Barbara Endicott-Popovsky

Executive Director, Center for Information Assurance and Cybsersecurity Professor, University of Washington at UW Professional & Continuing Education

Schools

  • UW Professional & Continuing Education

Expertise

Links

Biography

UW Professional & Continuing Education

Research Interests

Information Assurance (IA), cybersecurity, digital forensics: Integrating experience in academia, industry and government, I apply a multi-disciplinary approach to research questions and curriculum development that address the unintended consequences of society’s embrasure of pervasive, networked computing. I have investigated questions concerning: cybersecurity, cloud security, digital forensics, digital forensic-readiness, risk management, cybersecurity pedagogy, secure coding practices, legal and societal impacts, information warfare.

Education

  • National Security Forum - Commandant Appointment, July 2015
  • The Army War College, Carlisle, Pennsylvania
  • National Security Forum - Washington National Guard Appointment, 2014
  • The Air War College, Montgomery, Alabama
  • Ph.D. Computer Science/Information Assurance, 2007
  • Center for Secure & Dependable Systems (CAE), University of Idaho
  • -Dissertation: A Methodology for Calibrating Forensic-Ready Low Layer Network Devices
  • -Committee: Deborah Frincke (Chair), Jim Alves Foss, John Dickinson, Dan Ryan, J.D., Ivan Orton, J.D
  • M.S. Information Systems Engineering, 1987
  • Seattle Pacific University, Seattle, WA
  • -Capstone: MIS System Design for United Way of King County
  • -Advisor, John McRoberts
  • M.B.A., University of Washington, 1985
  • -Advisor, Richard Moxon
  • -Thesis: Do the Rules of Trade Apply? An Examination of the Agreement on Trade in Civil Aircraft under GATT
  • 5th year Accounting, University of Washington, 1972
  • Early Admittance BA, English Literature, University of Pittsburgh, 1967

Professional Experience

Education

  • Executive Director, University of Washington, Bothell, Center for Information Assurance and Cybersecurity (2013-Present)
  • Affiliate Professor, Computing and Software Systems, University of Washington Bothell (2016-Present)
  • Senior Advisor for Cyber Security & IA, Global Business Analysis, Gig Harbor, Washington (2016-Present)
  • Affiliate Professor, Urban Planning Department, University of Washington (2016 - Present)
  • Professor, University Washington Institute of Technology, University of Washington Tacoma (2014-2016)
  • Research Associate Professor, Information School, University of Washington (2010-2014)
  • Adjunct Associate Professor, University of Washington Institute of Technology Tacoma (2012-2014)
  • Adjunct Associate Professor, Computing and Software Systems, University of Washington Bothell (2012-2016)
  • Department Fellow, Department of Information Studies, Aberystwyth University, Wales (2012-2017)
  • Academic Director, Master of Infrastructure Planning and Management, Urban Planning Department, University of Washington, Formerly, Director, Master in Strategic Planning for Critical Infrastructure (2010-2016)
  • NSA/DHS Center of Academic Excellence in Information Assurance Education and Research (CAE-R), Senior Lecturer, Joint Appointment, Information School, University of Washington, Institute of Technology Tacoma, Urban Planning Department (2005-2009)
  • Lecturer and Associate Professor, Department of Information and Computer Sciences, University of Hawaii at Manoa, visiting appointment under CIAC MOU (2005-Present)
  • Associate Director, UW Center of Information Assurance and Cybersecurity (CIAC), NSA/DHS Center of Academic Excellence in Information Assurance Education (CAE) (Fall 2004-2006)
  • Faculty, Computer Science and Software Engineering, Seattle University (1999 - 2005)

IT and IA Consulting

  • President, Endicott Consulting, Inc. (1996 -present)
  • Sr. Manager/IT, The Boeing Company (1978 -1997)
  • Adjunct Faculty, School of Business and Economics, Seattle Pacific University (1978 - 1997)

Honors and Recognition

International and national recognition for interdisciplinary education and research in information assurance/ cybersecurity.

  • 2016: Invited participant on ACM Task Force, replacing ABET, developing accreditation standards for
  • cybersecurity
  • 2016: Nominated for 2016 UW Distinguished Lifelong Learning Award
  • 2015: NIST/NICE Co-Chair Academic Working Group guiding adoption of the NICE framework
  • 2015: NIST/CSRIC committee member guiding development of communication industry input to NICE
  • framework
  • 2015: Elected to the Board of the Colloquium for Information Systems Security Education (CISSE)
  • 2015: CIAC re-designated as an NSA/DHS Center of Academic Excellence in Information Assurance
  • Research.
  • 2015: US Army Reserve MOU designating UW Tacoma as preferred provider for cybersecurity
  • education
  • 2015: Appointed by US Army War College Commandant to National Security Program, Carlisle, PA,
  • July, 2015.
  • 2015: Appointed Fellow American Academy of Forensic Scientists
  • 2015: Recognized as Outstanding Alumna Seattle Pacific University MS in Information Systems
  • Management.
  • 2014: UPCEA Western Regional Awards: Teaching Excellence and Credit Certificate (for ISRM)
  • 2014: Selected for the Air War College National Security Forum, Montgomery, Alabama, May, 2014.
  • (One of 5 civilians selected from the nominations from the graduating class of 2014.
  • 2014: UW recognized by Ponemon Institute as tied for the 10th best place to study cybersecurity in the
  • country. Read pdf.
  • 2014: Named as North American Chair of Interpares Trust www.interparestrust.org
  • 2013: Selected to lead Dagstuhl Seminar: Digital Evidence and Forensic Readiness, Daghstuhl
  • Germany, Feb. 2014.
  • 2013: Best Poster Award 13th Annual International Conference on Int'l Warfare. Denver, Colorado.
  • 2013: Appointed by Washington State Adjutant General and President of the University of Washington
  • to the Washington State Governor’s Uniform Coordinating Group for Cyber Disaster
  • Preparedness.
  • 2013: Named to the Washington State National Guard ICT Planning Group.
  • 2013: Academic representative to Cyber Storm IV.
  • 2013: Named to the National Visiting Committee of the National CyberWatch Center.
  • 2013: Named North American leader of Interpares Trust IV, international organization funded by
  • Canadian govt.
  • 2012: Named to the Advisory Board of Secure World.
  • 2012: Solicited to launch a column on Secure World blog.
  • 2012: Named to DHS Education and Workforce Development Working Group.
  • 2012: Information Assurance program selected by University of Washington for Coursera launch.
  • 2012: Honorary Department Fellow Appointment, Department of Information Studies, Aberystwyth
  • University.
  • 2012: Certified in Risk and Information Systems Control (CRISC).
  • 2011: CIAC Named Research Partner Cloud Security Alliance (CSA).
  • 2011: Full Member American Academy of Forensic Scientists: Digital & Multimedia Sciences Section.
  • 2011: Selected for National Board of Information Security Examiners (NBISE).
  • Smart Grid Cybersecurity Committee.
  • 2010: Inducted into American Academy of Forensic Scientists: Digital & Multimedia Sciences Section.
  • 2009: Named among the Top 10 Universities Preparing Cyber Security Professionals
  • 2008: Excellence in Teaching Award – Technology, University of Washington Educational Outreach.
  • 2008: CIAC Certified as one of the first NSA Center of Academic Excellence in Information Assurance
  • Research.
  • 2008: Named to the US Department of Energy Transformational Cybersecurity Committee.
  • 2007: CIAC recertified as an NSA Center of Academic Excellence in Information Assurance Education.

Teaching

University of Washington

Dr. Endicott-Popovsky's role through the Center for Information Assurance and Cybersecurity has been to develop academic programs in Information Assurance and Cybersecurity that align with Federal government NSA/DHS training standards, the de facto accrediting body for the field. At the University of Washington, she has developed, or advised in the development of, three new master degrees and the undergraduate transcriptable option in information assurance, 19 courses and developed, or acted in an advisory capacity, for six certificate programs offered through Professional and Continuing Education. In addition, she developed a flagship program, a three-course certificate, Information Security and Risk Management, (ISRM) that has been offered in each consecutive year since 2005 through Professional and Continuing Education and, beginning in 2007, in a second section for credit through the Master of Science in Information Management at the Information School (MSISM). Each year the ISRM curriculum requires re-development to maintain currency in the fast moving environment of cybersecurity. In AY 2012/13, the ISRM program was adapted for a MOOC offering through Coursera. Over 50,000 students have completed the MOOC series since inception. It has been the most successful offering from the University of Washington and is offered continually quarter after quarter.

For her work with the ISRM Certificate, Professional and Continuing Education (PCE) had awarded her a Teaching Excellence Award and recognition by UPCEA in 2014. She developed the courses for hybrid delivery, lectured in the University’s 2nd Life classroom, developed complete online programs and made use of a variety of technologies in the traditional classroom setting.

In addition, Dr. Endicott-Popovsky have guided academic development of cyber security programs at several partner universities through agreements entered into through the Center for Information Assurance and Cybersecurity: University of Hawaii Manoa, Aberyswyth University Wales, Columbia Basin Community College (launching a 4 year degree in cybersecurity in 2014).

Academic Program Development

Master of Cyber Leadership (MCL), 2014 to 2015 Led MCL program including further development of curriculum, aligning with NSA/DHS education training standards (placeholder for academic accreditation that is under discussion, but likely some years in the future.), integration of the two faculties (business and Institute), preparation for Milgard accreditation in Fall, recruiting efforts to increase exposure to industry. Master in Infrastructure Planning and Management (MIPM), 2011 to 2014 Led development of, and now provide academic direction for, a graduate degree program, Master in Infrastructure Planning and Management (MIPM), offered through the Urban Planning and Development Department in the College of Built Environments. The degree focuses on risks to critical infrastructure, including cyber threat vulnerability. MS Cyber Leadership UW Tacoma (MCL)/MS Cyber Security Engineering UW Bothell (MSCSE), 2012- 2013 Functioned in an advisory and curriculum development capacity for two new graduate degrees in cybersecurity offered at UW. IMT551-3, Coursera Information Assurance and Risk Management Certificate, 2012-2013 Pioneered development and delivery of the University's entry into MOOC offerings: https://www.coursera.org/#course/inforiskman Pacific Rim Collegiate Cyber Defense Competition In 2005, collaborating with West Point and Fort Lewis, I founded and launched the Pacific Rim Collegiate Cyber Defense Competition. Begun as an extension of the ISRM classroom, this event evolved into a regional competition that led to consistent wins for the University of Washington all nine years (2005-2013) and back-to-back national championships for UW in 2011 and 2012. The event was sponsored by Microsoft, Cisco Systems, Inc., Honeynet Alliance, Information Systems Security Association, Internap, National Information Assurance Training and Education Center (NIATEC) at Idaho State University and Pacific Northwest National Laboratories. Competing student teams came from University of Washington in Seattle, the University of Washington Institute of Technology Tacoma, DeVry University, Eastern Washington University, University of Alaska Fairbanks, University of Idaho, Highline Community College, Whatcom Community College, Evergreen State University, Western Washington State, Lewis and Clark, Idaho State University and volunteers from several others. In 2013, the event was sufficiently established to stand on its own and is being run and managed by a team of universities as volunteers.

Publications

Publications are peer-reviewed unless noted otherwise parenthetically.

Articles

  • Endicott-Popovsky, B.E, (2003, July/August). Ethics and teaching information assurance. IEEE Security and Privacy, 1(4), 65-67. (invited)
  • Endicott-Popovsky, B. and Lockwood, D. (2006). Deriving a capability maturity model for assessing the security of electric utilities. Academy of Information & Management Sciences Journal, 8(1), 1-18.
  • Endicott-Popovsky, B. and Lockwood, D. (2006). A social engineering project in a computer security course. Academy of Information & Management Sciences Journal, 9(1), 37-44.
  • Frincke, D., Oudekirk, S. and Endicott-Popovsky, B. (2006). Editorial: Resources for the computer and information assurance curriculum. ACM Journal on Educational Resources in Computing, 6(4), 1. (invited)
  • Endicott-Popovsky, B., Frincke, D., and Taylor, C. (2007). A theoretical framework for organizational network forensic readiness. The Journal of Computers, 2(3), 1-11.
  • Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34. (editorial review)
  • Simpson, J., Simpson, M., Endicott-Popovsky, B., and V. Popovsky. (2010). Secure software education: A contextual model-based approach. International Journal of Secure Software Engineering, 1(4), 35-61.
  • Duranti, L. and Endicott-Popovsky, B. (2010). Digital records forensics: An interdisciplinary program for forensic readiness. Journal on Digital Forensics, Security and Law, 5(2), 1-12.
  • Weller, A. and Endicott-Popovsky, B. (2010). Securing virtual worlds. SC Magazine.
  • Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., Du, Y. (2011). Top-down mandates and the need for organizational governance, risk management, and compliance in China: A discussion. China-USA Business Review, 10(5), 319-335.
  • Padith, A. and Endicott-Popovsky, B. (2011). Fuzzy clustering-based anomaly detection for updating intrusion detection signature files. Journal of Information Assurance and Security, 6(6), 462–468.
  • Endicott-Popovsky, B and Horowitz, D. (2012) Unintended consequences: Digital evidence in our legal system. IEEE Security and Privacy, 10(2), 80-83. (Subject to editorial review)
  • Alva, A. and Endicott-Popovsky, B. (2012) Digital evidence education in schools of law. Journal on Digital Forensics, Security and Law, 7(2), 75-88.
  • Armbruster, G., Endicott-Popovsky, B., and Whittington, J. (2012). Are we prepared for the economic risk resulting from telecom hotel disruptions? International Journal on Critical Infrastructure Protection. 5(2), 55-65.
  • Endicott-Popovsky, B. and Horowitz, D. (2012). Unintended consequences: Digital evidence in our legal system. Reprinted with permission of IEEE Security and Privacy in The Washington State Bar News: The official publication of the Washington State Bar Association. 66(8), 11-15. (Cover story)
  • Endicott-Popovsky, B. (2012). Privacy in the USA: Technological perspectives. Privacy and Data Protection: Managing Information Matters, 1(1), 5-7. (invited)
  • Endicott-Popovsky, B. and Popovsky, V. (2013). Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. ACM Inroads, 5(1), 57-68.
  • Miller, J., Chung, S., Escrib, T., Bai, Y., Endicott-Popovsky, B. and Whittington, J. Accuracy, security, and architecture impacts and challenges of mobile and web technologies: Geolocation field data collection in Washington State water resources, International Journal of Computing Applications, April 2014.
  • Endicott-Popovsky, B., Kuntze, N., Rudolph, C. Forensic Readiness: Emerging discipline for creating reliable and secure digital evidence. Journal of Harbin Institute of Technology, Special Edition on International Conference on Digital Forensics and Investigation ICDFI 2013, 2015, 22 (1):1-8.
  • Armbruster, G., Whittington, J., and Endicott-Popovsky, B. Strategic Communications Planning for a CISO: Strength in Weak Ties. Proceeding of the 18th Colloquium for Information System Security Education. (CISSE, Edition Two), Issue 2, June 2014. pp. 134-150.
  • Tweneboah-Koduah, S., Endicott-Popovsky, B., Tse-Tse, A. Barriers to Government Cloud Adoption: The Ghanaian Perspective. International Journal of Managing Information Technology (IJMIT) Vol.6, No.3, August 2014, pp.1-16.
  • Tweneboah-Koduah, S., Tsetse, A. and Endicott-Popovsky, B. (2015). Ontology of Infrastructure-as-a-Service Cloud Model. Journal of Computers and Electrical Engineering, TBD.
  • Endicott-Popovsky, B. The Probability of 1. Journal of Cyber Security and Information Systems. 2015, Vol.3 (1), pp.18-19.
  • Endicott-Popovsky, B., Kuntze, N., & Rudolph, C. (2015). Forensic Readiness: Emerging Discipline for Creating Reliable and Secure Digital Evidence. Journal of Harbin Institute of Technology, 1, 001.
  • Endicott-Popovsky, B., Popovsky, V., Osterli, P. Rosario, P. and Nelson, S. (2015). Conceptual Foundation for UW Center of Academic Excellence in Information Assurance Education. Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 2, Issue 2, pp. 58-83.
  • Burn, H., Mulcahy, M., Endicott-Popovsky, B. (2015). Easing Student Veterans’ Transition to Cybersecurity and STEM through a “Math Boot Camp.” Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 2, Issue 2, pp. 84-102.
  • Zantua, M., Dupuis, M., Endicott-Popovsky, B. (2015). Re-Engineering the Cybersecurity Human Capital Crisis. Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 2, Issue 2, pp. 156-162.
  • Moore, E., Popovsky, V., Endicott-Popovsky, B. (2015). VetsEngr: Easing Student Veterans’ Transition to Cybersecurity Careers. Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 2, Issue 2, pp. 184-195.
  • Nelson, S. and Endicott-Popovsky, B., (2016). Cyber Public Private Partnership ICS/SCADA and Critical Infrastructure Protection Strategic Vision.. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 3, Issue 2.pp. 7-20.

