Call for White Papers, Training, and Student Applications

2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

August 26 - 28 ✶ Westin Arlington Gateway ✶ Arlington, VA

Theme:  Large Facility Cybersecurity Challenges and Responses

It is our great pleasure to announce that the 2014 Cybersecurity Summit will take place Tuesday, August 26th through Thursday, August 28th, at the Westin Arlington Gateway near National Science Foundation Headquarters in Arlington, VA. On August 26th, the Summit will offer a full day of information security training. The second and third days will follow a workshop format designed to identify both the key cybersecurity challenges facing Large Facilities and the most effective responses to those challenges.

Spanning six years from 2004-2009 and reinstated in 2013, the annual NSF Cybersecurity Summit serves as a valuable part of the process of securing the NSF scientific cyberinfrastructure by providing the community a forum for education, sharing experiences, building relationships, and establishing best practices.

The NSF CI ecosystem presents an aggregate of complex, unique cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF CI and cybersecurity to continue the processes initiated in 2013: Building a trusting, collaborative community, and seriously addressing that community’s core cybersecurity challenges.

Call for White Papers

Please submit brief white papers focused on NSF Large Facilities’ unmet cybersecurity challenges, lessons learned, and/or significant successes.  White papers (and presentations) may be in the form of position papers and/or narratives and may be one to five pages in length.

Criteria: All submitted white papers will be included in the 2014 summit report. The Program Committee will select the most relevant, reasoned, and broadly interesting for presentation during the Summit Plenary Session (Aug 27-28). A limited amount of funding is available to assist with travel for accepted submissions.

Extended submission deadline:  July 12, 2014

Submit to: Craig Jackson,

Word limit:  400 to 2000 words (~1-5 single spaced pages)

Notification of acceptance:  July 16, 2014

Call for Information Security Training

Please submit brief abstracts from individuals or teams willing to present half and full-day training on August 26. Training may be targeted at technical and/or management audiences.  Areas of interest include, but are not limited to, cybersecurity planning and programs, risk assessment and management, regulatory compliance, identity and access management, networks security and monitoring, secure coding and software assurance, physical security in the context of information security, and information security of scientific and emerging technologies. The Program Committee will select the most community-relevant and broadly interesting training sessions for presentation during the first day of the summit (Aug 26).

Extended submission deadline:  July 12, 2014

Submit to: Craig Jackson,

Word Limit:  600 words

Notification of Acceptance:  July 16, 2014

Call for Student Applications

Please submit a one page reference or cover letter and a student resume detailing how the student would benefit from attending the Summit. Recognizing that inclusivity and diverse participation is both a socially relevant outcome for NSF and a particular challenge in the cybersecurity community in general, the Program Committee will consider diversity when selecting successful applications.

Cover letters should address the student’s interest in science and/or information security. Up to five successful student applicants will receive invitations to attend the Summit, and the opportunity for reimbursement of travel expenses. All submissions will be reviewed by the Program Committee and organizers.

Extended submission deadline:  July 12, 2014

Submit to: Craig Jackson,

Word limit for cover letters: 600 words

Notification of Acceptance:  July 16, 2014

Program Committee and Organizers

Amy Apon, Chair of the Computer Science Division of the Clemson University School of Computing and former Director of the Arkansas High Performance Computing Center.

Anthony (Tony) Baylis, Director, Office of Strategic Diversity Programs at Lawrence Livermore National Laboratory.

Michael Corn, Deputy CIO and CISO for Brandeis University.

Barb Fossum, NEES deputy center director and former managing director of Purdue University’s Cyber Center and Computer Research Institute.

Kelly Gaither, Director of Visualization, Texas Advanced Computing Center.

Ardoth Hassler, Associate Vice President of University Information Services & Executive Director, Office of Assessment and Decision Support at Georgetown University and former Senior Information Technology Advisor in the Office of the CIO in the NSF Office of Information and Resource Management, Division of Information Systems.

Craig Jackson (Organizer), Senior Policy Analyst, Center for Applied Cybersecurity Research, Indiana University, and Project Manager, Center for Trustworthy Scientific Cyberinfrastructure (CTSC)

James Marsteller (Organizer and Program Committee Chair), Information Security Officer, Pittsburgh Supercomputing Center, and Co-PI, Center for Trustworthy Scientific Cyberinfrastructure (CTSC).

William “Clay” Moody, Computer Science PhD candidate and an active duty US Army Major stationed as an Army Fellow at Clemson University. Following his PhD studies, he has an appointment to the faculty of the Department of Electrical Engineering and Computer Science at West Point, the United States Military Academy.

Rodney Petersen, interim Executive Director of the Research and Education Community Security Collaborative (previously known as SecuriCORE) and former Managing Director of the EDUCAUSE Washington Office and a Senior Government Relations Officer.

Mark Servilla, Lead Scientist, Network Information System at LTER Network Office (LNO).

Von Welch, (Organizer), Deputy Director, Center for Applied Cybersecurity Research, Indiana University, and PI, Center for Trustworthy Scientific Cyberinfrastructure (CTSC).