Presentations

Trusted CI undertakes outreach activities both to disseminate its work and to make NSF CI projects aware of its services. Below is a listing of all presentations given by Trusted CI, by year:

2018

  • Anurag Shankar. Securing Research Data on Campus – Not Just HIPAA and FISMA, Indiana University Statewide IT Conference October 2018 [slides]

  • Mark Krenz. Your Cloud Data Exposed, a look at the issues of sharing documents on Google Drive and Box, Indiana University Statewide IT Conference October 2018 [slides]

  • Von Welch. Cybersecurity to Enable Science: Hindsight and Vision from the NSF Cybersecurity Center of Excellence. NSF OAC webinar, September 2018 [slides][recording].

  • Von Welch. Cybersecurity: We Don't Have It Right Yet. 2018 NSF Cybersecurity Summit Keynote, August 2018 [slides].

  • Grayson Harbour. Evidence Based Cybersecurity. 2018 NSF Cybersecurity Summit Presentation, 23 August 2018 [slides].

  • Jim Basney, August SGCI Bootcamp. Cybersecurity for Gateways [slides].

  • Anita Nikolich, Von Welch. Trusted CI Panel Presentation at PEARC18, July 2018.

  • Von Welch. Cybersecurity for Research on Small Campuses. Strategic Partnership for Advanced Cyber Infrastructure @ Minority Serving Institutions, June 2018. [slides]

  • Anurag Shankar and Jim Basney presented "Cybersecurity for Research on Campus: Not Just HIPAA & FISMA" at the Internet2 Global Summit, May 2018. [slides/video]

  • Warren Raquel led a pre-conference workshop, "Incident Response Training", at the EDUCAUSE Security Professionals conference, April 2018. [slides]

  • Mark Krenz led a pre-conference workshop, "Security Log Analysis", at the EDUCAUSE Security Professionals conference, April 2018. [slides]

  • Anurag Shankar, Jim Basney, and Von Welch presented "Cybersecurity for Research on Campus: Not Just HIPAA & FISMA" at the EDUCAUSE Security Professionals conference, April 2018. [slides]

  • Von Welch and Mark Krenz presented “Cybersecurity for the Modern Science Gateway” at the Science Gateways Community Institute's webinar, February 2018. [webinar] [slides]

2017

  • Von Welch presented a five-year retrospective of CTSC at ISI on October 30th: CTSC Five Years Later: Lessons Learned from Serving the NSF Community. Invited talk at USC/ISI, October 2017. [slides]

  • Von Welch presented an overview of CACR activities at SC17 that includes CTSC experiences: Cybersecurity and Science. Presentation at IU SC17 Booth, November 2017. [slides]

  • Jim Basney and Scott Koranda organized an IAM workshop co-located with AGU17 on December 10. [blog post]

  • Mark Krenz gave a presentation at BroCon 2017 on September 12th on the use of awk to analyze Bro logs to detect a variety of security incidents as well as generate useful statistics. Mark also announced a new open source software tool he wrote that allows Bro users to better interface with Bro logs using awk syntax. The software is called 'bawk' and is available at https://github.com/deltaray/bawk. A recording of the presentation can be viewed at https://www.youtube.com/watch?v=20QeFkwXgCE

  • Bob Cowles gave a presentation to the Silicon Valley chapter of ISACA using an updated version of the “Beyond the Beltway” talk previously given at the 2017 NSF Summit. About 30 people attended from various companies in Silicon Valley.

  • Von Welch. A Science DMZ in Every Pot?. National Research Platform Workshop, August 2017. [slides]

  • Von Welch, Craig Jackson, Bob Cowles, Susan Sons and Scott Russell. Cybersecurity for Science. PEARC/ARCC, July 2017. [slides]

  • Bart Miller and Elisa Heymann described how to apply their First Principles Vulnerability Assessment (FPVA) methodology to critical maritime shipping software infrastructure at the 2nd NATO Conference on Cyber Security in the Maritime Domain, held in July 2017 at the NATO Maritime Interdiction Operations Training Center on Crete.

  • Von Welch. Cybersecurity for Science. SPAN Meeting at South Carolina State University, May 2017. [slides]

  • Jim Marsteller. The NSF Cybersecurity Center of Excellence. Towards Security Assured Cyberinfrastructure in Pennsylvania (SAC-PA) CI Cybersecurity Workshop, June 22 & 23 2017, Wyndham Pittsburgh University Center. 

