Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

Majors & Degrees

Kyle Cronin

Kyle Cronin

Kyle Cronin

Associate Professor, Coordinator for Ph.D. in Cyber Defense

Department

The Beacom College of Computer & Cyber Sciences

Education

D.Sc., Capitol Technology University, Laurel, MD
M.S., Dakota State University
B.S., Dakota State University

Biography

Dr. Cronin teaches within the technology/security programs at DSU and manages DSU’s information assurance lab at DSU. In addition, he works with the campus’s ITS department helping to manage the DSU network.

Contact

Office Location: Beacom Institute of Technology
Phone: (605) 256-5838
Email
Website

As a tenured Associate Professor, it is my focus to balance my time invested to the University in teaching, service, and research. My primary focus has been in teaching and service to the University, with added support for research. During my time as an Assistant Professor, I have earned over $2.3 million in direct funding as a principle investigator or director and have supported an additional $9 million in funding as Co-PI on various grants. My focus at the University has been on K12 education & outreach, large-scale enterprise computing environments, and cellular & mobile wireless communications. In addition, I still maintain DSU’s Information Assurance lab environment which is leveraged by all computing majors and graduate programs.

Cronin's teaching interests include:

  • Cyber Operations
  • Cellular and Mobile Communications
  • Enterprise Applications
  • Network Security/Intrusion Detection
  • Defensive Network Security
  • Network Administration
  • Computer Science
  • Computer Hardware
  • 03/01/2022-03/01/2024, PI
    GenCyber @ DSU
    National Security Agency
    Total Amount: $150,000
  • 09/01/2020- 09/01/2022, PI
    Centers of Academic Excellence in Cyber Security Innovation
    National Security Agency
    Total Amount: $3,510,480
  • 03/01/2020-03/01/2022, PI
    GenCyber @ DSU
    National Security Agency
    Total Amount: $149,986
  • 07/01/2019-07/01/2024, Co-PI
    CyberCorps SFS
    National Science Foundation
    Total Amount: $5,499,908
  • 03/01/2019-03/01/2020, PI
    GenCyber @ DSU
    National Security Agency
    Total Amount: $260,425
  • 03/01/2018-03/01/2019, PI
    GenCyber @ DSU
    National Security Agency
    Total Amount: $268,023
  • 01/01/2018-01/01/2019, PI
    Supporting Infrastructure in Cellular Education & Research
    South Dakota Board of Regents
    Total Amount: $198,245
  • 03/01/2017-03/01/2018, PI
    DSU: GenCyber CoEd Camp
    National Security Agency
    Total Amount: $335,843
  • 02/01/2017-02/01/2018, PI
    DSU: DSU Cyber Security National Action Plan
    National Security Agency
    Total Amount: $490,507
  • 03/01/2016-03/01/2017, PI
    DSU: GenCyber CoEd Camp
    National Security Agency
    Total Amount: $280,583
  • 1/1/2018-6/30/2018, PI
    North Central CCDC Support
    Raytheon
    Total Amount: $15,000
  • 1/28/2017-6/30/2017, PI
    North Central CCDC Support
    Raytheon
    Total Amount: $5,000
  • 1/28/2017-6/30/2017, PI
    North Central CCDC Support
    US Air Force, Air Force Research Lab
    Total Amount: $10,000
  • 1/28/2016-6/30/2016, PI
    North Central CCDC Support
    US Air Force, Air Force Research Lab
    Total Amount: $5,000
  • 1/28/2016-6/30/2016, PI
    North Central CCDC Support
    US Air Force, Air Force Research Lab
    Total Amount: $18,000
  • 1/28/2015-6/30/2015, PI
    North Central CCDC Support
    US Air Force, Air Force Research Lab
    Total Amount: $16,000
  • 1/28/2015-6/30/2015, PI
    North Central CCDC Support
    Department of Homeland Security
    Total Amount: $5,000
  • 10/1/2013-6/27/2014, PI
    North Central CCDC Support
    Department of Homeland Security
    Total Amount: $10,000

External Fund Raising

  • DakotaCon X, March 2020*
    *Postponed due to COVID-19
    $25,500 external sponsorships
    $14,500 registration fees
  • DakotaCon IX, March 2019
    $33,000 external sponsorships
    $26,500 registration fees
  • DakotaCon VIII, March 2018
    $37,500 external sponsorships
    $26,500 registration fees
  • DakotaCon VII, March 2017
    $24,000 external sponsorships
    $32,000 registration fees
  • DakotaCon VI, March 2016
    $24,000 external sponsorships
    $28,400 registration fees
  • DakotaCon V, March 2015
    $27,000 external sponsorships

