Reach out - www.linkedin.com/in/dr-nikki-robinson
PROFESSIONAL SUMMARY
I have been in IT and Security for most of my career, serving in Leadership, Operations, and Security roles. I began working on Corporate Helpdesk before moving to a customer site to become a Systems Administrator. I soon became a Senior Systems Administrator, while finishing my master’s degree. When I moved into a Remote Access Lead role, I started helping the Security team with investigations, as I was able to pull forensics data from virtual desktops. These opportunities began my appreciation and excitement in the Security world, and thus began the Doctorate program. I wanted to help understand why vulnerability scoring may impact prioritization and remediation. As well as helping leadership understand potential implications around not remediating medium and low vulnerabilities. My background in IT gives me the troubleshooting edge when it comes to vulnerabilities and common issues in cybersecurity. Security gives me the freedom to explore new technologies, methods of attack, and vulnerability management solutions, while also providing value to my customer. I love what I do and feel fortunate to get to help teach Cybersecurity along the way.
EDUCATION AND TRAINING
Capitol Technology University: PhD in Human Factors – complete December 2021
Dissertation Title: A Qualitative Exploratory Study into Vulnerability Chaining Blindness Terminology and Viability
Capitol Technology University: Doctor of Science (DSc) in Cybersecurity – complete April 2019
Dissertation Title: An Examination of Vulnerability Scoring Using Chained Vulnerability Attacks
Relevant Courses: Pedagogy in IA, IA Strategic Management, Applied Research in IA, Research Design
Capitol Technology University: Master of Science (MS), Information and Telecommunications Systems Management with a concentration in IA – complete December 2012
Relevant Courses: Malicious Software, Network Systems Security, Project Management, Managing Information Systems, Psychological Factors in Systems Management
University of Phoenix: Bachelor of Science (BS), Information Technology with a concentration in Software Engineering – complete August 2010
Relevant Courses: Web Development, Technical Writing, Java, SQL
SPEAKING ENGAGEMENTS
(Upcoming) Executive Women Forum (EWF 2024) - Cloud Environment Vuln Mgmt
(Upcoming) DevOps Days DC 2024 - Vulnerability Management
(Upcoming) Human Factors ASPIRE 2024 Conference - Human Factors Security
-DevOps Summit (Nov 2022).
-IBM PREVAIL (Oct 2022).
-United Women in Cyber Conference (Sept 2022)
-Web3 Summit (July 2022). Privacy and Security Panel
-DOE Cybersecurity and Technology Innovation Conference (Jun 2022). Who Watches the Watchers? and Keeping Ahead of the Threat
-CybHER Conversations (Jun 2022). How I got into Cybersecurity / Motivational talk
-DevSecOps Days Pittsburg (Apr 2022). Chaos Security Engineering
-ICIT Spring Briefing (Apr 2022). Secure Configuration in Government
-CyberChiCon (Apr 2022). Vulnerability Chaining Blindness
-CapTech Talks (Mar 2022). Critical Challenges between Private and Public
-GRIMMCONx06 (Dec 2022). Trapping the Truth: Using Behavioral Analysis
-Texas Cyber Summit (Oct 2021). Behavioral Psychology Techniques to Protect Systems.
-IBM PREVAIL Conference (Oct 2021). From Pentesting to Chaos Engineering
-InfraGard Maryland Annual Chapter Meeting (Oct 2021). Human Factors - Perception and Cognition
-CMS CISO Forum (Oct 2021). Vulnerability Chaining Deep Dive
-WiCyS Conference (Sept 2021). Vulnerability Chaining Blindness Study
-Cyberjustu Con (June 2021). The Emerging Field of Human Factors
-BSides SATX (June 2021). But what about those medium and low vulnerabilities!?
-BSides NoVA (June 2021). Integrating the Psychological concepts into Cyber Practices
-RSA Con (May 2021). Lab Team Lead for Human Factors Workshop
-DISA Monthly Meeting (Apr 2021). Linkage Blindness / Vulnerability Chaining PhD Research
-International Cybersecurity Leadership Con (Jan 2021). Topic: Bringing the Human Element to Cyber Leadership
-Capitol Technology University Webinar Series (Nov 2020). Topic: Increasing Sophistication Behind Business Email Compromise Attacks
-PrivSec Next Thursday (Jun 2020). Topic: Proactive Security Awareness
-WhiteSource Virtual Summit (Apr 2020). Topic: Secure Coding and Vulnerabilities
-DoD TechEx Conference (Mar 2020). Topic: Vulnerability Management
-BSides NoVA (Mar 2020). Topic: Let's Talk Vulnerability Chaining
CERTIFICATIONS
CISSP
CCSP
CEH / CNDA
MCITP (Multiple)
Certified Architect - The Open Group
Certified Technical Specialist - The Open Group
PUBLICATIONS / PODCASTS
BOOKS
Author - Effective Vulnerability Management - available on Amazon and Barnes & Noble
Author - Mind the Tech Gap - available on Amazon and Barnes & Noble
PODCASTS
-Cyber Pro Podcast - Human Factors in Cybersecurity
-Out of Band Podcast - The Art of Remediation
-Co-host on The Resilient Cyber Podcast (2021-2023)
-Cloud Security Podcast Takeover Episode - What is Cyber Resilience in Cloud Security?
