Trusted CI Webinar Series

The Regulated Research Community of Practice facilitates a monthly webinar series on topics of interest to the community. Contact us if you’d like to request to present to Trusted CI-supported communities. Past Trusted CI webinar recordings are available below.

The podcast version of our webinar is available to Apple, Google, and other podcatchers.

2025

2024

2023

  • December ‘23: Enhancing Integrity and Confidentiality for Secure Distributed Data Sharing (Open Science Chain) with Subhashini Sivagnanam (NSF Award #2114202) (Video)(Slides)

  • September ‘23: Improving the Privacy and Security of Data for Wastewater-based Epidemiology with Ni Trieu (Video) (Slides) (NSF Award #2115075)

  • August ‘23: Leveraging Adaptive Framework for Open Source Data Access Solutions with Jeremy Grieshop (Video)(Slides)

  • July ‘23: The Technical Landscape of Ransomware: Threat Models and Defense Models with Barton Miller and Elisa Heymann (Video)(Slides)

  • June ‘23: SecureMyResearch with Will Drake, Tim Daniel, and Anurag Shankar (Video)(Slides)

  • May ’23: Deception Awareness and Resilience Training (DART) with Anita Nikolich (NSF Award #2230494) (Video)(Slides)

  • April ’23: Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS) with Derek Simmel and Alex Withers (NSF Award #2138296) (Video)(Slides)

  • March ‘23: Mutually Agreed Norms for Routing Security (MANRS) with Steven Wallace (Video)(Slides)

  • February ‘23: Security Program for the NIH’s Common Fund Data Ecosystem with Rick Wagner (Video)(Slides)

  • January ‘23: Real-Time Operating System and Network Security for Scientific Middleware with Gedare Bloom (NSF Award #2001789) (Video)(Slides)

2022

  • December ‘22: Science DMZ Engagement with University of Arkansas (Video)(Slides)

  • September ‘22: Lowering the Barrier to Entry for Regulated Research Through Community Building with Carolyn Ellis and Erik Deumens (Video)(Slides)

  • August ‘22: CIS Controls with Trusted CI (Video)(Slides)

  • June ‘22: Ransomware with REN-ISAC’s Sarah Bigham and Krysten Stevens (Video)(Slides)

  • April ’22: Updates from the Trusted CI Framework Cohort with Scott Russell (Video)(Slides)

  • February ‘22: The Results of the Trusted CI Annual Challenge on Software with Sean Peisert, Elisa Heymann, and Barton Miller (Video)(Slides)

  • January ‘22: EDUCAUSE HECVAT v3 and OSC engagement with Kyle Early and Charles Escue (Video)(Slides)

2021

  • December ‘21: Lessons from a Real-World Ransomware Attack on Research (Video)(Slides)

  • October ‘21: The Trusted CI Framework; Overview and Recent Developments with Scott Russell (Video)(Slides)

  • September ‘21: Q-Factor: Real-time data transfer optimization leveraging In-band Network provided by P4 data planes (Video)(Slides)

  • August ‘21: NCSA Experience with SOC2 in the Research Computing Space with Alex Withers (Video)(Slides)

  • July ’21: Open Science Grid with Brian Bockleman (Video)(Slides)

  • June ’21: Investigating Secure Development In Practice: A Human-Centered Perspective with Michelle Mazurek (Video)(Slides)

  • May ’21: Identifying Vulnerable GitHub Repositories with Sagar Samtani (Video)(Slides)

  • April ’21: Arizona State’s ScienceDMZ with Douglas Jennewein and Chris Kurtz (Video)(Slides)

  • March ’21: REED+ ecosystem with Carolyn Ellis, Jay Yang, and Preston Smith (Video)(Slides)

  • February ’21: The CARE Lab: Application, Research, and Education with Aunshul Rege (Video)(Slides)

  • January ’21: SciTokens with Jim Basney, Brian Bockelman, and Derek Weitzel (Video)(Slides)

2020

  • December ’20: Trustworthy Data panel (Video)(Slides)

  • October ’20: RDP: Enforcing Security and Privacy Policies to Protect Research Data with Yuan Tian (Video)(Slides)

  • October ’20: Cybersecurity Maturity Model Certification (CMMC) with Scott Russell (Video)(Slides)

  • September ’20: Trusted CI Webinar: ACCORD: Integrating CI policy and mechanism to support research on sensitive data; with Ron Hutchinson, Tho Nguyen, Neal Magee (Video)(Slides)

  • August ’20: Transitioning Cybersecurity Research to Practice - Success stories and tools you can use,” with Patrick Traynor, Florence Hudson, and Ryan Kiser (Video)(Slides)

  • July ’20: Whose line is it anyway? - Problem solving in complex networks with Doug Southworth (EPOC) (Video)(Slides)

  • June ’20: The ResearchSOC with Susan Sons (Video)(Slides)

  • May ’20: Is your code safe from attack? with Barton Miller and Elisa Heymann (Video)(Slides)

  • April ’20: Trustworthy Decision Making and Artificial Intelligence with Arjan Durresi (Video)(Slides)

  • March ’20: OnTimeURB: Multi-cloud Broker Framework for Creation of Secure and High-performance Science Gateways with Prasad Calyam (Video)(Slides)

  • February ’20: FABRIC: Adaptive programmaBle networked Research Infrastructure for Computer science with Anita Nikolich (Video)(Slides)

  • January ’20: REN-ISAC for Research Facilities & Projects with Kim Milford (Video)(Slides)

2019

  • December ’19: DDoS Defense in Depth for DNS: Project Overview and Early Results with John Heidemann and colleagues (Video)(Slides)

  • October ’19: Trends in Global Privacy: GDPR One Year Later with Scott Russell (Video)(Slides)

  • September ’19: Jupyter Security at LLNL with Thomas Mendoza (Video)(Slides)

  • August ’19: Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences with Anirban Mandal and Mats Rynge (Video)(Slides)

  • July ’19: Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Policy with Jason Waterman (Video)(Slides)

  • June ’19: The Trusted CI Framework: Toward Practical, Comprehensive Cybersecurity Programs with the Trusted CI team (Video)(Slides)

  • May ’19: Deployable Internet Routing Security with Amir Herzberg (Video)(Slides)

  • April ’19: REED+: A cybersecurity framework for research data at Purdue University with Preston Smith (Video)(Slides)

  • March ’19: The NSF CC-DNI SecureCloud Project: Autonomic Cybersecurity for Zero Trust Cloud Computing with Casimer DeCusatis (Video)(Slides)

  • February ’19: Anticipatory Cyber Defense via Predictive Analytics, Machine Learning and Simulation by Shanchieh (Jay) Yang (Video)(Slides)

  • January ’19: The Research Security Operations Center (ResearchSOC) with Von Welch and RSOC leadership team (Video)(Slides)

2018

  • December ’18: Best Practices for Academic Cloud Service Providers with Rion Dooley (Video)(Slides)

  • October ’18: Urgent Problems and (Mostly) Open Solutions with Jeff Spies (Video)(Slides)

  • September ’18: SCI Trust Framework with David Kelsey (Video)(Slides)

  • August ’18: NIST 800-171 Compliance Program at University of Connecticut with Jason Pufahl (Video)(Slides)

  • July ’18: Trustworthy Computing for Scientific Workflows with Mayank Varia and Andrei Lapets (Video)(Slides)

  • June ’18: Security Program at LSST with Alex Withers (Video)(Slides)

  • May ’18: General Data Protection Regulation (GDPR) with Scott Russell (Video)(Slides)

  • April ’18: Toward Security-Managed Virtual Science Networks with Jeff Chase and Paul Ruth (Video)(Slides)

  • March ’18: Data Quality & Security Evaluation Framework Dev. with Leon Reznik & Igor Khokhlov (Video)(Slides)

  • February ’18: SMARTDATA Blockchain with Murat Kantarcioglu (Video)(Slides)

2017

  • December ’17: CTSC's Services and Vision with Von Welch (Video)(Slides)

  • October ’17: Cybersecurity in an Open and Decentralized Network with Aashish Sharma (Video)(Slides)

  • September ’17: Demystifying Threat Intelligence with Romain Wartel (Video)(Slides)

  • August ’17: An overview of CTSC Engagements & Application Process with Von Welch (Video)(Slides)

  • August ’17: Stronger Security for Password Authentication with Stanislaw Jarecki (Video)(Slides)

  • July ’17: Inaugural Security Program at Internet2 by Paul Howell (Video)(Slides)

  • June ’17: Provenance Assurance Using Currency Primitives with Anthony Skjellum & Richard Brooks (Video)(Slides)

  • May ’17: Cybersecurity Research: Transition to Practice with Emily Nichols and Alec Yasinsac (Video)(Slides)

  • Apr. ’17: HIPAA and FISMA: Computing with Regulated Data with Susan Ramsey & Anurag Shankar (Video)(Slides)

  • