Cookie Preferences

We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. See our Privacy Policy for more information.

Research · Advisory · Teaching

Jovita T. Nsoh, Ph.D.

I work at the intersection of industry-scale systems and academic research, advancing identity-first security for AI systems and critical infrastructure.

My work is grounded in Design Science Research Methodology (DSRM) and follows an applied sciences model, similar to the German Fachhochschule tradition, where research is realized through artifacts—architectures, models, and systems that address real operational problems.

Drawing on more than two decades of experience securing production environments across cloud, finance, energy, and the public sector, I focus on designing, building, and evaluating deployable security artifacts that operate under real-world constraints.

Now
  • Developing JEPA-ΔVec framework for adaptive AI security architectures
  • Leading IAM integration research for operational technology environments
  • Building the African IT Professional (AfITPro) leadership ecosystem

Research Pillars

Each research pillar follows the DSRM cycle: identifying real-world problems, designing and building security artifacts, evaluating them in operational contexts, and communicating results.

Identity & Access Management
IAM as the foundational control plane: AuthN, AuthZ, federation, Zero Trust, and policy-as-code across enterprise and critical infrastructure.

Artifacts:

Identity ArchitecturesAccess ModelsPolicy Frameworks

DSRM: Design → Evaluate → Deploy

AI-Driven Defense
Governed, identity-scoped AI security including agentic systems, model risk management, guardrails, and adversarial ML defense.

Artifacts:

Detection PipelinesAI GuardrailsModel Governance

DSRM: Problem → Build → Test

Critical Infrastructure Resilience
Securing cyber-physical systems across energy, transportation, healthcare, and industrial control systems with IT/OT convergence.

Artifacts:

OT Security ModelsResilience FrameworksReference Implementations

DSRM: Evaluate → Iterate → Communicate

Design Science Research Methodology

Every artifact follows a rigorous lifecycle: from problem identification through design, build, demonstration, evaluation, and communication.

1

Problem Identification

Define the operational security problem from real-world observation

2

Objectives Definition

Specify what a successful solution must achieve

3

Design & Development

Build the artifact: architecture, model, framework, or tool

4

Demonstration

Show the artifact working in a representative context

5

Evaluation

Measure against objectives using appropriate methods

6

Communication

Publish findings and share artifacts for reuse

Funding
Funding supports artifact pipelines—systematic production of security architectures, models, and tools.

3

Active Grants

$2.4M

Total Funding

3

Sponsors

View Artifact Pipelines
Teaching
Teaching is the execution layer of applied research—students design, build, and evaluate security artifacts.
Secure Software DesignIntrusion Detection & IRInnovation Leadership

Focus: Identity-first, adversarial thinking, secure SDLC

View Courses
Free Access

Join the Insider Channel

Get early access to research notes, artifact announcements, funding updates, and exclusive memos on identity-first security and AI defense.

Subscribe Free