-Human-Centered Security Podcast: Where do "people" fit in with process and technology?
-Cap Tech Podcast: Episode 9: Dr. Nikki Robinson on the Benefits of Being a Student in a Technical Field
PUBLICATIONS
-A Qualitative Exploratory Study into Vulnerability Chaining Blindness Terminology and Viability (Dec 2021)
-Vulnerability Chaining - Considerations Across the Enterprise (Jan 2021)
-Do Users Identify Password Strength? (Sep 2020)
-Scoring Vulnerabilities After Seeing a Chained Demonstration (Apr 2020)
-Shades of Perception: User Factors in Identifying Password Strength (Jan 2020)
-An Examination of Vulnerability Scoring Using Chained Vulnerability Attacks (Dissertation) (May 2019)
MISCELLANEOUS
-Exam Writer for CEH v11 (Oct 2020)
MOST RECENT EMPLOYMENT HISTORY
Security Architect
-Implemented Threat Hunting and Threat Intelligence practices into Security Engineering team
-Member of the Cloud Security Architecture Working Group
-Member of the Vulnerability Management Working Group
-Assist with investigations, to include the use of forensics tools and methodologies
-Provide reports and research on emerging threats and latest cybersecurity trends
-Conduct security assessments and testing for agency’s different cloud platform types (i.e., IaaS, SaaS, PaaS)
-Provide technical guidance and implementation of systems based on the NIST Risk Management Framework (RMF), NIST Cybersecurity Framework (CSF), NIST SP 800-53r5, and NIST SP 800-30
-Conduct on-demand scans, assessments, and audits to assess the security posture of on-premise / cloud-based systems
-Conduct vulnerability scans / assessments against agency systems, web applications and services
-Conduct assigned activities within the Incident Response and handling lifecycle
-Coordinate response, triage and recovery activities for security events affecting the agency’s information assets
-Assist with expanding and maturing existing vulnerability management and incident response processes and activities
-Created and conducted training on the NIST RMF to System Owner’s, ISSO’s, and Systems Administrators
Capitol Technology University (Laurel, MD) (2021-PResent)
Adjunct Professor, Doctoral Student Mentor / Chair
RSC 815 - Problem Solving with Quantitative Methods
RSC-825 - Strategy in Information Assurance
**Currently mentoring Doctoral students as both a Chair and committee member to support doctoral research and defense.
VOLUNTEERING
Advisor, Uniting Women in Cyber (2023-Present)
Assistant Director, Center for Women in Cyber, Capitol Technology University (2023-Present)
-Volunteer speaker for InfraGard, WomeninCyber (WiCyS) Chapters, ISSA, and Cyberjutsu organizations
-President, InfraGard Maryland Membership Alliance (2017-2023)
-Editor, InfraGard Maryland Monthly Newsletter (2017-2021)
-Review Committee, InfraGard National Journal (2017-2021)
ACADEMIC / CV
-ICIT Fellow beginning Jan 2022
-Moderated panel for ICIT Spring Briefing (2023)
-Spoke at the April 2022 ICIT Spring Briefing on Government Standards
-Cybrary Fellowship from October 2019 to October 2020
-Courses with Capitol Technology University
-Literature Review (Doctorate Research)
-Mobile Application Security (Healthcare)
-Problem Solving with Quantitative Methods
-Applied research in Information Assurance (IA)
-Research Theory and Practice
-Course with Cybrary (Feb 2020). Topic: Vulnerability Management: Enterprise Risk
-Course with Cybrary (Oct 2019). Topic: NIST Risk Management Framework for Executives
AWARDS
-August 2023 - Cyber Woman Influencer of the Year
-Jan 2022 - 40 Under 40 in Cybersecurity - TOP Cyber News Magazine
-October 2021 - GRC Awards (Nominee) - GRC Rising Star Award
-October 2021 - Cyberjutsu Awards (Nominee)
-August 2021 - InfraGard Southeast Regional Leadership Award
-October 2019 - InfraGard Leadership Academy Award