Ph.D., Tilburg University, The Netherlands (2007)
Doctorandus (M.A. equivalent), Tilburg University, The Netherlands (1997)
Licenses and Certifications
Licenses and Certifications
Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), GIAC Certified Forensics Analyst (GCFA)
My research and teaching interests include defensive cybersecurity, conceptual modeling, Internet-of-Things, blockchain, and privacy.
Computer And Network Security
Computer Science Orientation Seminar
Cyber Threat Analysis
Database Management Systems
Introduction To Cybersecurity
It is my responsibility to develop students’ ability to engage in critical thinking based on factual knowledge and to instill a deep understanding of the subject matter introduced in class. Students must be able to engage in meaningful discourse and should be able to apply their expertise to theoretical discussions, as well as to practical case studies and real-world examples.
My research is grounded in conceptual modeling and knowledge representation, and is most commonly applied to defensive cybersecurity.
Born & raised in the Netherlands; native speaker of Dutch. Academic degrees from Tilburg University.
Extensive work with faculty members at RWTH Aachen in period 1997-2006.
Leune, K. (2002). Access Control and Service-Oriented Architectures. Tilburg, Netherlands: CentER Dissertation Series no. 188, SIKS dissertation series 2007-01.
Leune, K. and Petrilli, S. (2019) The computing orientation seminar. In: ACM InRoads, Vol. 10, No. 3.
Leune, K., Petrilli, S. (2017) Using Capture-the-Flag to Enhance the Effectiveness of Cybersecurity Education. In Proceedings of the 18th Annual Conference on Information Technology Education (SIGITE '17). Pages 47-52. Rochester, New York, USA
Van den Heuvel, W-J., Leune, K. & Papazoglou, M.P. (2005), EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. Distributed and Parallel Databases, 18, 115-145.
Leune, K. (2004), Exploring a Multi-Faceted Framework for SOC: How to develop secure web-service interactions? (An extended abstract). Proceedings of RIDE'04.
Leune, K., Papazoglou M. & Van Den Heuvel, W-J. (2004), Specification and Querying Security Constraints in the EFSOC Framework. Proceedings of the International Conference on Service Oriented Computing.
De Troyer, O. & Leune, C.J. (1998), WSDM: A User-Centered Design Method for Web Sites. Computer Networks and ISDN systems, 30.
Henry, R., Howell, P., Leune, K., Marchany, R., Nevin, D. & Ooley, D. (2015). Never Waste a Crisis: Funding an Information Security Program Into The Future. In EDUCAUSE/Internet2 Security Professionals Conference. Minneapolis, MN.
Leune, K. & Bursey, A. (2014). Emerging Threats in Higher Education. In New York Higher Education Technology Forum. Greenvale, NY.
Boyle, C.A., and Leune, K. (2014). The Technology Infused Campus. In Long Island Council of Student Personnel Administrators’ Annual Conference. Garden City, NY.
Leune, K. (2013). Moderator and Organizer. In Adelphi University Cyber Crime and Identity Theft Symposium. Garden City, NY.
Henry, R. and Leune, K. (2013). When To Declare An Information Security Incident and How To Respond Once You Do. In EDUCAUSE/Internet2 Security Professionals Conference 2013. St. Louis, MO.
Leune, K., Becker, D., and Grigorescu V. (2013). How Advanced Log Management Can Trump SIEM. Tales of Woe and Glory. In EDUCAUSE/Internet2 Security Professionals Conference. St. Louis, MO.
Leune, K. (2013). “Business Continuity Planning after Hurricane Sandy” (moderator). In Adelphi University Center for Health Innovation. Garden City, NY.
Leune, K. (2012). Using Capture-The-Flag for Teaching and Training. In Educause/Internet2 Security Professionals Conference. Indianapolis, IN.
Leune, K. (2012). Threat Modeling. In OWASP Long Island. Garden City, NY.
Leune, K. (2012). Using Capture-The-Flag for Teaching and Training. An interactive discussion. In SOURCE Boston. Boston, MA.
Leune, K. (2012). The OWASP Top-10 and BackTrack 5. Hands-on vulnerability discovery and exploitation (part two). In OWASP Long Island. Garden City, NY.
Leune, K. (2011). The OWASP Top-10 and BackTrack 5. Hands-on vulnerability discovery and exploitation. In OWASP Long Island. Garden City, NY.
Leune, K. & Basgen B. (2011). Peering into the darkness. Implementing Security Information Event Management. In Educause/Internet2 Security Professionals Conference. San Antonio, TX.
Leune, K. (2011). The role of higher education in information security education and research (panel discussion). In SOURCE Boston. Boston, MA.
Leune, K. & Dodge, A. (2009). Information Security in Higher Education: Baby steps. In SOURCE Boston. Boston, MA.
Leune, K. & Tesink, S. (2006). Designing and developing an Application for Incident Response Teams. In Forum for Incident Response Teams Conference. Baltimore, MD.
Leune, K. (2016, March). Of All Things Cyber. Long Island Institute of Internal Auditors, Melville, NY.
Honors and Accomplishments
Honors and Accomplishments
Nominated for global Web Application Security Professional of the Year award by the Open Web Application Security Project (OWASP) in 2012.
Named a Security Thought Leader by the SANS Institute in 2010.
Adviser at the SANS Institute.
Faculty Adviser for the Adelphi University Information Security Club (since 2015)
Board Member, OWASP Long Island (since 2014)
REN-ISAC Membership Committee (Feb 2014 - Dec 2015)
SANS Advisory Board (since 2008)
Reviewer for the 2015 EDUCAUSE National Conference
Reviewer for the 2015 EDUCAUSE Security Security Professionals Conference
Program Committee Member of 2009 EDUCAUSE Security Professionals Conference
Links provided to external websites, including personal faculty sites, do not imply an endorsement by Adelphi University of those sites, their content, or associated products and services.