Research & Writing

Papers

A growing collection of coursework, research projects, and curiosities that capture how I think about technology and design.

Standalone Papers

Independent explorations that do not belong to a single class, but capture the ideas I keep circling back to.

Research Project • Summer 2025

Mapping the Path: A Strategic Analysis of CISA CPGs as a Foundation for CMMC

Discusses how small and medium-sized businesses can use CISA Cybersecurity Performance Goals to align with CMMC requirements and strengthen their cybersecurity readiness.

Research Project • Summer 2025

Understanding Quantum in Cybersecurity: A Foundational Guide for Business Leaders

Discusses how quantum computing reshapes cybersecurity by threatening current encryption systems and proposes the Quantum Business Risk Initiative as a governance framework to guide organizations toward post-quantum readiness and resilience.

Download
In Progress

Kaden's Next Paper

Typing Away :)

Course Collections

Dive into the writing that emerged from specific classes. Each collection links out to supporting material and individual papers.

CSU • CIS 563

Information Assurance and Security

This course combined concepts of audit management, governance, IS controls, human capital management, strategic program development, and financial expertise that are vital to leading a highly successful IS program.

  • Assignment 1 - Control Selection and Implementation

    Discusses the points that to be considered during control selection and explains how to implement them.

    Download
  • Case Study 1 - Managing Sarbanes-Oxley in a Transforming Landscape

    Discusses the importance of the Sarbanes-Oxley Act and how to manage key issues of it.

    Download
  • Assignment 2 - Board of Directors in IT Organizations

    Discusses the role of the board of directors and why should they have a clear understanding of the organization's needs

    Download
  • Case Study 2 - The Role of a CISO

    Discusses the crucial role that a CISO plays in an organization and how they should report.

    Download
  • Assignment 3 - Laws and The Impacts on Organization Security

    Discusses the various laws that affect organizational security, such as HIPPA, FISMA, HITECH and GDPR.

    Download
  • Case Study 3 - Compliance Auditing

    Discusses how compliance auditing ensures accountability and enhances organizational resilience.

    Download
  • Assignment 4 - Project Management Phases

    Discusses the 5 of traditional project management.

    Download
  • Case Study 4 - Stakeholder Management

    Discusses how effective stakeholder management supports sustainable organizational performance.

    Download
CMU • 95-565

Introduction to Information Security Management

This course covered foundational technical, managerial, and policy concepts of information security.

  • Report 1 - Threat Intelligence Report

    A threat intelligence report discussing the 2024 Ascension Health ransomware attack.

    Download
  • Homework 1 - Dam Sector Analysis Report

    Breifly outlines the dam sector as critical infastructure and what threats adn controls may exist.

    Download
CMU • 95-566

Introduction to Cyber Intelligence

This course introduced the 5 domains of the cyber intelligence framework, as well as other important intelligence concepts such as threat modeling.

  • Assignment 1 - Kali Tools

    Outlines three popular tools used with Kali Linux and a hypothetical attack scenario using them.

    Download
  • Assignment 2 - Intelligence Requirements

    Outlines intelligence requiremnets of an imaginary company known as Tratans Energy Co.

    Download
  • Assignment 3 - Intel Sources and Reporting

    Outlines data sources of Assignment 2's intelliegence requirements and their reporting activities.

    Download
  • Assignment 4 - Cyber Threat Analysis Report

    A cyber threat analysis report generated from CSIS data, and critically analyses the reliability of the CSIS.

    Download
  • Assignment 5 - Cyber Threat Intelligence Center

    Outlines what building a CTIC may look like for a hypothecital daughter company to Tartans Energy Co. called Scotty Manufacturing Inc.

    Download