  • K. Cronin, M. Ham. (2022). Teaching Introductory Routing Concepts. Paper presented at the Education Special Interest Group Conference in Clearwater, FL.
  • M. Ham, K. Cronin. (2022). Electronic Cyber Badge: An Experiential Teaching Platform for Cybersecurity Concepts. Paper presented at the Education Special Interest Group Conference in Clearwater, FL.
  • K. Cronin, M. Ham. (2022). Internet of Strings: Introducing Routing Concepts to Kids. Paper presented at the Midwest Instruction and Computing Symposium in Milwaukee, WI.
  • M. Ham, K. Cronin. (2022). Wireless Security: Learning by Hacking with Software Defined Radios. Paper presented at the Midwest Instruction and Computing Symposium in Milwaukee, WI.
  • K. Cronin, M. Ham. (2021). A python tool for rogue 802.11 teaching. Paper presented at the Education Special Interest Group Conference in Washington, DC.
  • M. Ham, K. Cronin. (2021). IPv6 RPKI Implementation Validator: A Security Utility for BGP Administrators. Paper presented at the Education Special Interest Group Conference in Washington, DC.
  • K. Cronin, M. Ham. (2020). Open Source Capture and Analysis of 802.11 Management Frames. Paper presented at the Information Technology Next Generation in Las Vegas, NV.
  • K. Cronin, M. Ham. (2020). Educating on 802.11 Using Open Source Capture Tools. Paper presented at the Central Area Networking and Security Workshop in Ames, IA.
  • K. Cronin, W. Pauli, M. Ham. (2013). Creating a Virtualized Environment for Large-Scale Hands-On IA Education. Paper presented at the Information Systems Educators Conference in San Antonio, TX.
  • K. Cronin, W. Pauli, M. Ham. (2011). Using the cloud: Keeping enterprise data private. Presented at Conference on Information Systems Applied Research in Wilmington NC.
  • M. Tu, K. Cronin, D. Xu. On the development of Digital Forensics Curriculum. Journal of Digital Forensics, Security, and Law. May 2011.
  • P. Engebretson, K. Cronin, J. Pauli. (2010). SprayPAL: How capturing and replaying attack traffic can save your IDS. Presented at BlackHat 2010 in Las Vegas NV.

  • J. Wulf-Plimpton, K. Cronin, Y. Wang, “Comparative Study of Healthcare Administrative Employee’s Comprehension and Use of Data Protection Applications of Cell Phones” DSU Research Day, March 2019
  • K. Cronin, B. VanAartsen, “Quick Methods for Evaluation of Security Posture” Educause Annual Security Conference, April 2018
  • K. Cronin, D. Overby, “Delivering Hands-On Cybersecurity Curriculum in Online and Campus Environments” Educause Annual Conference, October 2016
  • L Reinsfelder, K. Cronin, M Nowatkowski, “Emerging Needs for Cybersecurity Curriculum and Skills” GRU Cyber Education Summit, October 2015
  • K. Cronin, “Hands On Virtual Learning Environments” Colloquium for Information Systems Security Education, June 2014
  • K. Cronin, “Surveillance and Cyber-security in our Globalized World” James E. Smith Midwest Conference on World Affairs, September 2013.
  • K. Cronin, “On the Design and Implementation of DSU’s Information Assurance Virtual Lab” DSU Cloud Computing Symposium, February 2011
  • Invited Presentation: GenCyber Badges: A Tool for Teaching Cybersecurity, GenCyber Fall Meeting, October 2022
  • Invited Presentation: Cybersecurity for Residential K12 Interactions, GenCyber Fall Meeting, September 2019, National Harbor, MD
  • Invited Presentation: Kinesthetic Cybersecurity Activities, GenCyber Fall Meeting, August 2018, Phoenix, AZ
  • Invited Presentation: Birds of a Feather: Differentiated Learning, GenCyber Spring Meeting, April 2018, Bellevue, WA
  • Poster Presentation: Dealing with Students’ Parents, GenCyber Spring Meeting, San Antonio, TX, March 2017
  • Invited Presentation: InfoSec Unlocked: Diversity Challenges in Cyber, Online/Remote, InfoSec Unlocked, February 2017
  • Panel Discussion: Cybersecurity First Principles, GenCyber Spring Meeting, San Antonio, TX, March 2017
  • Invited Presentation: Cyber Security Pipelines: How to solve it?, Better Business Bureau Cyber Security Summit, Sioux Falls, SD, November 2015
  • Poster Presentation: Residential Experiences for Highschool Students, GenCyber Spring Meeting, New Orleans, LA, September 2015
  • Panel Discussion: Pre-Attendee Assessment Activities, GenCyber Fall Meeting, New Orleans, LA, September 2015
  • Panel Discussion: Recruitment of K12 Students, GenCyber Fall Meeting, New Orleans, LA, September 2015
  • Panel Discussion: Experiences of Residential Cyber Camps, GenCyber Spring Meeting, Denver CO, March 2015