Trusted CI undertakes outreach activities both to disseminate its work and to make NSF CI projects aware of its services. Below is a listing of all presentations given by Trusted CI, by year:
- Warren Raquel led a pre-conference workshop, "Incident Response Training", at the EDUCAUSE Security Professionals conference, April 2018. [slides]
- Mark Krenz led a pre-conference workshop, "Security Log Analysis", at the EDUCAUSE Security Professionals conference, April 2018. [slides]
- Anurag Shankar, Jim Basney, and Von Welch presented "Cybersecurity for Research on Campus: Not Just HIPAA & FISMA" at the EDUCAUSE Security Professionals conference, April 2018. [slides]
- Von Welch and Mark Krenz presented “Cybersecurity for the Modern Science Gateway” at the Science Gateways Community Institute's webinar, February 2018. [webinar] [slides]
Von Welch presented a five-year retrospective of CTSC at ISI on October 30th: CTSC Five Years Later: Lessons Learned from Serving the NSF Community. Invited talk at USC/ISI, October 2017. [slides]
Von Welch presented an overview of CACR activities at SC17 that includes CTSC experiences: Cybersecurity and Science. Presentation at IU SC17 Booth, November 2017. [slides]
Jim Basney and Scott Koranda organized an IAM workshop co-located with AGU17 on December 10. [blog post]
Mark Krenz gave a presentation at BroCon 2017 on September 12th on the use of awk to analyze Bro logs to detect a variety of security incidents as well as generate useful statistics. Mark also announced a new open source software tool he wrote that allows Bro users to better interface with Bro logs using awk syntax. The software is called 'bawk' and is available at https://github.com/deltaray/bawk. A recording of the presentation can be viewed at https://www.youtube.com/watch?v=20QeFkwXgCE
Bob Cowles gave a presentation to the Silicon Valley chapter of ISACA using an updated version of the “Beyond the Beltway” talk previously given at the 2017 NSF Summit. About 30 people attended from various companies in Silicon Valley.
Von Welch. A Science DMZ in Every Pot?. National Research Platform Workshop, August 2017. [slides]
Von Welch, Craig Jackson, Bob Cowles, Susan Sons and Scott Russell. Cybersecurity for Science. PEARC/ARCC, July 2017. [slides]
Bart Miller and Elisa Heymann described how to apply their First Principles Vulnerability Assessment (FPVA) methodology to critical maritime shipping software infrastructure at the 2nd NATO Conference on Cyber Security in the Maritime Domain, held in July 2017 at the NATO Maritime Interdiction Operations Training Center on Crete.
Von Welch. Cybersecurity for Science. SPAN Meeting at South Carolina State University, May 2017. [slides]
Jim Marsteller. The NSF Cybersecurity Center of Excellence. Towards Security Assured Cyberinfrastructure in Pennsylvania (SAC-PA) CI Cybersecurity Workshop, June 22 & 23 2017, Wyndham Pittsburgh University Center. ￼￼
Jim Marsteller. Current and Future Large Facilities Impacts. NSF Large Facilities Workshop, May 3rd 2017 at LIGO Livingston & Baton Rouge. [slides]
Jim Basney. Center for Trustworthy Scientific Cyberinfrastructure (CTSC) and Software Assurance Marketplace (SWAMP). CASC Spring Meeting, March 2017. [slides]
Craig Jackson. The NSF Cybersecurity Center of Excellence. Great Plains Network ENCITE Webinar, February 2017. [slides]
Von Welch. Randy Heiland. CTSC Poster for NSF SI2 PI Meeting, February 2017. [poster]
James Marsteller. Von Welch. The NSF Cybersecurity Center of Excellence: Current and Future Large Facilities Impacts. NSF Large Facilities Security WG, February 2017. [slides]
Von Welch. Managing Scientific Collaboration using Identity Management and Access Control to Online Resources. AGU 2016 Fall Meeting, December 2016. https://dx.doi.org/10.6084/m9.figshare.4334795
Von Welch. Update on IdM for Research: What's new since SC15?. MAGIC Meeting co-located with SC16, November 2016.https://dx.doi.org/10.6084/m9.figshare.4282532
Von Welch. The NSF Cybersecurity Center of Excellence. Presentation at 2016 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2016. https://dx.doi.org/10.6084/m9.figshare.3792063.v1
Scott Russell, Craig Jackson, Robert Cowles, Cybersecurity Budgeting: A Survey of Benchmarking Research and Recommendations to Organizations, presented at and to be published in the report of the 2016 NSF Cybersecurity Summit, Arlington, VA, 17 Aug 2016. [slides]
Jim Basney, Craig Jackson, Jim Marsteller, Bart Miller and Von Welch. The NSF Cybersecurity Center of Excellence. CTSC Webinar Series, May 2016. http://hdl.handle.net/2022/20871
Von Welch. Cybersecurity to Enable Open Science. Keynote at First International Conference on the Internet, Cyber Security and Information Systems, Botswana, May 2016. https://dx.doi.org/10.6084/m9.figshare.3428201
Von Welch. The NSF Cybersecurity Center of Excellence: Cybersecurity for Science. Southern Partnership in Advanced Networking Workshop, March 2016. https://dx.doi.org/10.6084/m9.figshare.3118153
Jim Basney, Craig Jackson, Jim Marsteller and Von Welch. The NSF Cybersecurity Center of Excellence and Large Facility Cybersecurity. NSF FacSec Meeting, February 2016.
