2018 NSF Cybersecurity Summit Agenda
Tuesday August 21st - Thursday August 23rd, 2018
August 21st
Training Day
8:00am Registration and Continental Breakfast
9:00am Morning and All Day Training Sessions Begin
- WISE Workshop
- Industrial Control System Security - Existing Infrastructure and New Designs
- Setting up a compliance program for CUI
- Automated Assessment Tools – Theory & Practice
- Developing Cybersecurity Programs for NSF Projects
10:30am Coffee Break
11:00am Training Sessions Resume
1:00pm Lunch provided
2:00pm Afternoon Training Sessions Begin and All Day Training Sessions Resume
- WISE Workshop
- Software Engineering Guide for NSF Science
- Compliance 101: HIPAA, FISMA, NIST 800-171 and GDPR
- Security Log Analysis Training
4:00pm Coffee Break
4:30pm Training Sessions Resume
6:00pm Sessions End
Evening: Dinner on your own
August 22nd
Plenary Day 1
8:00am Sign-In and Continental Breakfast
9:00am Welcome and NSF Address (Jim Marsteller / Amy Friedlander)
9:30am Keynote: Von Welch - “Five Years Backwards and Forwards”
10:30am Coffee Break (Meet a Student)
11:00pm Involving Students in Cybersecurity for CI (Jeremy Straub)
11:30am Security Best Practices for Academic Cloud Service Providers (Rion Dooley, Richard Knepper, Mike Lowe)
12:30pm Group Photo, Lunch (Lunch provided) and Table Talks:
- Cybersecurity Research Transition To Practice (TTP): Needs, Solutions and US-EU Collaboration
- Cybercrime book discussion
- Industrial Control Systems/SCADA Security
2:00pm Silent Librarian (Kim Milford, Brett Zupan)
2:30pm Responding to advanced threats as a global community (Romain Wartel)
3:00pm XSEDE Lessons Learned (Adam Slagell)
4:00pm Coffee Break
4:30pm Incident Response Communications (Susan Ramsey, Ashwin Jacob Mathew, Dr. Daniel Massey)
5:30pm Open Discussion / Summary of the Day’s Findings (Jim Marsteller, Von Welch)
6:00pm Adjourn
6:30pm Social @ San Antonio Bar and Grill (200 Swamp Fox Rd, Alexandria, VA)
August 23rd
Plenary Day 2
8:00am Sign-In and Continental Breakfast
9:00am Password Adventures for a VO (Warren Anderson)
9:30am A case study on implementing crowdsourced threat intel and active response (Charley Kneifel, Richard Biever)
10:00am Evidence Based Cybersecurity (Grayson Harbour)
10:30am Coffee Break
11:00am Security and Assurance for Research Identities (Jim Basney, Laura Paglione, Steve Tuecke, Romain Wartel)
12:00pm Open Discussion / Summary of Summit Findings (Jim Marsteller, Von Welch)
12:30pm Adjourn