Cybersecurity Data Science (CSDS) PORTFOLIO
SCOTT ALLEN MONGEAU
- DISSERTATION
- ACADEMIC CURRICULUM VITAE
- CONFERENCE PRESENTATIONS
- Real Time Cybersecurity Analytics:Cybersecurity in Motion: Approaches to Real Time Analytics
- FLOCON 2020:CSDS: Best Practices in an Emerging Profession
- INFORMS Security Conference 2020:CSDS: Best Practices from an Emerging Profession
- FLOCON 2019:CSDS: Best Practices from the Field
- PLM Europe 2019:Behavioral Cybersecurity Monitoring
- RSA 2019:Security Data management
- PRMIA 2017:Data Science for Cybersecurity Risk
- GARP 2017:Data Science for Cybersecurity Risk Measurement, Methods, and Models
- ICS2 2015:Reframing Cyber Risk
- ACFE 2014:Reframing Cyber Risk
INDUSTRY WHITEPAPERS
- Research Data:Cybersecurity Research Datasets
- Cyber Data Lakes:How Not to Drown in your Cyber Data Lake
- CSDS:What is Cybersecurity Data Science?
- CSDS Corpus:Cybersecurity Data Science Bibliography
- New Perspectives:CSDS: Adopting a New Paradigm
- Emerging Trends:Emerging Trends in Data Analytics
ONLINE LECTURES AND PRESENTATIONS
- Introduction to CSDS:Introduction to Cybersecurity Data Science (YouTube)
- CSDS Class:Introduction to Cybersecurity Data Science Class1. Framing Cybersecurity Data Science2. Managing & Gathering Cybcersecurity Data3. Discovering & Exploring Patterns4. Detecting and Predicting Incidents5. Deploying Integrated Solutions
- Introduction to Analytics Lecture:Erasmus RSM lecture to MBA students ‘Introduction to Business Analytics’
- Introduction to Cognitive Analytics and AI:Erasmus RSM lecture to MIS/BIA students ‘Introduction to Semantic Analytics’
- Fraud Analytics via Network Analysis:Deloitte presentation on applied Social Network Analysis (SNA) for fraud detection and mitigation PART1 and PART2
- TEDx Talk on Analytics:Data science and our magical mind: Scott Mongeau at TEDxRSM
- eLearning Courses Developed:eLearning modules developed for Accenture Academy
- RESEARCH INTERESTS
- Cyborg Cybersecurity:Cyborg (human-in-the-loop) process orchestration in cybersecurity triage, investigation, and remediation
- Human-in-the-Loop:Design science research on cybersecurity human-in-the-loop and online machine learning (self-reinforcing learning) solutions
- Semantic Engineering:Application of semantic engineering to cybersecurity incident detection and remediation automation through machine-driven symbolic reasoning
- Network Process Analytics:Combined network graph analytics and process analytics for refined cybersecurity anomaly detection
- Data Preparation:Best practices research into cybersecurity data cleaning and preparation methods
- Novel Methods:Implementation assessments of focused methods for CSDS, particularly network graph analytics, natural language processing, time-series analysis, process mining / analytics, and deep learning
- Novel Best Practices:Literature and implementation research into the application of security-adjacent domain principles and practices to CSDS, particularly fraud analytics, epidemiology / medical diagnostics, quantitative risk management, and social science research methods
- CSDS Process Models:Deriving and advocating a CSDS-specific analytics process model (e.g. CRISP-DM for CSDS)
- Text Analytics:Application of text analytics to cybersecurity data (i.e. pattern discovery in log files)
- International Cyber Policy and Behavior:
- Micro-/macroeconomic and game theoretic analysis of international cyber conflict
- Simulation analysis of international adversarial cyber conflict (systems dynamics, multi-agent, Monte Carlo)
- Comparative international telecommunication digital security regulatory analysis
- Implications of Coronavirus surges in teleworking on national cyber risk
- Methods and tends in the application of machine learning driven attacks (machine learning as an automation mechanism in adversarial attacks)
- Adversarial machine learning trends (analytical / AI systems as adversarial targets)AI-driven social and online media fake news and related misinformation campaigns as emerging disinformation and political destabilization tools (and reactive (inter-) national, regulatory, policy, and intelligence agency prospects for addressing)
- International IoT, infrastructure, and industrial attack trends as covert warfare
- Survey and interview research of cybersecurity policy stakeholders, managers, practitioners, and adversarial actors