CTSC undertakes outreach activities both to disseminate its work and to make NSF CI projects aware of its services. Below is a listing of all presentations given by CTSC, by year:
Von Welch. Managing Scientific Collaboration using Identity Management and Access Control to Online Resources. AGU 2016 Fall Meeting, December 2016. https://dx.doi.org/10.6084/m9.figshare.4334795
Von Welch. Update on IdM for Research: What's new since SC15?. MAGIC Meeting co-located with SC16, November 2016.https://dx.doi.org/10.6084/m9.figshare.4282532
Von Welch. The NSF Cybersecurity Center of Excellence. Presentation at 2016 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2016. https://dx.doi.org/10.6084/m9.figshare.3792063.v1
Scott Russell, Craig Jackson, Robert Cowles, Cybersecurity Budgeting: A Survey of Benchmarking Research and Recommendations to Organizations, presented at and to be published in the report of the 2016 NSF Cybersecurity Summit, Arlington, VA, 17 Aug 2016. [slides]
Jim Basney, Craig Jackson, Jim Marsteller, Bart Miller and Von Welch. The NSF Cybersecurity Center of Excellence. CTSC Webinar Series, May 2016. http://hdl.handle.net/2022/20871
Von Welch. Cybersecurity to Enable Open Science. Keynote at First International Conference on the Internet, Cyber Security and Information Systems, Botswana, May 2016. https://dx.doi.org/10.6084/m9.figshare.3428201
Von Welch. The NSF Cybersecurity Center of Excellence: Cybersecurity for Science. Southern Partnership in Advanced Networking Workshop, March 2016. https://dx.doi.org/10.6084/m9.figshare.3118153
Jim Basney, Craig Jackson, Jim Marsteller and Von Welch. The NSF Cybersecurity Center of Excellence and Large Facility Cybersecurity. NSF FacSec Meeting, February 2016.
Bob Cowles. Recommendations on Cybersecurity Programmes in e-Science Projects. Presentation at 36th EUGridPMA Bratislava Meeting, January 2016. https://indico.nikhef.nl/getFile.py/access?contribId=14&resId=0&materialId=slides&confId=339
Barton Miller. Cyber Security Insights and Perspectives, FedScoop podcast, September 2015. http://fedscoop.com/tv-radio/fedscoop-cybersecurity-insights-and-perspective.
Von Welch. Trustworthy Computational Science: Lessons Learned and Next Steps. Presentation at 2015 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2015. http://www.vonwelch.com/pubs/NSF-Summit-Aug15
Barton Miller. Why Johnny and Janie Can’t Code Safely: Bring Software Assurance to the Masses. Invited talk at USENIX Security Conference, August 2015, Washington, D.C.
Randy Heiland. Authentication and Authorization Considerations for a Multi-tenant Service. Workshop on The Science of Cyberinfrastructure: Research, Experience, Applications and Models (SCREAM '15), Portland, OR, June 2015.
Randy Heiland. Analysis of authentication events and graphs using Python. Poster session at SIAM Workshop on Network Science, Snowbird, UT, May 2015.
Von Welch. Trustworthy Computational Science: A Multi-decade Perspective. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Trustworthy-Science-Apr15
Ann West, James Jokl, Susan Blair and Von Welch. InCommon Goes International: What Interfederation Could Mean to You. Presentation at Internet2 Global Summit, April 2015. http://www.vonwelch.com/pubs/I2GS-Interfed-Apr15
Barton Miller (with Miron Livny). The Role of Academia in Software Assurance: A Briefing from Campus. Presentation to the U.S. Senate Homeland Security and Governmental Affairs Committee, March 2015, Washington, D.C.
Jim Basney, Von Welch. Resources for Secure Science: XSIM and CTSC. Presentation at 2015 OSG All Hands Meeting, March 2015.
Von Welch. Cybersecurity for Science. Presentation at Advancing Research Computing on Campuses: Best Practices Workshop, March 2015. http://www.vonwelch.com/pubs/CTSC-ARCC-Mar15
Barton Miller. Silver Bullet Podcast #98, hosted by Gary McGraw, 2014. http://www.cigital.com/silver-bullet/show-098/.
Scott Koranda attended the 2014 European Workshop on Trust and Identity (unconference style) in Vienna, Austria in December 2014, co-located with a REFEDs workshop, to present on the international SAML inter-federation needs for large science projects including LIGO.
Von Welch. Cybersecurity for Science. IU Booth Presentation at SC14, November 2014. http://www.vonwelch.com/pubs/CACR-SC14
Von Welch. Campus Identities for Research. Presentation at Internet2 Technology Exchange 2014, October 2014. http://www.vonwelch.com/pubs/TechX-Research-IdM-Oct14
Von Welch. Cybersecurity for Cyberinfrastructure and Science!. Presentation at 2014 HUBbub, September 2014. http://www.vonwelch.com/pubs/CTSC-HUBbub-Sep14
Von Welch. Cybersecurity for NSF Science: What does that Mean?. Presentation at 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure, August 2014. http://www.vonwelch.com/pubs/CTSC-Summit-Aug14
Von Welch. CTSC: Trustworthy Scientific Cyberinfrastructure. Presentation to NSF CC-NIE Workshop, April 2014. http://www.vonwelch.com/pubs/CTSC-CCNIE-Apr14
Scott Koranda. International SAML Federation Needs for LIGO. Presentation at REFEDs workshop held in conjunction with the 39th APAN meeting in Fukuoka, Japan. March, 2015. https://www-lk.apan.net/meetings/Fukuoka2015/Sessions/session.php?id=5.
Von Welch. CTSC: Service Model and Experiences. Presentation to NSF SI2 PI Meeting, February 2014. http://www.vonwelch.com/pubs/CTSC-SI2-Feb14
Scott Koranda. Federated Identity in Research: A US Perspective. Presentation at the seventh Federated Identity in Research (FIM4R) meeting held at CERN, Geneva, Switzerland, February 2014. https://indico.cern.ch/event/358127/contribution/3/attachments/713127/979040/FIM4RJanuary2015.pdf.
Von Welch. Scientific Data Security. Presentation to ASIS&T Bloomington Chapter, January 2014. http://www.vonwelch.com/pubs/ASIST-Jan14
Craig Jackson, James Marsteller and Von Welch. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities. Presentation to NSF Large Facilities Security Group (FacSec), December 2013. http://www.vonwelch.com/pubs/CTSC-FacSec-Dec13
Von Welch. A view from the field of NSF cybersecurity challenges, goals, and opportunities. 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities, October 2013. http://www.vonwelch.com/pubs/CTSC-Summit-Oct13