Call for Trusted CI Framework Cohort Participation

Trusted CI is announcing the Call for Participation for the 2026 Trusted CI Framework Cohort engagement.

The Framework Cohort is a six month, group engagement aimed at facilitating adoption and implementation of the Trusted CI Framework among NSF Major Facilities, Mid-scales, and research cyberinfrastructure (CI) providers. During the engagement, members of the cohort will work closely with Trusted CI toward implementing the Trusted CI Framework at their facility, emerging with a validated assessment of their cybersecurity program and a strategic plan detailing their path to fully implement each Framework Must. Cohort members will participate in six monthly workshops (lasting three hours each) and spend no more than eight hours each month outside of the workshops on cohort assignments. The 2026 cohort will meet from January 2026 through June 2026. If your organization is interested in participating, let us know by completing the short interest survey below, or by reaching out to framework@trustedci.org.

About the cohort program

Since January 2022, over 85% percent of NSF’s Major Facilities (MFs) have completed a cohort engagement or are currently participating in a cohort. Several NSF Mid-scales and CI providers completed the program as well. 

The foundation of the cohort program is the Trusted CI Framework. The Framework was created as a minimum standard for cybersecurity programs. In contrast to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity. 

This six-month program of training and workshop engagement focuses on learning and applying the Trusted CI Framework. Cohort members enter the engagement with a commitment to adopting the Framework at their organizations. Cohort participants work closely with Trusted CI to gather site information to create a validated self-assessment of their organization's cybersecurity program based on the Framework. Additionally, each organization will emerge with a draft Cybersecurity Program Strategic Plan (CPSP) identifying priorities and directions for further refining their cybersecurity program. 

FAQs

  • We are prioritizing participation by NSF’s Major Facilities and also welcome representatives from NSF Mid-scale and other NSF-related research cyberinfrastructure projects. Personnel with responsibility for cybersecurity, ranging from front-line cybersecurity professionals to CISOs, are the ideal individuals to represent their organizations in this effort. Trusted CI is now expanding the scope of cohorts to include higher education institutions.

  • We only require one person from each facility to participate in each workshop, although more are encouraged. We do require that at least one person from each facility attend each workshop, so we recommend having a designated backup if only one person usually attends.

  • While our cohort program is focused on NSF Major Facilities, Mid-scales, and CI providers, we welcome other members of the community engaging with Trusted CI via our annual NSF Cybersecurity Summit, webinar series, public Slack Channel, and email lists.

  • Though Trusted CI’s primary focus is on scientific data that is not subject to government regulations, we occasionally accept applications seeking help with compliance when there are direct or indirect benefits to NSF science. We would encourage you to emphasize those in your applications. For additional assistance with compliance issues, we recommend joining the Regulated Research Community of Practice.