2019 NSF Summit Presentations
On this page, you can access and view many of the presentations from the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Please view the list below and click on the name of the presentation to view the content. (Note that we do not have files for all of the presentations so the list below is not comprehensive.)
The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
Wednesday, October 16th
Cyberinfrastructure Center of Excellence PILOT - Establishing Effective Practices for Large Facilities - Ewa Deelman
Experiences Applying Security Standards to Cloud Hosted Services - Brigitte Raumann, Rachana Ananthakrishnan & Thomas Barton
SciTokens: Capability-Based Secure Access to Remote Scientific Data - Jim Basney, Derek Weitzel & Alex Withers
Fellows Panel - Moderator: Dana Brunson Panelists: Shafaq Chaudhry, Matias Carrasco Kind, S. Jay Yang, Aunshul Rege, Gabriella Perez, Chrysafis Vogiatzis
AI for Cybersecurity: Friend or Foe? The Challenges posed by Adversarial Machine Learning - Rajvardhan Oak
NEON and CI CoE Pilot vs. Identity Management, a story - Jeremy Sampson, Ryan Kiser & Terry Fleury
Cybersecurity between the Continents (What we do in Europe and why you should care.) - Sigita Jurkynaite
Augmenting Nessus with Splunk for Better Vulnerability Management - Elliot Pfarr
Responses to Vulnerability Notification by Security Companies - Andrew Ferbert
No Phishing Allowed! - U2F, FIDO and WebAuthn - Scott Saikai
Blockchain Technology for Decentralized Crowdsourced Data Analytics: Challenges and Opportunities - Nitin Sukhija and Elizabeth Bautista
Extracting and Synthesizing Cyberattack Behavior Models for Predictive Intelligence - Shanchieh Jay Yang
Into the Dragon’s Den Preparing and Sending Researchers to China - Zachary Hunsaker
Risk Assessment Panel - Jim Basney, Terry Fleury and Charles Nguyen
Thursday, October 17th
Cybersecurity Challenges for Edge Platforms - Chris Weaver
Hacking the Human: Exploiting the Weakest Link in Cyber Attacks - Aunshul Rege
STINGAR-VIS: Threat Intelligence, vulnerability management and the potential for data analysis - Richard Biever and Ken Goodwin
Cybersecurity Research Transition to Practice (TTP) - Florence Hudson
Trusted CI State of the Union - Von Welch