2015 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
Theme: Understanding the Information Assets that Enable Science
- View the Agenda (updated 08/14/2015)
- View the Training Descriptions
- View the Collected Bios for Speakers, Authors, PC Members, Organizers, and Student Awardees
- Complete the Attendee Survey
- Complete the Training Evaluation (For August 17 attendees only)
- View the Call for Participation (now closed)
- View Tips for Building CFP Responses
- View information from the 2013 and 2014 Summits
When: August 17 through August 19, 2015
Where: The Westin Arlington Gateway near NSF headquarters. A group rate is available for lodging until July 27, 2015. Hotel reservations may be made online.
Who: As with prior summits, the event is invite-only, but inclusive of the NSF CI community, with no attendance fee. Invited attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.
Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the processes initiated in 2013 and 2014: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges.
The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships.
If you are interested in presenting at the Summit, please respond to the 2015 Call for Proposals. The Summit organizers welcome proposals from all individuals and agencies.
For more information, please contact us at: info@trustedci.org
Program: On August 17, the Summit will offer a full day of information security training, with sessions designed for both technical and management audiences. The day kicks off with sign-on and continental breakfast at 7am in the Hemingway Pre-Function area.
August 18 and the morning of August 19 will follow a workshop format with keynotes, panels and significant interaction. Our focus for 2015 is on understanding the information assets that enable science, but, the issues involved training and networking opportunities will be of benefit to the larger CI community as well. Both August 18 and 19 will kick off with sign-in and continental breakfast at 7am in the F. Scott Fitzgerald AB area.
The agenda will be linked above and updated frequently once details become available.
To sync up with CTSC, check out our blog, join our email lists, or contact us.
***
Slides
Training Slides
Bro Platform Training Workshop - Johanna Amann (ICSI), Justin Azoff (NCSA) & Adam Slagell (NCSA)
Developing Cybersecurity Programs for NSF Projects - Bob Cowles, Craig Jackson, Jim Marsteller & Susan Sons (CTSC)
Vulnerabilities, Threats, and Secure Coding Practices - Barton P. Miller & Elisa Heymann
Industrial Control Systems, Networking, and Cybersecurity - Phil Salkie (Jenariah Industrial Automation)
Aligning your Research Cyberinfrastructure with HIPAA and FISMA - Anurag Shankar (Indiana University)
Incident Response Training - Randy Butler (NCSA)
Plenary Slides
NSF Address - Bill Miller (Science Advisor, Division of Advanced Cyberinfrastructure (ACI))
A Historical Perspective on Addressing Cybersecurity at NSF Supported Communities - Clifford A. Jacobs (NSF Retired)
Keynote: Science or Security - George Strawn
Trustworthy Computational Science - Von Welch (CTSC)
Panel: The Anatomy of a Data Breach - Susan Ramsey (NCAR)
Dealing with Cyberthreats: A European Perspective - Romain Warel & Liviu Valsan (CERN)
Beyond Security and Privacy: Trust and the Value of Data - Kent Wada (UCLA)
The Tragedy of Open Source - Dave Nalley (The Apache Foundation)