Timothy C. Summers, Ph.D., CISSP

Timothy C. Summers, Ph.D., CISSP

Phoenix, Arizona, United States
5K followers 500 connections

About

Dr. Timothy C. Summers is a distinguished leader in cybersecurity and digital innovation,…

Education

  • Weatherhead School of Management at Case Western Reserve University Graphic

    Case Western Reserve University - Weatherhead School of Management

    -

    Activities and Societies: Case Western Reserve University Hacker Society

    How Hackers Think: A Study of Cybersecurity Experts and Their Mental Models

  • -

    Activities and Societies: Optimist Club

    Scholarship for Service Recipient

  • -

  • -

    Graduated Magna Cum Laude, Chancellor's Distinguished Student, Dean's List, Chancellor's List

Licenses & Certifications

  • IC Agile Certified Professional

    The International Consortium for Agile

    Issued
  • Certified Information System Security Professional (CISSP)

    ISC(2)

  • Project Management Professional (PMP)

    Project Management Institute

Volunteer Experience

  • Big Brothers Big Sisters Graphic

    Mentor

    Big Brothers Big Sisters

    Children

    Support and provide mentorship to youths in the Baltimore metropolitan area.

  • Entrepreneurship Mentor/Guest Speaker/Business Plan Advisor

    National Foundation for Teaching Entrepreneurship

    Economic Empowerment

    Provide mentorship and advisement to students within the Baltimore metropolitan area who are pursuing interests in entrepreneurship and business development.

  • Advisory Board Member

    Mckinley Technology High School

    - Present 7 years 8 months

    Education

Publications

  • How Hackers Think: A Mixed Method Study of Mental Models and Cognitive Patterns of High-tech Wizards

    Case Western Reserve University

    Summers, T. C. (2015). How Hackers Think: A Mixed Method Study of Mental Models and Cognitive Patterns of High-tech Wizards (Doctoral dissertation, Case Western Reserve University).

    See publication
  • Collaboration, Design Thinking, Collaborative Discourse and Accessible Collaboration Technology: Strategies for Building Effective Partnerships for Sustainable Development

    Africa Academy of Management (AFAM) 2014 Biennial Conference

    Other authors
  • How Hackers Think: A Study of Cybersecurity Experts and Their Mental Models

    Third Annual International Conference on Engaged Management Scholarship

    Hackers account for enormous costs associated with computer intrusion in a world increasingly reliant on computer and Internet-based technologies. Within the hacker community, there are “good” hackers called white hat hackers and “bad” hackers called black hat hackers. Essentially, one identifies ways to protect information systems while the other identifies ways to exploit those information systems. Regardless of what type of hacker a person is, identifying system weaknesses requires logical…

    Hackers account for enormous costs associated with computer intrusion in a world increasingly reliant on computer and Internet-based technologies. Within the hacker community, there are “good” hackers called white hat hackers and “bad” hackers called black hat hackers. Essentially, one identifies ways to protect information systems while the other identifies ways to exploit those information systems. Regardless of what type of hacker a person is, identifying system weaknesses requires logical reasoning and the ability to systematically think through possible actions, alternatives, and potential conclusions. This combination of reasoning and systematic thinking implies the use of mental models. Hacking is a cognitive activity that requires exceptional technical and reasoning abilities. In this domain, a mental model can be thought of as a hacker’s internal representation of the components and operating rules of an extremely complex software and hardware system. Mental models help hackers describe, explain, and predict system attributes and behaviors. The literature is filled with analyses of motives and incentives to engage in hacking but lacks in explaining how hackers actually process knowledge and/or think about systems. It is the intent of this research to address this gap by analyzing how hackers identify and solve problems, make inferences as to reach decisions and implement solutions.

    Other authors
    See publication

Projects

  • Conveying trustable identities and privileges to applications within utility cloud computing environments

    - Present

    This project resulted in a security model that addresses the need for a comprehensive security capability within the cloud-enabled enterprise. It authenticates applications hosted in the cloud and implements authorization mechanisms that allow them to access protected resources. This increases the levels of security and trust in the cloud while decreasing overall operational risk.

Honors & Awards

  • 40 Under 40

    Elizabeth City State University

    The 40 Under 40 Award is an honor given to the most influential and accomplished young people recognized as being the best and brightest across various fields and industries.

Languages

  • English

    -

  • Spanish

    -

  • Mandarin

    -

Recommendations received

View Timothy C.’s full profile

  • See who you know in common
  • Get introduced
  • Contact Timothy C. directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses