Diplomas/Degrees
Diplomas/Degrees
Ph.D., Tilburg University, The Netherlands (2007)
Doctorandus (M.Sc. equivalent), Tilburg University, The Netherlands (1997)
Licenses and Certifications
Licenses and Certifications
Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), GIAC Certified Forensics Analyst (GCFA)
Personal Statement
Personal Statement
My research and teaching interests include defensive cybersecurity, conceptual modeling and privacy.
Recent Courses
Recent Courses
Computer Science Senior Seminar I
Cyber Threat Analysis
Cybersecurity Concepts
Data Engineering Bootcamp
Graduate Thesis In Computer Science Cyber Threat Modeling
Graduate Thesis In Computer Science Indicators Of Ai- Enabled Cyber Risk
Graduate Thesis In Computer Science: The Role Of Malaware In Human Trafficking
Network And Cloud Security
Specialization/Interests
Specialization/Interests
I primarily teach courses related to cybersecurity and digital forensics.
I also enjoy teaching courses related to computer programming, databases, system design, etc.
Teaching Philosophy
Teaching Philosophy
It is my responsibility to develop students’ ability to engage in critical thinking based on factual knowledge and to instill a deep understanding of the subject matter introduced in class. Students must be able to engage in meaningful discourse and should be able to apply their expertise to theoretical discussions, as well as to practical case studies and real-world examples.
Research Interests
Research Interests
My primary research interests revolve around different aspects of cybersecurity and privacy. My research is grounded in access control theory, information security management and conceptual modeling. I focus on defensive cybersecurity, and work primarily on incident prevention and incident management.
International Experience
International Experience
Netherlands
Born & raised in the Netherlands; native speaker of Dutch. Academic degrees from Tilburg University.
Germany
Extensive work with faculty members at RWTH Aachen in period 1997-2006.
Books
Books
Leune, K. (2002). Access Control and Service-Oriented Architectures. Tilburg, Netherlands: CentER Dissertation Series no. 188, SIKS dissertation series 2007-01.
Articles
Articles
Robert M. Siegfried and Kees Leune. A Teaching Case: A Seminar Course in Accessible Computing In: 2022 Proceedings of the EDSIG Conference. Nov 2-5, 2022. Clearwater, FL, USA.
Kees Leune and Salvatore J. Petrilli. The Journal on Systemics, Cybernetics and Informatics: JSCI, Volume 19, Number 5 (2021), pages 55-62.
Robert M. Siegfried, Katherine G. Herbert, Kees Leune and Jason P. Siegfried. Trends of Commonly Used Programming Languages in CS1 and CS2 Learning. In Proceedings of the 16th IEEE International Conference on Computer Science and Education (ICCSE '21). IEEE, August 17-21, 2021, Lancaster, UK.
Leune, K. and Kim, S. (2021). Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling. In Proceedings of the 18th International Conference on Security and Cryptography, ISBN 978-989-758-524-1, ISSN 2184-7711, pages 385-394.
Kees Leune and Salvatore J. Petrilli. Re-Envisioning a Computer Science Curriculum. In Proceedings of the 25th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2021). July 18-21, 2021. Orlando, FL, USA.
Kees Leune and Jai Punjwani. Enhancing Electronic Voting With A Dual-Blockchain Architecture. In Ledger Journal, volume 6 (2021), pp. 42-57.
Katherine G. Herbert, Thomas J. Marlowe, Kees Leune, Robert M. Siegfried and Jeanette Wilmanski. 2021. Interdisciplinary STEM Undergraduate Programs and the Effectiveness of Computing Competencies within the Curriculum. In Proceedings of the IEEE Integrated STEM Education Conference (ISEC 2021).
Kees Leune and Sung Kim. 2020. Service-Oriented Modeling for Cyber Threat Analysis. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (CODASPY '20). Association for Computing Machinery, New York, NY, USA, 150–152. DOI:https://doi.org/10.1145/3374664.3379528
Leune, K. and Petrilli, S. (2019) The computing orientation seminar. In: ACM InRoads, Vol. 10, No. 3.
Leune, K., Petrilli, S. (2017) Using Capture-the-Flag to Enhance the Effectiveness of Cybersecurity Education. In Proceedings of the 18th Annual Conference on Information Technology Education (SIGITE '17). Pages 47-52. Rochester, New York, USA
Van den Heuvel, W-J., Leune, K. & Papazoglou, M.P. (2005), EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. Distributed and Parallel Databases, 18, 115-145.
Leune, K. (2004), Exploring a Multi-Faceted Framework for SOC: How to develop secure web-service interactions? (An extended abstract). Proceedings of RIDE'04.
Leune, K., Papazoglou M. & Van Den Heuvel, W-J. (2004), Specification and Querying Security Constraints in the EFSOC Framework. Proceedings of the International Conference on Service Oriented Computing.