  • Jim Marsteller. Current and Future Large Facilities Impacts. NSF Large Facilities Workshop, May 3rd 2017 at LIGO Livingston & Baton Rouge. [slides]

  • Jim Basney. Center for Trustworthy Scientific Cyberinfrastructure (CTSC) and Software Assurance Marketplace (SWAMP). CASC Spring Meeting, March 2017. [slides]

  • Craig Jackson. The NSF Cybersecurity Center of Excellence. Great Plains Network ENCITE Webinar, February 2017. [slides]

  • Von Welch. Randy Heiland. CTSC Poster for NSF SI2 PI Meeting, February 2017. [poster]

  • James Marsteller. Von Welch. The NSF Cybersecurity Center of Excellence: Current and Future Large Facilities Impacts. NSF Large Facilities Security WG, February 2017. [slides]

 

 

2016

  • Von Welch. Managing Scientific Collaboration using Identity Management and Access Control to Online Resources. AGU 2016 Fall Meeting, December 2016. https://dx.doi.org/10.6084/m9.figshare.4334795

  • Von Welch. Update on IdM for Research: What's new since SC15?. MAGIC Meeting co-located with SC16, November 2016.https://dx.doi.org/10.6084/m9.figshare.4282532

  • Von Welch. The NSF Cybersecurity Center of Excellence. Presentation at 2016 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2016. https://dx.doi.org/10.6084/m9.figshare.3792063.v1

  • Scott Russell, Craig Jackson, Robert Cowles, Cybersecurity Budgeting: A Survey of Benchmarking Research and Recommendations to Organizations, presented at and to be published in the report of the 2016 NSF Cybersecurity Summit, Arlington, VA, 17 Aug 2016. [slides

  • Jim Basney, Craig Jackson, Jim Marsteller, Bart Miller and Von Welch. The NSF Cybersecurity Center of Excellence. CTSC Webinar Series, May 2016. http://hdl.handle.net/2022/20871

  • Von Welch. Cybersecurity to Enable Open Science. Keynote at First International Conference on the Internet, Cyber Security and Information Systems, Botswana, May 2016. https://dx.doi.org/10.6084/m9.figshare.3428201

  • Von Welch. The NSF Cybersecurity Center of Excellence: Cybersecurity for Science. Southern Partnership in Advanced Networking Workshop, March 2016. https://dx.doi.org/10.6084/m9.figshare.3118153

  • Jim Basney, Craig Jackson, Jim Marsteller and Von Welch. The NSF Cybersecurity Center of Excellence and Large Facility Cybersecurity. NSF FacSec Meeting, February 2016.

  • Bob Cowles. Recommendations on Cybersecurity Programmes in e-Science Projects. Presentation at 36th EUGridPMA Bratislava Meeting, January 2016. https://indico.nikhef.nl/getFile.py/access?contribId=14&resId=0&materialId=slides&confId=339

2015

  • Barton Miller. Cyber Security Insights and Perspectives, FedScoop podcast, September 2015. http://fedscoop.com/tv-radio/fedscoop-cybersecurity-insights-and-perspective.

  • Von Welch. Trustworthy Computational Science: Lessons Learned and Next Steps. Presentation at 2015 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2015. http://www.vonwelch.com/pubs/NSF-Summit-Aug15 

  • Barton Miller. Why Johnny and Janie Can’t Code Safely: Bring Software Assurance to the Masses.  Invited talk at USENIX Security Conference, August 2015, Washington, D.C.

  • Randy Heiland. Authentication and Authorization Considerations for a Multi-tenant Service. Workshop on The Science of Cyberinfrastructure: Research, Experience, Applications and Models (SCREAM '15), Portland, OR, June 2015.

  • Randy Heiland. Analysis of authentication events and graphs using Python. Poster session at SIAM Workshop on Network Science, Snowbird, UT, May 2015.

  • Von Welch. Trustworthy Computational Science: A Multi-decade Perspective. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Trustworthy-Science-Apr15

  • Ann West, James Jokl, Susan Blair and Von Welch. InCommon Goes International: What Interfederation Could Mean to You. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Interfed-Apr15

  • Barton Miller (with Miron Livny). The Role of Academia in Software Assurance: A Briefing from Campus. Presentation to the U.S. Senate Homeland Security and Governmental Affairs Committee, March 2015, Washington, D.C.

  • Jim Basney, Von Welch. Resources for Secure Science: XSIM and CTSC. Presentation at 2015 OSG All Hands Meeting, March 2015.

  • Von Welch. Cybersecurity for Science. Presentation at Advancing Research Computing on Campuses: Best Practices Workshop, March 2015. http://www.vonwelch.com/pubs/CTSC-ARCC-Mar15

2014

2013

  • Craig Jackson, James Marsteller and Von Welch. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities. Presentation to NSF Large Facilities Security Group (FacSec), December 2013. http://www.vonwelch.com/pubs/CTSC-FacSec-Dec13

  • Von Welch. A view from the field of NSF cybersecurity challenges, goals, and opportunities. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities, October 2013. http://www.vonwelch.com/pubs/CTSC-Summit-Oct13