2017 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

Read the 2017 NSF Cybersecurity Summit Report

Theme: Ensuring Data Provenance, Integrity and Resilience

When: August 15 through August 17, 2017

WhereThe Westin Arlington Gateway near NSF headquarters. A group rate will be available for lodging until July 28, 2017. Hotel reservations may be made online

Who: Attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.

Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the processes initiated in 2013, 2014, 2015 and 2016: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges. 

The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships. 

If you are interested in presenting at the Summit, please respond to the 2017 Call for Proposals when released. The Summit organizers welcome proposals from all individuals and agencies. 

For more information, please contact us at: info@trustedci.org

Slides

Training Slides

Federated Identity Management for Research Organizations - Jim Basney, Scott Koranda

Security Log Analysis Training - Mark Krenz

Legacy Industrial Control Systems - Secure / Replace / Ignore? - Phil Salkie

Handling Regulated Government Data, Protected Health Information, and CUI - Anurag Shankar

Digital Forensics and Incident Response - Warren Raquel

Rebuilding a Plane in Flight: Refactors Under Pressure - Susan Sons

Developing Cybersecurity Programs for NSF Projects - Bob Cowles, Craig Jackson, Jim Marsteller

Automated Assessment Tools - Theory & Practice

Plenary Slides

Keynote #1: A Workflow-Centric Approach to Increasing Reproducibility and Data Integrity - Jeff Spies

CCoE Update - Von Welch

From Bare Metal to Virtual: Lessons Learned When A Supercomputing Institute Deploys Its First Cloud - Evan F. Bollig

Cornell Red Cloud: Campus-Based Hybrid Cloud Computing - Steven Lee

HTCondor - Todd Tannenbaum

Beyond the Beltway: The Problems with NIST’s Approaches to Cybersecurity and Alternatives for NSF Science - Craig Jackson, Bob Cowles, Scott Russell

Finding Your Way in the Dark: Security from First Principles - Susan Sons

Keynote #2: Data, Data Everywhere - How Shall We Live With It? - Marjory Blumenthal

The Applicability of HPC for Cyber Situational Awareness - Leslie Leonard

Internet2 NOC Risk Assessment - Paul Howell