Cybersecurity Data Science (CSDS) PORTFOLIO
SCOTT ALLEN MONGEAU
-
DISSERTATION
DISSERTATION 'Cybersecurity Data Science: Best Practices in an Emerging Profession' (draft upon request) #CSDS2020
-
CONFERENCE PRESENTATIONS
Real Time Cybersecurity Analytics:
FLOCON 2020:
INFORMS Security Conference 2020:
FLOCON 2019:
PLM Europe 2019:
RSA 2019:
PRMIA 2017:
GARP 2017:
Data Science for Cybersecurity Risk Measurement, Methods, and Models
ICS2 2015:
ACFE 2014:
-
INDUSTRY WHITEPAPERS
Research Data:
Cyber Data Lakes:
CSDS:
CSDS Corpus:
New Perspectives:
Emerging Trends:
-
ONLINE LECTURES AND PRESENTATIONS
Introduction to CSDS:
CSDS Class:
Introduction to Cybersecurity Data Science Class
1. Framing Cybersecurity Data Science
2. Managing & Gathering Cybcersecurity Data
3. Discovering & Exploring Patterns
Introduction to Analytics Lecture:
Erasmus RSM lecture to MBA students 'Introduction to Business Analytics'
Introduction to Cognitive Analytics and AI:
Erasmus RSM lecture to MIS/BIA students 'Introduction to Semantic Analytics'
Fraud Analytics via Network Analysis:
Deloitte presentation on applied Social Network Analysis (SNA) for fraud detection and mitigation PART1 and PART2
TEDx Talk on Analytics:
eLearning Courses Developed:
-
RESEARCH INTERESTS
Cyborg Cybersecurity:
Cyborg (human-in-the-loop) process orchestration in cybersecurity triage, investigation, and remediation
Human-in-the-Loop:
Design science research on cybersecurity human-in-the-loop and online machine learning (self-reinforcing learning) solutions
Semantic Engineering:
Application of semantic engineering to cybersecurity incident detection and remediation automation through machine-driven symbolic reasoning
Network Process Analytics:
Combined network graph analytics and process analytics for refined cybersecurity anomaly detection
Data Preparation:
Best practices research into cybersecurity data cleaning and preparation methods
Novel Methods:
Implementation assessments of focused methods for CSDS, particularly network graph analytics, natural language processing, time-series analysis, process mining / analytics, and deep learning
Novel Best Practices:
Literature and implementation research into the application of security-adjacent domain principles and practices to CSDS, particularly fraud analytics, epidemiology / medical diagnostics, quantitative risk management, and social science research methods
CSDS Process Models:
Deriving and advocating a CSDS-specific analytics process model (e.g. CRISP-DM for CSDS)
Text Analytics:
Application of text analytics to cybersecurity data (i.e. pattern discovery in log files)
International Cyber Policy and Behavior:
Micro-/macroeconomic and game theoretic analysis of international cyber conflict
Simulation analysis of international adversarial cyber conflict (systems dynamics, multi-agent, Monte Carlo)
Comparative international telecommunication digital security regulatory analysis
Implications of Coronavirus surges in teleworking on national cyber risk
Methods and tends in the application of machine learning driven attacks (machine learning as an automation mechanism in adversarial attacks)
Adversarial machine learning trends (analytical / AI systems as adversarial targets)
AI-driven social and online media fake news and related misinformation campaigns as emerging disinformation and political destabilization tools (and reactive (inter-) national, regulatory, policy, and intelligence agency prospects for addressing)
International IoT, infrastructure, and industrial attack trends as covert warfare
Survey and interview research of cybersecurity policy stakeholders, managers, practitioners, and adversarial actors