Bob Cowles. Recommendations on Cybersecurity Programmes in e-Science Projects. Presentation at 36th EUGridPMA Bratislava Meeting, January 2016. https://indico.nikhef.nl/getFile.py/access?contribId=14&resId=0&materialId=slides&confId=339
Barton Miller. Cyber Security Insights and Perspectives, FedScoop podcast, September 2015. http://fedscoop.com/tv-radio/fedscoop-cybersecurity-insights-and-perspective.
Von Welch. Trustworthy Computational Science: Lessons Learned and Next Steps. Presentation at 2015 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2015. http://www.vonwelch.com/pubs/NSF-Summit-Aug15
Barton Miller. Why Johnny and Janie Can’t Code Safely: Bring Software Assurance to the Masses. Invited talk at USENIX Security Conference, August 2015, Washington, D.C.
Randy Heiland. Authentication and Authorization Considerations for a Multi-tenant Service. Workshop on The Science of Cyberinfrastructure: Research, Experience, Applications and Models (SCREAM '15), Portland, OR, June 2015.
Randy Heiland. Analysis of authentication events and graphs using Python. Poster session at SIAM Workshop on Network Science, Snowbird, UT, May 2015.
Von Welch. Trustworthy Computational Science: A Multi-decade Perspective. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Trustworthy-Science-Apr15
Ann West, James Jokl, Susan Blair and Von Welch. InCommon Goes International: What Interfederation Could Mean to You. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Interfed-Apr15
Barton Miller (with Miron Livny). The Role of Academia in Software Assurance: A Briefing from Campus. Presentation to the U.S. Senate Homeland Security and Governmental Affairs Committee, March 2015, Washington, D.C.
Jim Basney, Von Welch. Resources for Secure Science: XSIM and CTSC. Presentation at 2015 OSG All Hands Meeting, March 2015.
Von Welch. Cybersecurity for Science. Presentation at Advancing Research Computing on Campuses: Best Practices Workshop, March 2015. http://www.vonwelch.com/pubs/CTSC-ARCC-Mar15
Barton Miller. Silver Bullet Podcast #98, hosted by Gary McGraw, 2014. http://www.cigital.com/silver-bullet/show-098/.
Scott Koranda attended the 2014 European Workshop on Trust and Identity (unconference style) in Vienna, Austria in December 2014, co-located with a REFEDs workshop, to present on the international SAML inter-federation needs for large science projects including LIGO.
Von Welch. Cybersecurity for Science. IU Booth Presentation at SC14, November 2014. http://www.vonwelch.com/pubs/CACR-SC14
Von Welch. Campus Identities for Research. Presentation at Internet2 Technology Exchange 2014, October 2014. http://www.vonwelch.com/pubs/TechX-Research-IdM-Oct14
Von Welch. Cybersecurity for Cyberinfrastructure and Science!. Presentation at 2014 HUBbub, September 2014. http://www.vonwelch.com/pubs/CTSC-HUBbub-Sep14
Von Welch. Cybersecurity for NSF Science: What does that Mean?. Presentation at 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2014. http://www.vonwelch.com/pubs/CTSC-Summit-Aug14
Von Welch. CTSC: Trustworthy Scientific Cyberinfrastructure. Presentation to NSF CC-NIE Workshop, April 2014. http://www.vonwelch.com/pubs/CTSC-CCNIE-Apr14
Scott Koranda. International SAML Federation Needs for LIGO. Presentation at REFEDs workshop held in conjunction with the 39th APAN meeting in Fukuoka, Japan. March, 2015. https://www-lk.apan.net/meetings/Fukuoka2015/Sessions/session.php?id=5.
Von Welch. CTSC: Service Model and Experiences. Presentation to NSF SI2 PI Meeting, February 2014. http://www.vonwelch.com/pubs/CTSC-SI2-Feb14
Scott Koranda. Federated Identity in Research: A US Perspective. Presentation at the seventh Federated Identity in Research (FIM4R) meeting held at CERN, Geneva, Switzerland, February 2014. https://indico.cern.ch/event/358127/contribution/3/attachments/713127/979040/FIM4RJanuary2015.pdf.
Von Welch. Scientific Data Security. Presentation to ASIS&T Bloomington Chapter, January 2014. http://www.vonwelch.com/pubs/ASIST-Jan14
Craig Jackson, James Marsteller and Von Welch. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities. Presentation to NSF Large Facilities Security Group (FacSec), December 2013. http://www.vonwelch.com/pubs/CTSC-FacSec-Dec13
Von Welch. A view from the field of NSF cybersecurity challenges, goals, and opportunities. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities, October 2013. http://www.vonwelch.com/pubs/CTSC-Summit-Oct13