2019 NSF Summit Presentations

On this page, you can access and view many of the presentations from the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Please view the list below and click on the name of the presentation to view the content. (Note that we do not have files for all of the presentations so the list below is not comprehensive.)

The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

Wednesday, October 16th

Cyberinfrastructure Center of Excellence PILOT - Establishing Effective Practices for Large Facilities - Ewa Deelman

Experiences Applying Security Standards to Cloud Hosted Services - Brigitte Raumann, Rachana Ananthakrishnan & Thomas Barton

SciTokens: Capability-Based Secure Access to Remote Scientific Data - Jim Basney, Derek Weitzel & Alex Withers

Fellows Panel - Moderator: Dana Brunson Panelists: Shafaq Chaudhry, Matias Carrasco Kind, S. Jay Yang, Aunshul Rege, Gabriella Perez, Chrysafis Vogiatzis

AI for Cybersecurity: Friend or Foe? The Challenges posed by Adversarial Machine Learning - Rajvardhan Oak

NEON and CI CoE Pilot vs. Identity Management, a story - Jeremy Sampson, Ryan Kiser & Terry Fleury

Cybersecurity between the Continents (What we do in Europe and why you should care.) - Sigita Jurkynaite

Augmenting Nessus with Splunk for Better Vulnerability Management - Elliot Pfarr

Responses to Vulnerability Notification by Security Companies - Andrew Ferbert

No Phishing Allowed! - U2F, FIDO and WebAuthn - Scott Saikai

Blockchain Technology for Decentralized Crowdsourced Data Analytics: Challenges and Opportunities - Nitin Sukhija and Elizabeth Bautista

Extracting and Synthesizing Cyberattack Behavior Models for Predictive Intelligence - Shanchieh Jay Yang

Into the Dragon’s Den Preparing and Sending Researchers to China - Zachary Hunsaker

Risk Assessment Panel - Jim Basney, Terry Fleury and Charles Nguyen

Thursday, October 17th

Cybersecurity Challenges for Edge Platforms - Chris Weaver

Hacking the Human: Exploiting the Weakest Link in Cyber Attacks - Aunshul Rege

STINGAR-VIS: Threat Intelligence, vulnerability management and the potential for data analysis - Richard Biever and Ken Goodwin

Cybersecurity Research Transition to Practice (TTP) - Florence Hudson

Trusted CI State of the Union - Von Welch