North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

Similar documents
Tina Ladabouche. GenCyber Program Manager

NSA s Centers of Academic Excellence in Cyber Security

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

An Overview of Mobile Security

CYBERSECURITY: Scholarship and Job Opportunities

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

City College of San Francisco

Web Security Vulnerabilities: Challenges and Solutions

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Objective: Education:

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

CALENDAR FOR THE YEAR 2018

Opportunities to Integrate Technology Into the Classroom. Presented by:

A United States Cyber Academy Program

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Introducing Cyber Resiliency Concerns Into Engineering Education

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

The GenCyber Program. By Chris Ralph

National Defense University and IRMC. National Defense University

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Improving SCADA System Security

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Industrial Control Systems November 18, 2015

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO Kristen Baldwin, OUSD(AT&L)/DS

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

California Cybersecurity Integration Center (Cal-CSIC)

Curriculum Vitæ. (Home address) 8399 Transvaal Blue Street Phone: (702) Las Vegas, NV Cell: (702)

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

Immersion Academy Annual Report 2017

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

ManTech Advanced Systems International 2018 Security Training Schedule

Under the hood testing - Code Reviews - - Harshvardhan Parmar

Academic Program Review Cyber Security College of Southern Nevada 2017

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

FY Bay Area UASI Risk and Grants Management Program Update. November 14, 2013

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Building the IA Workforce

Software Assurance Education Overview

NCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time

SOUTH DAKOTA BOARD OF REGENTS. Budget and Finance ******************************************************************************

CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

CYBER HUNTING. 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, Dr. Nicole Beebe, Ph.D.

Collaboration on Cybersecurity program between California University and Shippensburg University

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data

Homeland Security 1 1

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

2 yrs Teaching at Amrutvahini Engineering College, Sangamner ( July 1993 April 1995)

ITSY Information Technology Security Course Syllabus Spring 2018

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University

RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE

UTCS Scholarships for Service

Systems Engineering for Software Assurance

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

UNCLASSIFIED R-1 ITEM NOMENCLATURE

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CURRICULUM VITAE SHON L. HARRIS, CISSP

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

RISK MANAGEMENT Education and Certification

The CISM Education Plan (updated August 2006)

Building Secure Systems

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Information Technology (CCHIT): Report on Activities and Progress

Information Systems. Courses. Information Systems 1

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS

Cybersecurity Training

Instructor: Eric Rettke Phone: (every few days)

CSC 4992 Cyber Security Practice

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

ITSY Y1 Information Technology Security Course Syllabus _ Page 1 COURSE SYLLABUS. Course Name INFORMATION TECHNOLOGY SECURITY

The fast track to top skills and top jobs in cyber. Guaranteed.

Instructor-led Training Course Catalog

Personal Information Name: Khalid Abed Dahleez. Key Qualifications:

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

CND Exam Blueprint v2.0

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

Developing Career-Relevant Academic Programs

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Transcription:

Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in Information Systems 2002-2003 Emphasis Area: Database Management Dakota State University Madison, SD B.S. in Computer Information Systems 1998-2002 FACULTY EXPERIENCE Professor Dakota State University Madison, SD Developed courses in cyber operations and cyber security as specified by the NSA s Center of Academic Excellence in Cyber Operations requirements. Taught undergraduate and graduate courses in web software security, ethical hacking, secure software engineering, intrusion detection, risk management, and related areas. 2015-Present Lead faculty for DSU s designation as one of the inaugural four NSA Centers of Academic Excellence in Cyber Operations in charge of applying for the designation, organizing faculty and curriculum, and working with NSA personnel on the designation process. Primary investigator for the DSU Cyber Corps Scholarship Program funded by the National Science Foundation that provides full-ride scholarships to cyber security students. Associate Professor Dakota State University Madison, SD 2010-2015 Developed courses in cyber operations and cyber security as specified by the NSA s Center of Academic Excellence in Cyber Operations requirements. Taught undergraduate and graduate courses in web software security, ethical hacking, secure

JOSH PAULI, PH.D. 2 software engineering, intrusion detection, risk management, and related areas. Lead faculty for DSU s designation as one of the inaugural four NSA Centers of Academic Excellence in Cyber Operations in charge of applying for the designation, organizing faculty and curriculum, and working with NSA personnel on the designation process. Primary investigator for the DSU Cyber Corps Scholarship Program funded by the National Science Foundation that provides full-ride scholarships to cyber security students. Author of The Basics of Web Hacking: Tools and Techniques to Attack the Web from Syngress Publishing. Named the 2011 DSU Researcher of the Year for external grants awarded related to cyber security. Assistant Professor Dakota State University Madison, SD 2006-2010 Taught undergraduate and graduate courses in web software security, ethical hacking, secure software engineering, intrusion detection, risk management, and related areas. Lead faculty for the creation the North Central region of the Collegiate Cyber Defense Competition (CCDC). Member of the DSU Research Committee Instructor Dakota State University Madison, SD 2004-2006 Developed and taught courses in systems analysis & design, introduction to programming, database management, and decision support systems. Faculty athletic representative in charge of certifying studentathlete eligibility per NAIA national bylaws. Teaching Assistant North Dakota State University Fargo, ND 2003-2004 Developed and taught a COBOL programming course for engineering majors. I taught one section of this course to approximately 30 engineering undergraduate students. Also

