Hi, My name is

Alicja.

Security professional by expertise, researcher by curiosity, sports enthusiast by choice.

I'm specializing in securing systems. Currently, focused on exploring vulnerabilities and safety of AI solutions. You can find me teaching at Warsaw School of Computer Science.

View My Courses

About Me

During my tenure at Goldman Sachs I've had an opportunity to build risk frameworks that reduce incident rates, ensure regulatory compliance and leverage quantitative and qualitative methodologies for threat modeling.

Today, I channel that experience into teaching at Warsaw School of Computer Science, helping students gain essential cybersecurity knowledge.

My ongoing research centers on AI security, specifically developing appropriate measures to evaluate backdoor effectiveness in machine learning systems.

Since 2020, I have been serving as a representative of ML in PL, a Polish-based organization committed to fostering the machine learning community across Poland and Europe. In this role, I focus on promoting a deeper understanding of ML methods while actively creating opportunities for Academia and Business collaboration.

Here are a few areas I specialize in:

  • Threat Modelling
  • Security Risk Assessment
  • Compliance & Standards
  • Security System Design
  • CISSP
  • Stakeholder Management
Alicja Grochocka-Dorocinska

Relevant Experience

Teaching

Cybersecurity in IT Systems

Warsaw School of Computer Science • Spring 2026 • Post diploma

A comprehensive introduction to the fundamentals of cybersecurity. Students learn about threat landscapes, defense mechanisms, security policies, and ethical considerations. Hands-on labs include basic penetration testing and security auditing.

CIA Triad Cybersecurity Ethics Social Engineering

📄 Slides

Application of AI in Cybersecurity

Warsaw School of Computer Science • Spring 2026 • Post diploma

This course explores how artificial intelligence and machine learning techniques are transforming the field of cybersecurity. Students will learn how AI-powered tools are used to detect threats, analyze malicious behavior, automate incident response, and strengthen defenses against modern cyberattacks. The course covers practical applications including anomaly detection, intrusion detection systems, phishing identification, and vulnerability assessment. By the end of the course, participants will have a solid understanding of how AI can be leveraged to build smarter, faster, and more resilient security systems.

Intrusion Detection Social Engineering Incident Response Risk Assessment

📄 Slides

Recent Writings

Get In Touch

I'm always interested in collaborating on research projects, speaking at conferences, or discussing cybersecurity. Whether you're a student, fellow researcher, or industry professional, feel free to reach out!

Say Hello