Conference Papers

  • Knight, K. and Endicott-Popovsky, B. (1997 October). Information Systems Infrastructure: A Facilitator or Calcifier? In Proceedings of the Academy of Information and Management Sciences, Maui, Hawaii. pp. 12-18.
  • Endicott-Popovsky, B. and Lockwood, D. (2002 October). Social engineering in a computer security course. Paper presented at Academy of Information and Management Sciences, Las Vegas, Nevada. Las Vegas, Nevada.
  • Endicott-Popovsky, B. and Frincke, D. (2003 June). A case study in rapid introduction of computer security curricula. Paper presented at 7th Colloquium for Information Systems Security Education, Washington, D.C. (CD-ROM).
  • Endicott-Popovsky, B. and Frincke, D. (2004 March). A case study in rapid introduction of a computer security track into a software engineering curriculum. In Proceedings of IEEE Computer Society Press 17th Conference on Software Engineering Education and Training. Norfolk, Virginia. Los Alamitos, CA: IEEE Publishing, pp. 118-123.
  • Endicott-Popovsky, B.E., Frincke, D., Dittrich, D., et.al. (2004 June). The Manuka Project. In Proceedings of 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop. United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp. 314-320.
  • Endicott-Popovsky, B., Frincke, D., Popovsky, V. (2004 June). Designing a computer forensics course for an information assurance track. In Proceedings of 8th Colloquium for Information Systems Security Education, United States Military Academy, West Point, New York, pp.59-64. (CD-ROM)
  • Taylor, C., Popovsky, V., Endicott-Popovsky, B. (2005 February). International curriculum design for undergraduate computer science. Paper presented at ACM Special Interest Group on Computer Science Education (SigCSE), St. Louis, Missouri.
  • Popovsky, V. and Endicott-Popovsky, B. (2005). Grigoriev, V.E. (Ed.), Physical culture pedagogy: Coaching by design. In Proceedings of Methods for Modernizing Physical Culture: Selection of Scientific and Methodological Works. St. Petersburg, Russia: Lesgaft National State University Press, pp. 176-187. (invited)
  • Endicott-Popovsky, B., Frincke, D., Popovsky, V. (2005 June). Secure code: The capstone class in an IA track. In Proceedings of 9th Colloquium for Information Systems Security Education, Georgia Institute of Technology Atlanta, Georgia. Stoughton, WI: The Printing House Inc., pp.100-108.
  • Endicott-Popovsky, B., Orton, I., Bailey, K. Frincke, D. (2005 June). Community security awareness training. In Proceedings of 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp.373-379.
  • Endicott-Popovsky, B.E., Seifert, C. Frincke, D. (2005 June). Adopting extreme programming on a graduate student project. In Proceedings of 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp.454-455.
  • Endicott-Popovsky, B, Ryan, D., Frincke, D. (2005 September). The New Zealand Hacker Case: A post mortem. Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference, Oxford Internet Institute, Oxford, England.
  • Endicott-Popovsky, B. and Frincke, D. (2006 June). Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations. In Proceedings of 7th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp.133-139.
  • Endicott-Popovsky, B. and Frincke, D. (2006 January). Adding the Fourth 'R': A systems approach to solving the hacker's arms race. Paper presented at Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symposium. Kauai, Hawaii (invited).
  • Endicott-Popovsky, B., Chee, B. and Frincke, D. (2007 January). Role of calibration as part of establishing foundation for expert testimony. Paper presented at 3rd Annual IFIP WG 11.9 Conference, Orlando, Florida.
  • Taylor, C., Endicott-Popovsky, B., and Phillips, A. (2007 April). Forensics education: Assessment and measures of excellence. In Proceedings of 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, Washington. Los Alamitos, CA: IEEE Publishing, pp.155-165.
  • Endicott-Popovsky, B., Fluckiger, J. and Frincke, D. (2007 April). Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration need. In Proceedings of 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, Washington. Los Alamitos, CA: IEEE Publishing, pp.131-146.
  • Erbacher, R., Endicott-Popovsky, B., and Frincke, D. (2007 April). Challenge paper: Validation of forensic techniques for criminal prosecution. In Proceedings of 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, Washington. Los Alamitos, CA: IEEE Publishing, pp.150-154. (invited)
  • Endicott-Popovsky, B. and Frincke, D. (2007 July). Embedding Hercule Poirot in networks: Addressing inefficiencies in digital forensic investigations. In Proceedings of Human Computer Interface (HCI) Conference, Beijing, China. Berlin, Germany: Springer-Verlag, pp. 364-372.
  • Taylor, C., Endicott-Popovsky, B., and Frincke, D. (2007 August). Specifying digital forensics: A forensics policy approach. In Proceedings of 7th Digital Forensic Research Workshop, Pittsburgh, Pennsylvania, Oxford, UK: Elsevier, pp. 101-104.
  • Seifert, C., Steenson, R., Welch, I., Komisarczuk, Endicott-Popovsky, B. (2007 August). Capture: A tool for behavioral analysis of applications and documents. IN proceedings of 7th Digital Forensic Research Workshop, Pittsburgh, Pennsylvania. Oxford, UK: Elsevier, pp. 23-30.
  • Endicott-Popovsky, B and Frincke, D. (2007 June). The observability calibration test development framework. In Proceedings of 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp. 61-66.
  • Taylor, C., Endicott-Popovsky, B. and Frincke, D. (2007 November). Specifying digital forensics: Formalizing forensics policies. Paper presented at Annual Meeting of the Institute for Operations Research and Management Science Conference, Seattle, Washington.
  • Popovsky, V. and Endicott-Popovsky, B. (2007 December). Physical culture pedagogical system. In Proceedings of the III International Congress: People, Sport and Health. St. Petersburg, Russia: Lesgaft National State University Press, pp.322-324. (invited)
  • Popovsky, V. and Endicott-Popovsky, B. (2008). Integrating academics, the community and industry. In Proceedings of Physical Culture and Sports: Analysis of Social Processes. St. Petersburg, Russia, 24-27 September (pp. 239-243). St. Petersburg, Russia: Lesgaft National State University Press. (invited)
  • Bunge, R., Chung, S. Endicott-Popovsky, B., McLane, D. (2008 January). An operational framework for service oriented architecture network security. In Proceedings of Hawaii International Conference on System Sciences (41), Hilo, Hawaii. Los Alamitos, CA: IEEE Publishing, pp. 312-321.
  • Seifert, C, Endicott-Popovsky, B., Frincke, D., Komisarczuk, P., Muschevici, R, and Welch, I. (2008 January). Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots. Paper presented at 4th Annual IFIP WG 11.9 Conference, Kyoto, Japan.
  • Bonderud, P., Chung, S. and Endicott-Popovsky, B. (2008 June). Toward trustworthy service consumers and producers. In Proceedings of 3rd International Conference on Internet and Web Applications and Services, Athens, Greece. Los Alamitos, CA: IEEE Publishing, pp. 451-456.
  • Nevins, T., Narvaez, J., Marriott, W. and Endicott-Popovsky, B. (2008 September). Data classification and binding: Models for compliance. Paper presented at Information Systems Compliance and Risk Management Institute, Seattle, Washington: University of Washington.
  • Boucher, K., and Endicott-Popovsky, B. (2008 September). Digital forensics and records management: What we can learn from the discipline of archiving. Paper presented at Information Systems Compliance and Risk Management Institute, Seattle, Washington: University of Washington.
  • Aval, C., Seifert, C., Welch, I., Komisarczuk, P., Endicott-Popovsky, B. (2008 October). Identification of malicious web pages through analysis of underlying DNS and web server relationships. In Proceedings of 4th IEEE LCN Workshop on Network Security, Montreal, Canada. Los Alamitos, CA: IEEE Publishing, pp. 935-941.
  • Eisenberg, M., Endicott-Popovsky, B and Popovsky, V. (2009). Information, sports and academia. In Proceedings of Sports Games: At Present and the Future in Honor of the 75-Year Anniversary of the Sports Game Department of the Lesgaft State University. St. Petersburg, Russia, (pp. 222-225). St. Petersburg, Russia: Lesgaft National State University Press. (invited)
  • Endicott-Popovsky, B., Narvaez, J., Seifert, C., Frincke, D., O’Neil, L., and Aval, C. (2009 October). Use of deception to improve client honeypot detection of drive-by-download attack. In Proceedings of Human Computer Interface (HCI) Conference, San Diego, California. Berlin, Germany: Springer-Verlag, pp. 138-147.
  • Narvaez, J., Endicott-Popovsky, B., Seifert, C., Aval, C. and Frincke, D. (2010 January). Drive-by downloads. In Proceedings of Hawaii International Conference on System Sciences (43), Koloa, Kauai, Hawaii. Los Alamitos, CA: IEEE Publishing, pp.1-10.
  • Aval, C., Narvaez, J., Seifert, C., Endicott-Popovsky, B. (2010 March). Bare-metal support for Capture-HPC. Paper presented at the Annual Honeynet Project Workshop. Mexico City, Mexico. (invited)
  • Nagmoti, R, Chung, S. and Endicott-Popovsky, B. (2010 April). Game programmers with secure coding: From console to web services applications. Paper presented at 3rd Annual International Conference on
  • Computer Games, Multimedia and Allied Technology (CGAT), Singapore.
  • Simpson, J. and Endicott-Popovsky, B. (2010 July). System security capability assessment model development and application. Paper presented at 20th Anniversary INCOSE International Symposium (INCOSE), Chicago, Illinois. (CD-ID535).
  • Narvaez, J., Aval, C., Endicott-Popovsky, B., Seifert, C., Malviya, A., and Nordwall, D. (2010 May). Assessment of virtualization as a sensor technique. In Proceedings of 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, in conjunction with the IEEE Security and Privacy Symposium, Oakland, California. Los Alamitos, CA: IEEE Publishing, pp.61-65.
  • Duranti, L. and Endicott-Popovsky, B. (2010 May). Digital records forensics: An interdisciplinary program for forensic readiness. Paper presented at Conference on Digital Forensics, Security and Law, St. Paul, Minnesota.
  • Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I. and Du, Y. (2010 July). Top-down mandates and the need for organizational governance, risk management, and compliance in China: A discussion. In Proceedings of 6th Asian-Pacific Economic Association Conference (APEA), Hong Kong, China. pp. 1-17. Paper retrieved from
  • Simpson, J. and Endicott-Popovsky, B. (2010 June). A systematic approach to information systems security education. In Proceedings of 14th Colloquium for Information Systems Security Education, Baltimore, Maryland. Stoughton, WI: The Printing House Inc., pp.173-179.
  • Chung, S. and Endicott-Popovsky, B. (2010 June). Software reengineering based security teaching. In Proceedings of the 7th Annual International Conference on International Conference on Cybernetics and Information Technologies, Systems and Applications: CITSA 2010 in the context of the 3rd International Multi-Conference on Engineering and Technological Innovation: IMETI 2010, Orlando, Florida. pp.1-7.
  • Duranti, L. and Endicott-Popovsky, B. (2010 September). Digital records forensics: An interdisciplinary program for forensic readiness. Paper presented at 2nd Annual ACM Northeast Digital Forensics (Nefx). Georgetown University, Virginia. Abstract retrieved from http://nefx.cs.georgetown.edu/program.html (invited)
  • Malviya, A., Fink, G., Sego, L. and Endicott-Popovsky, B. (2011 April). Situational awareness as a measure of performance in cyber security collaborative work. In proceedings of IEEE 8th International Conference on Information Technology: New Generation (ITNG), Las Vegas, Nevada. Los Alamitos, CA: IEEE Publishing, pp. 937-942.
  • Hansel, L., Chung, S. and Endicott-Popovsky, B. (2011 June). Software reengineering approach to teaching secure coding practices. In Proceedings of the 15th Colloquium for Information Systems Security Education, Fairborn, Ohio. Stoughton, WI: The Printing House Inc., pp. 29-36.
  • Wainwright, K., Endicott-Popovsky, B., Rajala, S. (2011 June). Alternative approach to assessing military training for advanced placement into engineering and technology programs. Paper presented at 118th Annual ASEE Conference and Exposition, Vancouver, BC. (AC 2011-165).
  • Lysenko, V., Endicott-Popovsky, B. (2012 March). Hackers at the state service: Cyberwars against Estonia and Georgia. In Proceedings of the 7th International Conference on Information Warfare and Security ICIW, University of Washington, Seattle. Reading, UK: Academic Publishing Limited. pp. 404-407.
  • Smith, S. and Endicott-Popovsky, B. (2012 April). Folk wisdom as forward thinking: Applying the ideas of our past for a more resilient future. Paper presented at The Critical Infrastructure Symposium, Arlington, Virginia.
  • Armbruster, G., Endicott-Popovsky, B., Whittington, J. (2012 March). The Seattle Westin meet-me room: Unacceptable risk to our Internet structure. Paper presented at Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, National Defense University, Fort McNair, Washington D.C.
  • Rudolph, C., Großkopf, L., Endicott-Popovsky, B., Kemmerich, T., Kuntze, N., Alva, A., Christiansen, J. (2012 September). Sicherheit von Messgeräten und der Beweiswert digitaler Daten [Safety of measuring instruments and the probative value of digital data]. In Proceedings of D-A-C-H Security. Konstanz, Germany, pp. 338-345.
  • Endicott-Popovsky, B., Chung, S., Popovsky, V. (2012 June). Provisioning secure coding curricular resources: Toward robust software. In Proceedings of the 16th Colloquium for Information Systems Security Education, Buena Vista, Florida. Stoughton, WI: The Printing House Inc., pp. 27-33.
  • Dupuis, M., Crossler, R., Endicott-Popovsky, B. (2012 September). The information security behavior of home users: Exploring a user's risk tolerance in the framework of protection motivation theory. Paper presented at Dewald Roode Information Security Workshop organized by IFIP 8.11/11.13 Working Group. Provo, Utah.
  • Alva, A., David, S. and Endicott-Popovsky, B. (2012 September). Forensic Barriers: Legal Implications of Storing Information in the Cloud. Paper presented at 7th International Workshop on Systematic Approaches to Digital Forensic Engineering of UNESCO The Memory of the World in the Digital Age: Digitization and Preservation Conference, Vancouver, BC.
  • Chung, S., Chung, S., Escrig, T., Bai, Y., Endicott-Popovsky, B. (2012 December). 2TAC: Distributed access control architecture for “Bring Your Own Device” security. Paper presented at Redefining and Integrating Security Engineering (RISE) Workshop, Washington, D.C.
  • Kim, W., Moon, C., Chung, S., Escrig, T., Endicott-Popovsky, B. (2012 December). Scalable and reusable attack aware software, Workshop on Redefining and Integrating Security Engineering (RISE). In Proceedings of the 2012 ASE/IEEE International Conference on Cybersecurity, Washington, D.C.
  • N. Kuntze, C. Rudolph, A. Alva, B. Endicott-Popovsky, J. Christiansen, and T. Kemmerich. (January 2012) On the Creation of Reliable Digital Evidence. Paper presented at Eighth Annual IFIP WG 11.9 International Conference.
  • Endicott-Popovsky, B., Horowitz, D. (2013 February). Unintended consequences: Digital forensics literacy and the legal system. Paper presented at 65th Annual Scientific Meeting of the American Academy of Forensic Scientists, Washington, D.C.
  • Armbruster, G., Endicott-Popovsky, B., Whittington, J. (2013 March). The Cyber threat of aging infrastructure: A municipal case study. Paper presented at Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, National Defense University, Fort McNair, Washington D.C.
  • Endicott-Popovsky, B. and Jansen, A. (2013 June). Integrating digital forensics and archival science: Creating a Preservation-Ready environment. Paper presented at the 2013 Conference of the International Council on Archives, Barbados, West Indies.
  • Crosby, M., Endicott-Popovsky, B., Heller, R. (2013 June). From sea to shining sea: Bringing Federal cybersecurity issues into classrooms outside the Beltway. HUIC Education and Technology: Math and Engineering Technology Conference 9-12 June, Honolulu, Hawaii.
  • Fink, G., Best, D. Manz, D., Popovsky, V. and Endicott-Popovsky, B. (2013 July). Gamification for measuring cyber security awareness. Paper presented at Human Computer Interface (HCI) Conference, Las Vegas, Nevada. Published in Foundations of Augmented Cognition Lecture Notes in Computer Science Volume 8027 Berlin, Germany, Springer, pp. 656-665.
  • Endicott-Popovsky, B. Hinrichs, R., Frincke, D. (2013 July). Leveraging 2nd Life as a communications media: An effective tool for security awareness training. Paper presented at 2013 IEEE Professional Communications Society. Vancouver, B.C. Abstract retrieved from http://nefx.cs.georgetown.edu/program.html (invited)
  • Rudolph, C., Kuntze, N., Endicott-Popovsky, B. (2013 October). Forensic Readiness for cloud-based distributed workflows. Paper presented at the 1st Annual International Conference on Cloud Security Management, Seattle, Washington. pp. 59-67.
  • Schweiger, M., Chung, S., Endicott-Popovsky, B. (2013 October). Malware analysis on the Cloud: Increased performance, reliability and flexibility. Paper presented at the 1st Annual International Conference on Cloud Security Management, Seattle, Washington. pp. 127-135.
  • Dupuis, M., Endicott-Popovsky, B., Crossler, R. (2013 October). An analysis of the use of Amazon’s Mechanical Turk for survey research in the Cloud. Paper presented at the 1st Annual International Conference on Cloud Security Management, Seattle, Washington. pp. 10-19.
  • Moon, C., Chung, S., Endicott-Popovsky, B. (2013 August). Architecture for insider threat detection system using cloud computing and in-memory database with emphasis on database server logs. Paper presented at US-Korea Conference, Meadowland, New Jersey.
  • Moon, C., Chung, S., Endicott-Popovsky, B. (2013 August). A Cloud and in-memory-based two-tier architecture of a database protection system from insider attacks. Paper presented at 14th International Workshop on Information Security Applications, Jeju Island, Korea.
  • Kuntze, N., Rudolph, C., Schilling, H., Alva, A., Bribois, B. and Endicott-Popovsky, B. (2013 November). Seizure of digital data and “selective suppression” of digital evidence. Paper presented at 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), University of Hong Kong, Hong Kong.
  • Chung, S. Wu, Y., Escrig, T., and Endicott-Popovsky, B. (2014 March) Toward software assurance: Infusing a threat modeling methodology into beginning level programming courses. Paper to be presented at CCSC: SW 2014 Conference, California State University, Northridge, Los Angeles, California.
  • Lysenko, V., Endicott-Popovsky, B. (2014 March). Use of the cyber ICTs during the Ukrainian protests of 2013/14. In Proceedings of the 9th International Conference on Information Warfare and Security ICIW, Purdue University, West Lafayette, Indiana: Academic Publishing Limited.
  • Dupuis, M., Endicott-Popovsky, B. (2014 March). The art of cyber warfare: An exploration of classic military strategies and the threat against home users. In Proceedings of the 9th International Conference on Information Warfare and Security ICIW, Purdue University, West Lafayette, Indiana: Academic Publishing Limited. pp. TBD.
  • Kemmerich, T., Junge, F., Kuntze, N., Rudolph, C., Endicott-Popovsky, B. Grobkopf, L. (2014 May) Generation and handling of hard drive duplicates as piece of evidence, Paper to be presented at Conference on Digital Forensics, Security and Law, Richmond, Virginia.
  • Armbruster, G., Whittington, J., Endicott-Popovsky, B. (2014 June) Strategic planning for a CISO: Strength in weak ties. In Proceedings of the 18th Colloquium for Information Systems Security Education, San Diego, California. Stoughton, WI: The Printing House Inc., pp. 134-150.
  • Chung, S., Hansel, L., Bai, Y, Moore, E., Taylor, C., Crosby, M., Heller, R., Popovsky, V. Endicott-Popovsky, B. (2014 June) What approaches work best for teaching secure coding practices? Paper presented at HUIC Education and STEM Conference 16-18 June, Honolulu, Hawaii.
  • Kuntze, N., Rudolph, C., Leivesley, S., Hanna, J., Endicott-Popovsky, B. (June 2014). Novel approaches to cyber defense: Strategic analysis and assessments in the operating environment with case study of distributed energy systems sustainability. Paper presented at the SAS-106 Symposium on Analysis Support to Decision Making in Cyber Defense. Talinn University, Talinn, Estonia.
  • Kuntze, N., Rudolph, C., Leivesley, S., Manz, D., Endicott-Popovsky, B. (July 2014). Resilient core networks for energy distribution. Paper presented at the IEEE Power & Energy Society General Meeting (PESGM2014) 27-31 July, Washington, D.C.
  • Moon, S., Chung, S. Endicott-Popovsky, B. (2014) Monitoring Insider Attack in Dynamic Database Systems Using Multiple-Criteria Query Statement Probabilities. International Conference on Cloud Security Management. University of Washington Tacoma. Retrieved at: https://www.tacoma.uw.edu/sites/default/files/sections/InstituteTechnology/S_Moon.pdf
  • Kuntze, N. Rudolph, C., Schilling, H., Alva, A., Brisbois, B., Endicott-Popovsky, B. (September 2014). Seizure of digital data and “selective suppression” of digital evidence. Paper presented at 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) at IEEE/International Conference on Digital Forensics and Cyber Crime, 18-20 September, New Haven, Connecticut. pp.1-6.
  • Boggess, M., Brisbois, B., Kuntze, N., Endicott-Popovsky, B. (October 2014). A Conceptual Model of a Trustworthy Voice Signature Terminal. Paper presented at the 2nd Annual International Conference on Cloud Security Management, Reading, United Kingdom, pp. 27-35.
  • Endicott-Popovsky, B. and Popovsky, V. (2015) Activity-Based Approach to Developing Professionals within Higher Education Programs. 1st Annual Conference at the Department of Physical Education. St. Petersburg, State Institute of Film and Television. St. Petersburg, Russia.
  • Kuntze, N. Rudolph, R., Boggess, M., Brisbois, B., Endicott-Popovsky, B. (2015). Security vs. Safety: Why People Die in Spite of Good Safety. IEEE Integrated Communications, Navigation and Surveillance Conference (ICNS) April 21-23, 2015. Herndon, Virginia.
  • Endicott-Popovsky, B., David, S., Crosby, M. (2015). Setting a Privacy and Security Comfort Zone in the Internet of Things. Presented at the 17th Annual Human Computer Interaction (HCI) Conference, Los Angeles, CA, August 2-7, 2015.
  • Endicott-Popovsky, B., Horowitz, D., Alva, A. Schilling, H., Rudolph, R., Kuntze, N. (2015) Implications for Digital Forensics Investigations of the UD 2d Circuity Ruling Upholding Deletion of Nonresponsive Computer Files: A US and EU/Germany Perspective. 67th Annual Scientific Meeting of the American Academy of Forensic Scientists, February 16-21, 2015. Orlando, Florida.
  • Dupuis, M., and Crossler, R., and Endicott-Popovsky, B. Measuring the Human Factor in Information Security and Privacy. In Proceedings of Hawaii International Conference on System Sciences (HICSS) 49 Kauai, Hawaii. 2016 49th Hawaii International Conference on Systems Science, TBD.

Pending Articles:

  • Kuntze, N., Rudolph, C., Endicott-Popovsky, B., David, S., Momsen, C., Groskopf, L., Venter, H. JailBreaks and RootKits in the Forensic Evidence Extraction Process.
  • Endicott-Popovsky, B. and David, S. (2016). Security Beyond Secrets: Applying Augmented Cognition. 18th HCI International, Toronto, Canada.

Refereed Short Papers (with Posters)

  • Endicott-Popovsky, B., Frincke, D. (2004, June). Adding the fourth "R." In Proceedings of 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop. United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp.442-443.
  • Endicott-Popovsky, B. and Frincke, D. (2005, September). Redefining computer security to include forensics. Poster presented at 8th Annual Recent Advances in Intrusion Detection (RAID) Conference, Seattle, Washington.
  • Endicott-Popovsky, B. and Whittington, J. (2010 September). Dams: Our critical infrastructure, an educational model. Presented at the ASDSO 2010 Dam Safety Conference. Seattle, Washington. (invited)
  • Le Mieux, V., Endicott-Popovsky, B., Eckler, K., Dang. T. and Jansen, A. (2011 October). Visualizing an information assurance risk taxonomy, IEEE Conference on Visual Analytics and Technology (VAST), Providence, Rhode Island. In Proceedings of Los Alamitos, CA: IEEE Publishing. pp. 287-288.
  • Rochat, T., Chung, S., Endicott-Popovsky, B. (2012 June). Assuring a Private Cloud for Academic Computing with High Assurance Platform Framework. Short paper presented at 16th Colloquium for Information Systems Security Education. Buena Vista, Florida. Stoughton, WI: The Printing House Inc.
  • Lysenko, V., Endicott-Popovsky, B. (2013 March). Action and reaction: Strategies and tactics of the current political cyberwarfare in Russia. Poster presented at the 13th Annual International Conference on International Warfare. Denver, Colorado.
  • Alexander, O., Chung, S., Endicott-Popovsky, B. (2013 March). Attack-Aware Supervisory Control and Data Acquisition (SCADA). Poster presented at the 13th Annual International Conference on International Warfare. Denver, Colorado. (Best Poster Award)
  • Whittington, J., Theodore, B., Towle, C., Tauben, D., Endicott-Popovsky, B. and Doorenbos, A. (2013 April) Poster presented at Transaction Cost and Cyber-risk Analysis: Telehealth and Care in Clinic for Chronic Pain, University of Washington Club, University of Washington, School of Medicine, Department of Anesthesiology and Pain Medicine, 6th Annual Academic Evening.
  • Crosby, M., Heller, R., Endicott-Popovsky, B. (2013 June). From Sea to Shining Sea: Bringing Federal Cybersecurity Issues into Classrooms Outside the Beltway. Paper presented at Hawaii University International Conference (HUIC) on Education and Technology. Honolulu, Hawaii.
  • Chung, S., Wu, Y., Escrig, T., Lee, Y., Endicott-Popovsky, B. (2013 June). Round Table – Information Assurance Topics: Software Assurance (SwA) Knowledge, Skills, and Abilities (KSA) for Beginning Level Programmers: Secure Scrum = Threat Modeling + Scrum. Presented at 17th Colloquium for Information Systems Security Education. Mobile Bay, Alabama.
  • Evans, M., Lysenko, V., Endicott-Popovsky, B. (2013 October). Proactive vs. reactive: Securing the critical data transport in the Cloud. Paper and poster presented at the 1st Annual International Conference on Cloud Security Management. Seattle, Washington.
  • Kim, W., Chung, S. and Endicott-Popovsky, B. (2013 October). Identity management and access control for Cloud-hosted web services using OpenID Connect. Poster presented at the 1st Annual International Conference on Cloud Security Management. Seattle, Washington.
  • Alexander, O., Chung, S., Endicott-Popovsky, B. (2013 October). Towards a cloud-based cybersecurity specific data historian for an Attack-Aware industrial control. Paper and poster presented at the 1st Annual International Conference on Cloud Security Management. Seattle, Washington.
  • Lysenko, V. and Endicott-Popovsky, B. (2014 February). The Cloud and social media. Paper presented at 66th Annual Scientific Meeting of the American Academy of Forensic Scientists, Seattle, Washington.
  • Kuntze, N., and Endicott-Popovsky, B. (2014 February). Scenarios for reliable evidence. Paper presented at 66th Annual Scientific Meeting of the American Academy of Forensic Scientists, Seattle, Washington.
  • Lysenko, V. and Endicott-Popovsky, B. (2015). Information War as an Integral Part of the Modern Hybrid Warfare: The case of Russia vs. Ukraine. 15th Annual International Conference on International Warfare. Kruger National Park, South Africa.

