Center for Cybersecurity & Intelligence Studies

Center for Academic Excellence in Cyber Defense (CAE-CD)
The Center for Cyber Security & Intelligence Studies (CCSIS) contributes to the knowledge, skills and abilities of current and emerging cybersecurity professionals to guide their logic, critical thinking and ethics through affiliated graduate programs, an experiential lab and community outreach activities. The CCSIS is housed in University of Detroit Mercy's College of Humanities, Arts & Social Sciences.
Value to the Nation and Community
The Center for Cyber Security & Intelligence Studies celebrates almost two decades of evolving excellence through the embodiment of our teaching in graduates who have gone on to work for Federal security agencies, Fortune 500 companies and not-for-profit organizations. In addition, our leading-edge cybersecurity lab provides dual value by providing our students with the tools to help law enforcement recover and validate through digital forensics.
Validated Programs of Study
University of Detroit Mercy’s B.S. in Cybersecurity and our M.S. in Cybersecurity Management have been validated by the National Security Agency.
University of Detroit Mercy is designated by the National Security Agency as a Center of Academic Excellence in Cyber Defense (CAE-CD).
External News
Krebs On Security
- Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising […]
- Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws […]
- Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study […]
- The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved […]
- Authorities in Pakistan have arrested 21 individuals accused of operating "Heartsender," a once popular spam and malware dissemination service that operated for more than a […]
- The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been […]
Secure World
- As kinetic conflict continues to unfold between Israel and Iran, a parallel battle is raging in cyberspace—one that is disrupting […]
- The 2025 Cybersecurity Information Sheet (CSI) on AI and Data Security offers critical guidance for organizations navigating the intersection of […]
- Artificial intelligence (AI) and machine learning (ML) are rapidly becoming integral to critical systems—from autonomous vehicles and smart cities to […]
- When renewable energy becomes a security risk Some people are concerned about whether solar panels will operate after periods of […]
- Scattered Spider, the notorious threat group known for targeting major retailers and employing advanced social engineering techniques, has reportedly shifted […]
- It's hard to find a SaaS application these days that doesn’t include some form of AI. A recent McKinsey report […]
Dark Reading
- As package registries find better ways to combat cyberattacks, threat actors are finding other methods for spreading their malware to […]
- The communications company shared the discoveries of its investigation with government partners, but there is little information they can publicly […]
- As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel […]
- Securing the no-code supply chain isn't just about mitigating risks — it's about enabling the business to innovate with confidence.
- Instead of constantly fixing security vulnerabilities, organizations should proactively build secure foundations that enable businesses to move faster while reducing […]
- In a new wrinkle on the tech support scam front, these search parameter injection attacks dupe victims into believing they […]
Resources
- Detroit Mercy Cybersecurity Club – Open to all majors, the Detroit Mercy Cybersecurity Club, sponsored by the Detroit Chapter of ISACA, is an opportunity for students to delve deeper into computers and cybersecurity.
- NICCS – Cybersecurity CISA Resources and Tools, Cybersecurity Training Resources, Education Resources.
- TryHackMe – An interactive cybersecurity training platform offering guided labs and challenges to learn hacking and security concepts in a hands-on environment.
- Hack The Box – A penetration testing platform with virtual labs that challenge users to hack into simulated systems, enhancing offensive security skills and knowledge.
- NCAE Cyber Games – A competition platform for students participating in cyber games, supported by the National Centers of Academic Excellence in Cybersecurity, aimed at developing practical cybersecurity skills through competitive events.
- CyberSeek—To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data on supply and demand in the cybersecurity job market.
- CyberMission.tech – A Department of Defense (DoD) cyber initiative with high-tech, hands-on opportunities for military personnel, Veterans, and the public.
- CISA Cybersecurity Resources: Telework guidance and best practices, assessments, prevention, and response resources, cybersecurity awareness and best practices resources, misinformation, disinformation, and malinformation resources, mitigating cyber risks to the nation’s critical infrastructure.
Security Resources
Goals & Unique Features of the Center
Following the goals for the National Initiative for Cybersecurity Education, the Center provides education, advanced security research and service to:
- To advance the cybersecurity capabilities of the workforce within the Detroit Mercy service region as well as nationally.
- To increase the number of highly educated, digitally literate citizens within underrepresented people and veterans and to produce professional specialists in areas of critical need.
- To generate educational, outreach and research activities that will ensure the protection of the critical infrastructure of the United States as a whole.
Internal News
-
Affiliated Faculty
Cybersecurity & Information Systems and Criminal Justice Programs
- Gregory Laidlaw, DMIT, department chair and lecturer of Cybersecurity & Information Systems
- Dan Shoemaker, Ph,D., director of the Master of Science in the Information Assurance Program
- Erick Barnes, department chair, instructor of Criminal Justice and Director of the Master of Science in Intelligence Analysis Program
- Anne Kohnke, Ph.D., director of the Center for Cyber Security & Intelligence Studies and associate professor of Cybersecurity & Information Systems
- Charles Wilson, J.D., associate professor of Criminal Justice
-
Cybersecurity Center Advisory Board
- William Bowen '03, '05, U.S. Army, TACOM
- Edward Bobola III, senior master sergeant, 110 OG (USA)
- Mike Brennan, founder of Michigan News Network
- Shaun Cavanaugh, chief information security officer at the National Park Service
- Marrci Conner, faculty at Henry Ford College
- Kurt Gollinger, chief operating officer at Central Bureau of Investigation (CBI)
- Jason Grembi '02, author of Secure Software Development, certified information systems security professional and senior cybersecurity architect, Vehicle Services department at General Motors
- Michael Huguley '07, Infrastructure Manager / Infrastructure Architect
- Keith Jaroszewski, '09, '10, senior penetration Tester at Synchrony
- J.T. Jones '05, deputy cybersecurity program manager at the US Army in Europe G6
- Daniel Kennedy, principal consultant at Forensic Criminology Associates
- Kristin Judge, founder of Cyber Crime Support Network
- Dan Lohrmann, chief strategist and chief security officer at Security Mentor, Inc.
- Christopher Martella '15, attorney at Kemp Klein Law Firm
- Richard Marshall, chairman of the board at Cinturion
- Janell McLemore '09, access manager at the U.S. Department of Defense
- Sajay Rai, President, certified public accountant, certified information systems security professional and certified information security manager at Securely Yours
- James L. Rainey, Ph.D., III, '95, '97, information technology specialist at the U.S. Government
- Stephanie Scheurmann, cyber threat intelligence specialist at Ford Motor Company
- Bob Sherman, associate professor and chair of Computer Information Systems at Sinclair Community College
- Ken Sigler '98, faculty at Oakland Community College
- Christopher Sorensen, senior cybersecurity researcher at GE Digital
- Ryan Spangler, senior account executive cybersecurity practice at TEKSystems
- Mary Sparks, '05, WebFOCUS senior SDA, Ford Motor Company
- Caston Thomas, President at InterWorks, LLC
- Dave Trader, chief strategy officer at GalaxE Solutions
- Tabice Ward, director/computer and information science and engineering (CISE) at DTE Energy
- Jeff Weber, Department of Defense
- Brad Wilkerson, principal engineer at Walt Disney Imagineering
- Angela Williams, enterprise information security officer at Blue Cross Blue Shield of Michigan