JOSH PAULI, PH.D. 3 held weekly tutor sessions for COBOL, C, Visual Basic, and other technology-related areas offered at NDSU. Teaching Assistant Dakota State University Madison, SD 2002-2003 Developed and taught a Visual Basic programming course as a general education course at DSU. I taught two sections of this class to approximately 50 students total. RELEVANT COURSES TAUGHT CSC 245 Information Security Fundamentals CSC 332 Systems Analysis & Design CSC 434 Web Software Security CSC 470 Software Engineering CSC 716 Secure Software Engineering CSC 748 Software Exploitation CSC 840 Full Scope Security Testing CSC 842 Security Tool Development INFA 729 Advanced Web Hacking INFA 734 Web Hacking RESEARCH GRANTS AND PUBLICATIONS Grants: 1. Aug. 2015: PI on $142,784 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded] 2. Aug. 2014: PI on $4,594,212 National Science Foundation Scholarship for Service (NSF-SFS) grant titled "DSU Cyber Corps Renewal". [awarded DGE-1423208] 3. May 2014: PI on $98,566 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded] 4. Jan. 2014: PI on $18,170 National Science Foundation grant titled "Expansion of CyberSTARS Summer Camp for 10-12 graders". [awarded DUE-1026114] 5. Aug. 2013: PI on $99,346 National Science Foundation grant titled "CyberSTARS Summer Camp for 10-12 graders". [awarded NSF award DUE-1026114] 6. Feb. 2013: PI on $98,079.33 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded] 7. Feb. 2012: PI on $46,081.41 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded]

JOSH PAULI, PH.D. 4 8. Jan. 2012: PI on $15,000 US Air Force Research Laboratory & University of Texas - San Antonio subaward for administering the 2012 North Central Region of the Collegiate Cyber Defense Competition. [awarded] 9. Aug. 2011: PI on $93,000 National Science Foundation grant titled "Online Banking Systems Security Research". [awarded NSF award DUE-1153336] 10. Aug. 2011: Co-PI on $400,000 National Science Foundation grant titled "MRI: Acquisition of an Online Banking System for Information Assurance Research". [awarded NSF award CNS-1123220] 11. Feb. 2011: PI on $70,926 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded] 12. Jan. 2011: PI on $1,305,565 National Science Foundation - Scholarship for Service (NSF-SFS) grant titled "Dakota Defenders Information Assurance Scholarship Program". [awarded NSF award DUE- 1026114] 13. Oct. 2010: PI on $10,000 Department of Homeland Security (DHS) grant for administering the 2010 North Central Region of the Collegiate Cyber Defense Competition. [awarded] 14. Oct. 2010: PI on $14,050 Department of Homeland Security (DHS) grant for administering the 2011 North Central Region of the Collegiate Cyber Defense Competition. [awarded] 15. Mar. 2010: Co-PI on $328,427 National Science Foundation - Research Experience for Undergraduates titled "REU Site: Information Assurance and Security". [awarded NSF award CNS- 1004843] 16. Jan. 2010: PI on $35,291.13 Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. [awarded] Publications: 1. J. Pauli. "Refining Use/Misuse/Mitigation Use Cases for Security Requirements". Journal of Software Engineering and Applications (JSEA) Volume 7 No. 8 2014. 2. J. Pauli and K. Haubris. "Improving the Efficiency and Effectiveness of Penetration Test Automation". Proc. of the 9th International Conference on Information Technology : New Generations (ITNG'13). April 2013, Las Vegas, NV, USA 3. T. Perez and J. Pauli: "Municipal E-Government Security: Insights from Municipalities in Orange County, California". Proc. of the The 2012 International Conference on e-learning, e-business, Enterprise Information Systems, and e-government (EEE'12). July 2012, Las Vegas, NV, USA 4. A. Podhradsky, J. Pauli, K. Streff, and P. Engebretson (2012): A Restructured Information Technology Risk Assessment Model for Small and Medium-Sized Financial Institutions. Journal of Accounting and Finance. ISSN# 2158-3625. In Press.