Book Chapters

  • Endicott-Popovsky, B.E., Chee, B. and Frincke, D.A. (2007). Calibration testing of network tap devices. In S. Shenoi. IFIP WG 11.9 (Ed.), Advances in Digital Forensics III (pp.1-13). New York: Springer, (Chapter 1).
  • Seifert, C., Endicott-Popovsky, B., Frincke, D., Komisarczuk, P., Muschevici, R, and Welch, I. (2008). Identifying and analyzing web server attacks. In I. Ray and S. Shenoi. IFIP WG 11.9 (Eds.), Advances in Digital Forensics IV (pp.151-162). New York: Springer, (Chapter 11).
  • Chung, S., Crompton, C., Bai, Y., Endicott-Popovsky, B., Baeg, S., Park, S. (2012). Analyses of the effects of evolving legacy software into secure service-oriented software using scrum and a visual model. In X. Wan (Ed.) Agile and Lean Service-Oriented Development: Foundations, Theory and Practice (pp.196-217). Hershey, Pennsylvania: IGI Global.
  • Lysenko, V., Endicott-Popovsky, B., and Garrido M. (2012). Disruptive political use of ICTs in contentious politics: the between-cases analysis. Accepted for publication in A. Solo (Ed.) Politics in the Information Age. Heidelberg, Germany: Springer.
  • Kuntze, N., Rudolph, C., Alva, A., Endicott-Popovsky, B., Christiansen, J., Kemmerich, T. (2012). On the creation of reliable digital evidence. In G. Peterson and S. Shenoi. IFIP WG 11.09 (Eds.), Advances in Digital Evidence VIII (pp. 3-17). Heidelberg, Germany: Springer.
  • Ferguson-Boucher, K., Endicott-Popovsky, B., (2012). Cloud forensics: Records, retrieval and response integrating information assurance, records management and digital forensics. In K. Ruan (Ed.), Cloud Forensics (pp. 105-128). Hershey, Pennsylvania: IGI Global.
  • Alva, A., Orton, I., Endicott-Popovsky, B., (2012). Legal requirements and case law for Cloud forensic investigations. In K. Ruan (Ed.), Cloud Forensics (pp. 186-229). Hershey, Pennsylvania: IGI Global.
  • Endicott-Popovsky, B. (2014). Information Assurance vs. Records Management. In Duranti, L. and Franks. P. (ed.) Encyclopedia of Archival Concepts, Principles and Practices. (pp. 224-227). Lanham, Maryland: Rowman & Littlefield Publishing Group, Scarecrow Press.
  • David, S. and Endicott-Popovsky, B. (2015). Pathways to integrating technical, legal and economic consideration in the design, development and deployment of trusted IM systems. Is Digital Different?:How information creation, capture, preservation and discovery are being transformed. (pp. 95—128). Facet Publishing: London: UK.
  • Endicott-Popovsky, B. (2015). Security: Managing online risk. Is Digital Different?:How information creation, capture, preservation and discovery are being transformed. (pp. 149—170). Facet Publishing: London: UK.

Books and Special Edition Journals

  • Shoemaker, D. and Endicott-Popovsky, B., eds. (Spring 2015). Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. Special Edition of The Colloquium for Information System Security Education (CISSE), CISSE Edition 2, Issue 2.
  • Moss, M and Endicott-Popovsky, B. with Dupuis, M. (2015) Is Digital Different?: How information creation, capture, preservation and discovery are being transformed. Facet Publishing: London: UK.
  • Endicott-Popovsky, B. Lysenko, V. and Shoemaker, D. Eds.) with introduction by Nelson S.Col., Brecese, J., Rodgers, C. and Zantua, M. (contributors). (February 2016). Special Edition Of The Colloquium For Information System Security Education: A Study of State Cybersecurity Capabilities for Local and Regional Collaboration (CISSE), CISSE Edition 3, Volume 2.

Proceedings

  • Endicott-Popovsky, B., et al., (2008). Proceedings for 2nd Annual Information Security and Risk Management Institute (ISCRMI). Seattle, WA: University of Washington.
  • Endicott-Popovsky, B., ed. (2013). Proceedings for International Conference on Cloud Security Management (ICCSM). Tacoma, USA: University of Washington.
  • Endicott-Popovsky, B., ed. (2014). Proceedings for 2nd Annual International Conference on Cloud Security Management (ICCSM). The Cedars, UK: University of Reading.
  • Endicott-Popovsky, B., ed. (2015). Proceedings for 3rd Annual International Conference on Cloud Security Management (ICCSM). Tacoma, USA: University of Washington Tacoma.

Technical Reports and White Papers

  • Endicott-Popovsky, B., Aval, C. Narvaez, J., and Seifert, C., (2008). Interim Report: Next generation honeypots project: The value of virtualization. Seattle, WA: University of Washington.
  • Endicott-Popovsky, B., Narvaez, J., Aval, C., Seifert, C., Thompson, T., Mauth, J., Wolf, K. (2008). The Honeynet Technical Exchange Report. PNNL/UW-CIAC.
  • Daly, J., Endicott-Popovsky, B., Foster, I., Petravic, D., Siebenlist, F. and Wendelberger, J. (2008) Transforming cybersecurity research: The Deming analogy (White Paper #2). Chicago, IL: Transforming CyberSecurity Initiative, DOE.
  • Altunay, M., Bailey, K., Crawford, M., Endicott-Popovsky, B., Goldfarb, J., and Schur, A. (2008) Practical answers: A practitioner’s roll call of cybersecurity research opportunities (White Paper #6). Chicago, IL: Transforming CyberSecurity Initiative, DOE.
  • Endicott-Popovsky, B., Alkire, S., Call, C., Narvaez, J., Ng, T., Reber, L., Stewart, T. (2009). Round table at the Talaris Conference Center: Breakout sessions. Seattle, WA: DOE Cybersecurity Grass Roots Community.
  • Endicott-Popovsky, B., Aval, C., Narvaez, J. and Seifert, C. (2009). Final report: Next generation honeypots: The value of virtualization. Seattle, WA: University of Washington.
  • Catlett, C. and Cybersecurity Community. (2009). A scientific research and development approach to transforming cybersecurity. Chicago, IL: Transforming CyberSecurity Initiative, DOE.
  • Fink, G., Best, D., Manz, D., Endicott-Popovsky, B. and Popovsky, V. (2010). Pacific Rim Collegiate Cyber Defense Competition as a venue for scientific inquiry and experimentation. Pacific Northwest National Laboratory Technical Report.
  • Dardick, G., Endicott-Popovsky, B., Gladyshev, P., Kemmerich, T., Rudolph, C. (2014). Digital Evidence and Forensic Readiness. Dagstuhl Seminar 14092.

Selected Panels

  • Greitzer, F. and Endicott-Popovsky, B. (2008). Security and privacy in an expanding cyber world. 24th Annual Computer Security Applications Conference (ACSAC), 8-12 December, Anaheim, CA.
  • Endicott-Popovsky, Erbacher, R., Hazelkorn, M., Kohno, Y., B., Kuszler, P., Mason, R (2008). Privacy considerations and the evolution of technology. 9 September, PNNL at University of Washington.
  • Dailey, D., Gebay, M., Endicott-Popovsky, B., Hasselkorn, M. (2010). National Security Research Snapshots. Intelligence Community Colloquium: Information and Intelligence in Open Society, 2-5 May, University of Washington, Seattle, WA.
  • LeMieux, V. and Endicott-Popovsky, B., (2010) Risk management. SLAIS Conference, 13-14 April, University of British Columbia, Vancouver, BC.
  • Taylor, C., Endicott-Popovsky, B., Phillips, A., Shumba, R., and Dampier, D. (2010). Digital forensics education: A cross institutional perspective. 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, in conjunction with the IEEE Security and Privacy Symposium, 20 May, Oakland, CA.
  • Endicott-Popovsky, B. (moderator), Adler, J., Chase, M., Christiansen, J., Ferguson-Boucher, K., Frincke, D., Lazowska, E. Privacy in the cloud. (2011). iConference, 8-11 February, Seattle, WA.
  • Duranti, L., Jansen, A., Endicott-Popovsky, and Cohen, F. (2011). Methods to ensure authentic preservation of digital evidence. 7th Annual IFIP WG 11.9 Digital Forensics Conference, 30 January-2 February, Orlando, Florida.
  • Jones, D. (moderator), Hamilton, M., Twitchell, B. and Endicott-Popovsky, B. Operational Challenges: IA, Collaboration Innovations. (2012). Tacoma, Washington.
  • Endicott-Popovsky, B. (moderator), Jansen, A., Rogers, C., and Duranti, L. (2012) Digital Records Forensics—From Law Enforcement to RIM. ARMA Canada Conference, 3-6 June, Nanaimo, B.C.
  • Endicott-Popovsky, B. (moderator), Blascovich, J., David, S., and Sabett, R. (2012) Security in Virtual Worlds: Can I trust your avatar?. 5th Annual Federal Consortium on Virtual Worlds, 15-18 May, National Defense University, Washington, D.C.
  • Kao, A. (moderator), Endicott-Popovsky, B., Houck, D., Multari, N., Wu, F. (2013) Cyber Security and Information Assurance. IEEE-Intelligence and Security Informatics, 5 June, Seattle, Washington.
  • Endicott-Popovsky, B., Kuntze, N., Ryan, D. (2013). Forensic Readiness, Where are we now? Conference on Digital Forensics, Security and Law, 11-12 June, Richmond, Virginia.
  • Rudolph, C., Kuntze, N., Manz, D., Endicott-Popovsky, B. (2014) Do I Trust You? A Discussion on Trust, Security and Internet-connected Devices Today and Tomorrow. International Workshop on Engineering Cyber Security and Resilience (ECSaR’14), 31 May, Stanford, CA.
  • Endicott-Popovsky, B. (chair), (2015). Transitioning Military, South Sound Technology Conference.
  • Endicott-Popovsky, B. (chair), (2015) Cybersecurity Trends. Academic COO Roundtable. Roosevelt Commons, Seattle.
  • Williams, M., Sridharan, S., Endicott-Popovsky, B., Montgomery, L., and Sands. J. (2015) Accelerating Cybersecurity Practitioner Skills Development—the Nexus of Education and Training. NIST/NICE Conference, San Diego, CA.

