionate explorer in the world of cybersecurity, I’ve always been drawn to the excitement of offensive security. After finishing my master’s degree in Network Security at the State University of Ceará, Brazil, I felt it was time to dive into something new. That’s when I decided to take the plunge into research, seeking out fresh challenges and adventures in the world of cybersecurity.
-why did you choose DTU/Denmark and how is it so far 📚✈️😊?
-Well, for me, knowledge is always a good thing, so imagine being surrounded by people who are just as eager to learn as you are, especially in the same field. That’s already a win! And then, mix in a fascinating culture, and what do you get? A recipe for an amazing adventure. That’s my “why” for choosing DTU!
-what will you be working at and why is it exciting for you 🔬🚀🙌?
-My research focuses on protecting Network Legacy Systems by integrating modern solutions like Honeypots while maintaining the crucial balance between modern and legacy devices. I’m really excited to dive deep into understanding the real-world impact of offensive security and approach it from the perspective of someone defending, not attacking. Plus, working alongside amazing people like Emmanouil Vasilomanolakis and the whole DTU Compute team makes the experience even more thrilling!
#cyberdeception#denmark#DTU#phdstudent#cyber#cybersecurity
I am excited to share that I have recently started pursuing a dual Master's degree in Computer Engineering and Cybersecurity Engineering. I believe that this academic pursuit will provide me with the necessary skills and knowledge to make significant progress in my career. Looking forward to this journey ahead!
#AcademicPursuit#ComputerEngineering#CybersecurityEngineering#CareerGrowth.
Let’s kick off Women’s History Month by celebrating the remarkable achivements of women pioneers in Cybersecurity.
1. Ada Lovelace: In 1843, Ada Lovelace who was only 19 years old at the time and had no formal training in computer science wrote what is considered to be one of history’s first computer programs. This program helped Babbage who she worked with as an assistant design a machine called the Analytical Engine—a computer designed to run other programs automatically. Her work with Babbage led her to become one of cybersecurity’s most important pioneers.
2. Dorothy Denning: Known for her lattice-based access control (LBAC), Intrusion detection system (IDS) and other cybersecurity innovations in cryptography, computer security, and information warfare. In 1983, she became one of only two women to be elected as Fellows of the National Academy of Engineering.
3. Valerie Thomas: Valerie Thomas led NASA’s cybersecurity program from 1989 to 1993, making her one of few women with a leadership role in cybersecurity at that time. In that role, she helped develop protocols for NASA computers and became an advocate for women interested in cybersecurity careers. She passed away in 2016 after a battle with cancer.
To honor her contributions to cybersecurity, Congress awarded her posthumously with the Department of Commerce Gold Medal Award in 2017.
These women, among many others, have played pivotal roles in advancing cybersecurity research, technology, and policy, paving the way for future generations of women in the field.
If you had the opportunity of meeting any of these women today, what would you say to them?
Happy New Month!
#WomensMonth#InspireInclusion#WomeninTech#WomeninCybersecurity#CyfendryWoman#CyfendryAcademy#Her#march#womenhistorymonth2024
Nelson Mandela University: Professor Rossouw von Solms Honored as Top Scholar in Information Security - India Education Diary: Nelson Mandela University: Professor Rossouw von Solms Honored as Top Scholar in Information Security India Education Diary #CyberSecurity#InfoSec#SecurityInsights
🎉 Thrilled to announce that our conference paper on leveraging the Cognitive Continuum Theory (CCT) in The Baldwin School "Cybersecurity and Ethical Hacking" class has been accepted! The paper will be included in the "Cybersecurity Education" track of the European Conference on Cyber Warfare and Security (ECCWS). Through a case-study analysis of 104 tasks across six activities, our study explores how various task characteristics induce CCT's diverse cognitive modes—Analytical, Quasi-Rational, and Intuitive Cognition.
Analytical Cognition emphasizes in-depth analysis, Intuitive Cognition leans on intuition, and Quasi-Rational Cognition blends both approaches. By tailoring cybersecurity class activities to engage these cognitive modes, we aim to equip students with the nuanced decision-making skills needed for the complex cybersecurity landscape.
This research, co-authored with Addison Lilholt and Emily Woodward, not only sheds light on instructional strategies that span across cognitive modes but also establishes a link with school library instruction, focusing on information behavior crucial for completing cybersecurity tasks.
#CybersecurityEducation#CognitiveContinuumTheory
📸 Image Credit: Illankoon, P., Tretten, P. and Kumar, U., 2019. Modelling human cognition of abnormal machine behaviour. Human-Intelligent Systems Integration, 1, pp. 3-26.