JOSH PAULI, PH.D. 5 5. R. Woelfel and J. Pauli. "Towards Tool-Driven Penetration Testing for Form-Based Authentication". Proc. of ISCA 27th INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS. March 2012, Las Vegas, NV, USA 6. A. Klindworth and J. Pauli. "An Introductory Look at Vulnerability Hunting". Proc. of the ISCA 27th INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS. March 2012, Las Vegas 7. H. Kam and J. Pauli. "Web Penetration Testing: Effectiveness of Student Learning in Web Application Security". Proc. of 2011 IEEE Frontiers in Education (FIE). October 2011. Rapid City, SD 8. A. Podhradsky, P. Engebretson, J. Pauli, and K. Streff. "A Restructured Information Technology Risk Assessment Model for Small and Medium-sized Financial Institutions". Proc. of 11th Annual Hawaii International Conference on Business. May 2011. Honolulu, HI, USA. 9. J. Pauli, M. Ham, M. Zautke, and P. Engebretson. "CookieMonster: Automated Session Hijacking Archival and Analysis". Proc. of the 7th International Conference on Information Technology : New Generations (ITNG 2011). April 2011, Las Vegas, NV, USA 10. P. Engebretson, J. Burroughs, and J. Pauli. Attack Traffic Libraries for Testing and Teaching Intrusion Detection Systems.Proc. of Information Systems Analysis and Synthesis: (ISAS 2011).March 2011. Orlando, FL, USA. 11. J. Windsor and J. Pauli. "Smashing Web Goat for Fun and Research: Static Code Scanner Evaluation", Proc of the 2010 OWASP AppSec DC Conference. Nov. 2010, Washington, DC, USA 12. J. Pauli and P. Engebretson. "Cradle-To-Grave Approach to Retaining Students in Information Security Programs ". Proc. of the 2010 International Conference on Security and Management (SAM'10). July 2010, Las Vegas, NV, USA 13. P. Engebretson, J. Pauli, and J. Bosma. "Lessons Learned From an Evolving Information Assurance Lab". Proc. of the 2010 International Conference on Security and Management (SAM'10). July 2010, Las Vegas, NV, USA 14. P. Engebretson and J. Pauli. "Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies". Proc. of the 6th International Conference on Information Technology : New Generations (ITNG 2009). April 2009, Las Vegas, NV, USA 15. P. Engebretson and J. Pauli. "Realizing Knock-Out Effect and Parent Mitigation Power for Detailed Attack Patterns: A Case Study". Proc. of the 9th IASTED International Conference on Software Engineering and Applications (SEA 2008). November 2008. Orlando, FL, USA 16. P. Engebretson, J. Pauli and K. Streff. "Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary". Proc. of the 2008 International Conference on Security and Management (SAM'08). July 2008, Las Vegas, NV, USA 17. J. Pauli, P. Engebretson, and K. Streff. "An Ethical Network Hacking Contest for Undergraduate Student Recruitment". Proc. of the 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'08). July 2008, Las Vegas, NV, USA

JOSH PAULI, PH.D. 6 18. J. Pauli. "Incentive-based Technology Start-up Program for Undergraduate Students". Proc. of the 5th International Conference on Information Technology : New Generations (ITNG 2008). April 2008, Las Vegas, NV, USA 19. P. Engebretson and J. Pauli. "Towards a Specification Prototype for Hierarchy-Driven Attack Patterns". Proc. of the 5th International Conference on Information Technology : New Generations (ITNG 2008). April 2008, Las Vegas, NV, USA 20. J. Pauli and P. Engebretson. "Hierarchy-Driven Approach for Attack Patterns in Software Security Education". Proc. of the 5th International Conference on Information Technology : New Generations (ITNG 2008). April 2008, Las Vegas, NV, USA 21. J. Pauli. "Breaking "Extends" Relationships for Use/Misuse/Mitigation Use Case Refinement". Proc. of the 16th International Conference on Software Engineering and Data Engineering (SEDE 2007). July 2007, Las Vegas, NV, USA 22. J. Pauli. "Leveraging the TabletPC in Systems Analysis and Design Courses". Proc. of the 16th International Conference on Software Engineering and Data Engineering (SEDE 2007). July 2007, Las Vegas, NV, USA 23. D. Xu and J. Pauli, "Threat-Driven Design and Analysis of Secure Software Architectures", Journal of Information Assurance (JIAS), Issue 3, Volume 1, 2006 24. J. Pauli. "The Role of Sequence Diagrams in Use/Misuse Case Decomposition for Secure Systems". Proc. of the 7th IASTED International Conference on Software Engineering and Applications (SEA 2006). November 2006. Dallas, TX, USA 25. J. Pauli and D. Xu, "Integrating Functional and Security Requirements with Use Case Decomposition", Proc. of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006). August 2006, Palo Alto, CA, USA 26. J. Pauli and D. Xu, "Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems", Proc. of the 18th International Conference on Software Engineering and Knowledge Engineering (SEKE 2006). July 2006, San Francisco, CA, USA 27. J. Pauli and D. Xu, "Threat-driven Architectural Design of Secure Information Systems", Proc. of the 7th International Conference on Enterprise Information Systems (ICEIS 2005). May 2005, Miami, FL 28. J. Pauli and D. Xu, "Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study", Proc. of the 3rd International Workshop on Verification & Validation of Enterprise Information Systems (VVEIS 2005). May 2005, Miami, FL, USA 29. J. Pauli and D. Xu, "Misuse Case-Based Design and Analysis of Secure Software Architecture", Proc. of the International Conference on Information Technology Coding and Computing (ITCC 2005). April 2005, Las Vegas, NV, USA