Grants and Contracts

  • Seattle University (2003). Venture Grant, PI Barbara Endicott-Popovsky. $10,000
  • Seattle University (2004). Assessment Grant, PI Barbara Endicott-Popovsky. $2,000
  • Seattle University (2004). Innovation Grant, PI Barbara Endicott-Popovsky. $10,000
  • National Science Foundation (2004-2007). [DUE‐ 0341356], Collaborative Project: Course, Curriculum and Laboratory Improvement for Computer and Network Forensics/Security, PI Amelia Phillips, Highline Community College, Co-PI Barbara Endicott-Popovsky, David Dietrich. $276,000
  • NSA/DoD Information Assurance Scholarship Program. (2005). Basic scholarship funding. [H98230-05-1-0132], PI Barbara Endicott-Popovsky. $62,990.62
  • NSA/DoD Information Assurance Scholarship Program. (2005). Annex II: Capacity building: 1) Wireless sensor and network security research 2) Hands-on exercises. [H98230-05-1-0132], PI Barbara Endicott-Popovsky. $80,000
  • Pacific Northwest National Laboratory. (2005). Unintended Consequences of the Information Age. PI Barbara Endicott-Popovsky. $43,000
  • National Science Foundation. (2005). Portable IA lab. Subcontract from George Washington University, David Dietrich, Barbara Endicott-Popovsky. $25,000
  • NSA/DoD Information Assurance Scholarship Program. (2006). Basic scholarship funding. [H98230-06-1-0234], PI Barbara Endicott-Popovsky. $45,949.88
  • NSA/DoD Information Assurance Scholarship Program. (2006). Annex I: IRMC/NDU partnership. [H98230-06-1-0234], PI Barbara Endicott-Popovsky. $10,272.53
  • NSA/DoD Information Assurance Scholarship Program. (2006-2007). Annex II: Capacity Building Grant: 1) Research support 2) Online course development [H98230-06-1-0234], PI Barbara Endicott-Popovsky. $75,000
  • NSA/DoD Information Assurance Scholarship Program. (2007). Basic Scholarship Funding. [H98230-07-1-0244], PI Barbara Endicott-Popovsky. $29,843.42
  • NSA/DoD Information Assurance Scholarship Program. (2007). Annex I: IRMC/NDU Partnership. [H98230-07-1-0244 ] PI Barbara Endicott-Popovsky. $10,817.99
  • NSA/DoD Information Assurance Scholarship Program. (2007). Annex II: Capacity building: 1) Collaborative course in digital forensics and incident response 2) Dissemination of IA programs to the University of Hawaii Manoa. [H98230-07-1-0244], PI Barbara Endicott-Popovsky.$35,280
  • University of Washington Provost. (2007). Research Development Funding, PI Barbara Endicott-Popovsky. $100,000
  • NSA/DoD Information Assurance Scholarship Program. (2008). Annex I IRMC/NDU Partnership. [H98230-08-1-0342] PI Barbara Endicott-Popovsky. $2,520
  • NSA/DoD Information Assurance Scholarship Program. (2009). Annex I IRMC/NDU Partnership. [H98230-09-1-0402] PI Barbara Endicott-Popovsky. $1,890 ($251,599.94) Option
  • National Science Foundation. (2009-2012). [DUE‐0912109], Building instructional capacity for instructors unfamiliar with security, PI Barbara Endicott-Popovsky, Co-PI Weon Sam Chung. $299,901.
  • Department of Energy/Pacific Northwest National Laboratory. (2009). Next Generation Honeypots I, PI Barbara Endicott-Popovsky. $112,000
  • Washington State Department of Transportation. (2009). Indexing WSDOT Photographs, PI Barbara Endicott-Popovsky. $25,000
  • NSA/DoD Information Assurance Scholarship Program. (2010). Annex I IRMC/NDU Partnership. [H98230-10-1-0356] PI Barbara Endicott-Popovsky. $1,890
  • Department of Homeland Security. (2010). 3rd Annual Pacific Rim Collegiate Cyber Defense Competition, PI Barbara Endicott-Popovsky. $14,000
  • Department of Energy/Pacific Northwest National Laboratory. (2010). Next Generation Honeypots II, PI Barbara Endicott-Popovsky. $134,000
  • National Science Foundation. (2010-2012). [EEC 1037814] VetsEngr Project, PI Barbara Endicott-Popovsky, Co-PI Amelia Phillips Highline Community College. $189,876
  • National Science Foundation. (2011-2012). University of Washington Scholarship for Service (CIAC) [DUE-1129269], PI Barbara Endicott-Popovsky. $1,212,833
  • National Science Foundation. (2011-2013). Sea to Shining Sea. [DUE‐1128989], Co-PIs Barbara Endicott-Popovsky, Lance Hoffman, George Washington University, Martha Crosby, University of Hawaii. $99,130
  • Department of Homeland Security and National Science Foundation. (2011-2013). [DUE-1129269] University of Washington Scholarship for Service Program (CIAC) Supplemental: Healthcare Information at Risk, PI Barbara Endicott-Popovsky. $92,999
  • NSA/DoD Information Assurance Scholarship Program. (2011). Annex I IRMC/NDU Partnership. [H98230-11-1-0453] PI Barbara Endicott-Popovsky. $2,205
  • NSA/DoD Information Assurance Scholarship Program. (2011). Annex II Capacity building: VetsEngr – Phase II PI Barbara Endicott-Popovsky. $73,421.62
  • King County Public Health. (2011). SMS text messaging: Risk assessment to PHI, PI Barbara Endicott-Popovsky. $15,000
  • Department of Homeland Security. (2011). 4th Annual Pacific Rim Collegiate Cyber Defense Competition, PI Barbara Endicott-Popovsky. $10,000
  • Charles River Associates. (2012). Subcontract to study malware samples. $30,000
  • Department of Homeland Security. (2012). 5th Annual Pacific Rim Collegiate Cyber Defense Competition, PI Barbara Endicott-Popovsky. $15,000
  • National Science Foundation. (2012-2015). University of Washington Scholarship for Service (CIAC) [DUE-1129269-Supplemental], PI Barbara Endicott-Popovsky. $314,41
  • National Science Foundation. (2012-2013). University of Washington Scholarship for Service (CIAC) [DUE-1129269], PI Barbara Endicott-Popovsky. $758,527
  • PNNL - ARC (Asymmetric Resilient Computing) Initiative funding. (2013-2017) 25% faculty position supported as part of CIAC partnership with PNNL. est. $300,000
  • T-Mobile demonstration grant. (2013). Vulnerability and Architecture Analysis of T-Mobile's Identity and Access, Management (IAM) Environment through Penetration Testing and Software Architecture Assessment Co-PIs Sam Chung and Barbara Endicott-Popovsky. $111,793
  • National Science Foundation. (2013-2015). Whatcom Community College. PI Corinne Sande, Whatcom Community College, Barbara Endicott-Popovsky, subcontract. $16,000
  • Department of Homeland Security. (2013). 6th Annual Pacific Rim Collegiate Cyber Defense Competition, PI Barbara Endicott-Popovsky. $2,500
  • SHRCC - InterPARES IV (2013-2018). An international collaborative research initiative funded by the Canadian government to explore issues of trust surrounding permanent authentic records in electronic systems. North American Lead: Barbara Endicott-Popovsky. $8,000
  • University of British Columbia - Records in the Cloud: Towards InterPARES Trust (precursor to InterPARES IV). Planning grant travel funding to prepare for SHRCC proposal to Canadian government. $1,000
  • National Science Foundation. (2013-2015). University of Washington Scholarship for Service (CIAC) [DUE-1129269], PI Barbara Endicott-Popovsky. $454,406
  • National Institute of Standards (2014-2015). Award, A94617, State of Washington Department of Commerce, CREATES. (part of a $500M amount to the State), PI Barbara Endicott-Popovsky. $133,000

