2014 NSF Cybersecurity Summit
for Large Facilities and Cyberinfrastructure
Theme: Large Facility Cybersecurity Challenges and Responses
- View the Agenda (updated 8/22/2014)
- View the Training Descriptions
- View the Collected Bios for Speakers, Authors, PC Members, Organizers, and Student Awardees
- Complete the Attendee Survey
- Complete the Training Evaluation (for August 26 attendees only)
- View the Call for White Papers, Training, and Student Applications (now closed)
When: August 26 through August 28, 2014
Who: As with prior summits, the event is invite-only, but inclusive of the NSF CI community, with no attendance fee. Invited attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.
For more information, contact Von Welch (firstname.lastname@example.org), Jim Marsteller (email@example.com), and/or Craig Jackson (firstname.lastname@example.org).
* * *
On August 26, the Summit will offer a full day of information security training, with sessions designed for both technical and management audiences. The day kicks off with sign-in and continental breakfast at 7am in the Hemingway Pre-Function area.
August 27 and the morning of August 28 will follow a workshop format with keynotes, panels and significant interaction. Our focus for 2014 is on the cybersecurity challenges facing Large Facilities, but the issues involved, training and networking opportunities will be of benefit to the larger CI community as well. Both August 27 and 28 will kick off with sign-in and continental breakfast at 7am in the Pre-Function C area.
The agenda, linked above, will be updated frequently as additional details become available.
Announcement: We are honored to have Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity for the National Protection and Programs Directorate (NPPD), as our keynote speaker on August 27. Dr. Schneck is the chief cybersecurity officer for the Department of Homeland Security. She has an expansive and influential career in public service, industry, and academia.
Announcement: Matthew Rosenquist, Cyber Security Strategist at Intel Corporation, will be presenting a keynote address on August 28. We're very excited to have someone of Matthew's broad experience and expertise in information security and risk management.
* * *
- Developing Cybersecurity Programs for NSF Projects (PDF) - Jim Marsteller, Susan Sons, Craig Jackson, Jared Allar (CTSC)
- Vulnerabilities, Threats, and Secure Coding Practices (PDF) - Barton P. Miller, James A. Kupsch, Elisa Heymann (University of Wisconsin)
- HPC, HIPAA, and FISMA: Meeting the Regulatory Challenge through Effective Risk Management (PowerPoint) - Bill Barnett & Anurag Shankar (Indiana University)
- Incident Response Training (Powerpoint part 1, Powerpoint part 2) - Randy Butler, Warren Raquel, Patrick Duda (NCSA)
- NSF/ACI Perspective on Cybersecurity (Powerpoint) - Anita Nikolich (NSF)
- CTSC Observations, Perspective, and Vision (PDF) - Von Welch (CTSC)
- NSF Bro Center for Expertise (PDF) - Robin Sommer (Bro)
- Curbing Abusive Behavior in Science Gateways (PDF) - Pascal Meunier (HUBzero)
- Cybersecurity Operations in a Multi-Institutional Academic Setting: The NEES Story (PDF) - Saurabh Bagchi (Purdue University)
- Case Study: XSEDE Leverages Globus Nexus for Identity and Group Management (PDF) - Steve Tuecke (XSEDE)
- Managing Security Policies for Federated Cyberinfrastructure (Powerpoint) - Stephen Schwab and
John Wroclawski (USC ISI)
- Keynote: Strategic Leadership for Managing Evolving Cybersecurity Risks (PDF) - Matthew Rosenquist (Intel)
- Panel: Threat Profile for NSF Large Facilities and Cyberinfrastructure (PDF) - Panelists: Amy Butler (GWU), Jeremy Epstein (NSF), David Halstead (NRAO), Matthew Rosenquist (Intel); Moderator: David Raymond (Army Cyber Institute, U.S. Military Academy)
* * *
Amy Apon, Chair of the Computer Science Division of the Clemson University School of Computing and former Director of the Arkansas High Performance Computing Center.
Anthony (Tony) Baylis, Director, Office of Strategic Diversity Programs at Lawrence Livermore National Laboratory.
Michael Corn, Deputy CIO and CISO for Brandeis University.
Barb Fossum, NEES deputy center director and former managing director of Purdue University’s Cyber Center and Computer Research Institute.
Kelly Gaither, Director of Visualization, Texas Advanced Computing Center.
Ardoth Hassler, Associate Vice President of University Information Services & Executive Director, Office of Assessment and Decision Support at Georgetown University and former Senior Information Technology Advisor in the Office of the CIO in the NSF Office of Information and Resource Management, Division of Information Systems.
Craig Jackson (Organizer), Senior Policy Analyst, Center for Applied Cybersecurity Research, Indiana University, and Project Manager, Center for Trustworthy Scientific Cyberinfrastructure (CTSC)
James Marsteller (Organizer and Program Committee Chair), Information Security Officer, Pittsburgh Supercomputing Center, and Co-PI, Center for Trustworthy Scientific Cyberinfrastructure (CTSC).
William “Clay” Moody, Computer Science PhD candidate and an active duty US Army Major stationed as an Army Fellow at Clemson University. Following his PhD studies, he has an appointment to the faculty of the Department of Electrical Engineering and Computer Science at West Point, the United States Military Academy.
Rodney Petersen, interim Executive Director of the Research and Education Community Security Collaborative (previously known as SecuriCORE) and former Managing Director of the EDUCAUSE Washington Office and a Senior Government Relations Officer.
Mark Servilla, Lead Scientist, Network Information System at LTER Network Office (LNO).
Von Welch, (Organizer), Deputy Director, Center for Applied Cybersecurity Research, Indiana University, and PI, Center for Trustworthy Scientific Cyberinfrastructure (CTSC)