De Troyer, O. & Leune, C.J. (1998), WSDM: A User-Centered Design Method for Web Sites. Computer Networks and ISDN systems, 30.
Conference Presentations
Conference Presentations
Henry, R., Howell, P., Leune, K., Marchany, R., Nevin, D. & Ooley, D. (2015). Never Waste a Crisis: Funding an Information Security Program Into The Future. In EDUCAUSE/Internet2 Security Professionals Conference. Minneapolis, MN.
Leune, K. & Bursey, A. (2014). Emerging Threats in Higher Education. In New York Higher Education Technology Forum. Greenvale, NY.
Boyle, C.A., and Leune, K. (2014). The Technology Infused Campus. In Long Island Council of Student Personnel Administrators’ Annual Conference. Garden City, NY.
Leune, K. (2013). Moderator and Organizer. In Adelphi University Cyber Crime and Identity Theft Symposium. Garden City, NY.
Henry, R. and Leune, K. (2013). When To Declare An Information Security Incident and How To Respond Once You Do. In EDUCAUSE/Internet2 Security Professionals Conference 2013. St. Louis, MO.
Leune, K., Becker, D., and Grigorescu V. (2013). How Advanced Log Management Can Trump SIEM. Tales of Woe and Glory. In EDUCAUSE/Internet2 Security Professionals Conference. St. Louis, MO.
Leune, K. (2013). “Business Continuity Planning after Hurricane Sandy” (moderator). In Adelphi University Center for Health Innovation. Garden City, NY.
Leune, K. (2012). Using Capture-The-Flag for Teaching and Training. In Educause/Internet2 Security Professionals Conference. Indianapolis, IN.
Leune, K. (2012). Threat Modeling. In OWASP Long Island. Garden City, NY.
Leune, K. (2012). Using Capture-The-Flag for Teaching and Training. An interactive discussion. In SOURCE Boston. Boston, MA.
Leune, K. (2012). The OWASP Top-10 and BackTrack 5. Hands-on vulnerability discovery and exploitation (part two). In OWASP Long Island. Garden City, NY.
Leune, K. (2011). The OWASP Top-10 and BackTrack 5. Hands-on vulnerability discovery and exploitation. In OWASP Long Island. Garden City, NY.
Leune, K. & Basgen B. (2011). Peering into the darkness. Implementing Security Information Event Management. In Educause/Internet2 Security Professionals Conference. San Antonio, TX.
Leune, K. (2011). The role of higher education in information security education and research (panel discussion). In SOURCE Boston. Boston, MA.
Leune, K. & Dodge, A. (2009). Information Security in Higher Education: Baby steps. In SOURCE Boston. Boston, MA.
Leune, K. & Tesink, S. (2006). Designing and developing an Application for Incident Response Teams. In Forum for Incident Response Teams Conference. Baltimore, MD.
Invited Presentations
Invited Presentations
Leune, K. (2016, March). Of All Things Cyber. Long Island Institute of Internal Auditors, Melville, NY.
Theses Advised
Theses Advised
Sam, Ann (in progress) Privacy and security of women’s health apps. Adelphi University Honors College Thesis.
Set, Thiha (2022) Netflow Visualization for Cyber Defense. Adelphi University Honors College Thesis.
Kokoris, Eleni (2020) Improving Phishing Awareness Through Gamification Techniques. Adelphi University Honors College Thesis.
Punjwani, Jai (2018) Understanding Blockchain and its Potential Applications on Electronic Voting Systems. Adelphi University Honors College Thesis.
Verba, Vlad (2018) Ramifications of Widespread Consumer Adoption of Personal Digital Assistants Using Speech Recognition Technologies. Adelphi University Honors College Thesis.
Honors and Accomplishments
Honors and Accomplishments
Nominated for global Web Application Security Professional of the Year award by the Open Web Application Security Project (OWASP) in 2012.
Named a Security Thought Leader by the SANS Institute in 2010.
Professional Activities
Professional Activities
Current
Reviewer for Elsevier Computers & Security journal (2017 - present)
Chief Information Security Officer at Adelphi University (2007 - present)
Past
Former adviser at the SANS Institute.
Former Faculty Adviser for the Adelphi ACM Chapter (2015-2021)
Former Board Member, OWASP Long Island (2014-2019)
REN-ISAC Membership Committee (Feb 2014 - Dec 2015)
SANS Advisory Board (since 2008)
Reviewer for the 2015 EDUCAUSE National Conference
Reviewer for the 2015 EDUCAUSE Security Security Professionals Conference
Program Committee Member of 2009 EDUCAUSE Security Professionals Conference
Links provided to external websites, including personal faculty sites, do not imply an endorsement by Adelphi University of those sites, their content, or associated products and services.