Industry Gifts

  • Industry Affiliates: (2011). 4th Annual Pacific Rim Collegiate Cyber Defense Competition. Boeing, Cisco, Microsoft, IO Active, Deloitte, CIA, SPAWAR. $35,000
  • Industry Affiliates. (2010). 3rd Annual Pacific Rim Collegiate Cyber Defense Competition. Boeing, Blackhat, Microsoft, CIAC. $35,000
  • Microsoft Corp. (2009). 2nd Annual Pacific Rim Collegiate Cyber Defense Competition. Cash and in-kind. $40,000
  • Microsoft Corp. (2008). 1st Annual Pacific Rim Collegiate Cyber Defense Competition. $55,000

Invited as Keynote Speaker

  • Current Trends in Cybersecurity September 22, 2015
  • Interview with Howard Schmidt, former Cybersecurity Czar of the Obama Administration
  • Washington State Fusion Denter Analyst Training Event
  • Richland, Washington
  • Forensic Readiness: Emerging Discipline for Creating Reliable and Secure, September 12, 2013
  • Digital Evidence. 2nd International Conference on Digital Forensics and Investigation
  • ICDFI) Wuhan, China.
  • Weaving Risk Intelligence into Business Decisions, September 9, 2013
  • Pro-Active Risk Management Conference
  • Marcus Evans, Ltd. Czech Republic, New York City.
  • Privacy and cybercrime: The individual’s responsibilities in staying safe online, September 6, 2012
  • Symposium on Privacy, Security and Forensics in the Digital Age.
  • Aberystwyth University and the National Library of Wales, Aberyswyth, Wales.
  • Unintended consequences of embracing the Internet. Archives and Records Management, September 10, 2012. Program, Dept. of Information Studies, Aberystwyth University, Aberyswyth, Wales.
  • Challenges securing the smart grid: Lessons learned from cybersecurity, May 20, 2011
  • 6th International Symposium on Embedded Technology, Institute of Embedded Engineering of Korea, Jeju, Korea.
  • Digital records forensics: An interdisciplinary program for forensic readiness. December 2, 2010
  • SECAU 2010 Security Congress, Edith Cowan University, Perth, Australia.

Invited Talks

Academic

  • Cybersecurity 101, November 10, 2015. Brief to UW/NROTC Midshipment. Kane Hall, UW Seattle Campus.
  • Unintended consequences of the Information Age: The fate of privacy, May 1, 2014. Western Libraries Association,Wenatchee, Washington.
  • Emerging discipline for creating reliable and secure digital evidence, September 12, 2013. International Conference on Digital Forensics and Investigation conference (ICDFI 2013), Wuhan, China.
  • Unintended consequences of the Information Age: Impacts of ubiquitous security on society and the individual. August 8, 2013. US-Korea Conference, Meadowland, New Jersey.
  • Information and Cybersecurity: Trust and digital records in an increasingly networked society, September 25-26, 2012. Workshop, Peter Wall Institute, Vancouver, BC.
  • Welcome incoming 2012-13 class. Archives and Records Management Program, September 10, 2012. Department of Information Studies, Aberystwyth University, Aberyswyth, Wales.
  • Developing cyber defenders to protect the homeland: One university’s approach, May 19, 2011
  • Cyber Physical Systems Day, Daegu Gyeongbuk Institute of Science and Technology (DGIST), Daegu, Korea.
  • Developing cyber defenders to protect the homeland: The CCDC, May 19, 2011. Yeungnam University, Gyeongsan, Korea.
  • Where are the Cyber Security Experts?: Incentivizing Universities to Rise to the Challenge - the National IA Education & Training Program (NIETP), May 18, 2011. MOU Presentation, Daegu Gyeongbuk Institute of Science and Technology (DGIST), Daegu, Korea.
  • Transitioning America's veterans to STEM academic programs Veterans Education in Science and Engineering, March 15, 2011. National Science Foundation, Reston, VA.
  • Forensic readiness and the challenges of the cloud (w/ Kirsten Ferguson-Boucher), February 15, 2011. Association of Canadian Archivists@UBC 2011 International Symposium: The Law of Unintended Consequences, Vancouver, BC.
  • Privacy in the Cloud: The unintended consequences, February 15, 2011. Intelligence Community Colloquium: Social Media: Emerging Issues of Open Information and National Security.
  • Forensic readiness and the challenges of the cloud (w/ Kirsten Ferguson-Boucher), February 11, 2011. Association of Canadian Archivists@UBC 2011 International Symposium: The Law of Unintended Consequences, Vancouver, BC.
  • Virtual world security. January 20, 2010. Intelligence Community Colloquium: Information and Intelligence in Open Society. University of Washington.
  • Internet Privacy and Safety Issues at School, October 11, 2007. Be the Link! Washington Library Media Association Annual Conference, Yakima, WA.
  • Government Cyber security and critical infrastructure, September 22, 2010. Dam Safety 2010. Association of Dam Safety Officials, Seattle.
  • Legal and technical aspects of digital forensics: An update on the state of the practice, (w/James Lyle, National Institute of Standards, Matt Salacinski, Federal Bureau of Investigation) May 14, 2010. Montana Judges’ Association, Spring 2010, Helena Montana.
  • Legal and technical aspects of digital forensics: An update on the state of the practice (w/Ivan Orton, King County Deputy Prosecutor), November 12, 2010. Supreme Court Judges’Conference. Guam/Seattle.
  • Academia Government Industry Panel: "Cybersecurity Awareness Month" (w/ Howard Schmidt, White House Cybersecurity Czar and Department of Homeland Security), October 4, 2010
  • Seattle Public Library, Seattle, WA.
  • Panel on digital forensic readiness, (w/ Richards, G., Shaw, C.), June 21, 2010. National Security Agency, Baltimore, Maryland.
  • National Security Agency Review of CIAC Research (w/ Kirk Bailey; Harry Bruce; Barbara Endicott-Popovsky; Jeff Kim; Neal Koblitz; Tadayoshi Kohno; Ed Lazowska; Radha Poovendran; Christian Seifert/Chiraag Aval; Mike Simon; Troy Thompson), April 22, 2008. Information School, University of Washington
  • Collision of Events. Digital forensics workshop (w/Orton, I. and Ryan, D.), June 14, 2007 A-Star Science and Technology Judges Training, University of Washington Law School, Seattle, WA.

Industry

  • Overview of Cybersecurity, March 4, 2014. Lufthansa Corporate Headquarters, Frankfurt, Germany
  • Securing the Endpoint, November 14, 2013. Secure World Expo 2013, Seattle, WA.
  • Re-booting the System: Getting in Front of the Attacks and Preventing Losses, August 14, 2013
  • Aviation 2013 Conference. AIAA. Los Angeles, CA.
  • Risk Assessment and Cloud Strategy Development (w/ Kirsten Ferguson-Boucher), June 3, 2011
  • Cloud Futures 2011: Advancing Research and Education with Cloud Computing, Microsoft, Redmond, WA.
  • Programs and Projects at the University of Washington, Center for Information Assurance and Cybersecurity, May 26, 2010. Microsoft Research. Bellevue, WA.
  • The CIAC. November 16, 2009. IARPA Conference. CSE, University of Washington Seattle, WA.
  • Panel: Cybersecurity Research at the University of Washington: A Look at the Latest Developments October 28, 2009. Secure World Expo. Bellevue, WA.
  • APWG Roundtable: Potential issues in Malicious Use and Abuse of the DNS Created or Exacerbated by the New gTLD Expansion, October 20, 2009. APWG eCrime Research Congress, Tacoma, WA.
  • Unintended Consequences of the Information Age: Our Children at Risk,September 24, 2008
  • McKinstry Corp.

Videos

Read about executive education

Other experts

Frank Goedertier

Frank Goedertier is a Marketing Professor and Partner at Vlerick Business School. He is the Head of the Area Marketing at Vlerick Business School, and is the Programme Director of the ‘Brand Management & Communication’ open-enrollment programme. In his research & teaching activities he f...

Henry Lambright

Degree Ph.D., Columbia University, 1966 Specialties Science and technology policy, environmental policy and administration Courses Energy, Environment, and Resources Policy (graduate) Science, Technology and Policy (graduate) Technology, Politics, and the Environment (undergraduate...

Hillol Bala

Areas of Expertise IT-enabled business process change and management, IT use and impacts, Strategic use of IT in health care, Enterprise systems implementation Academic Degrees PhD, Information Systems, University of Arkansas, 2008 MBA, Texas Tech University, 2003 MS, Information Systems, Texas ...

Looking for an expert?

Contact us and we'll find the best option for you.

Something went wrong. We're trying to fix this error.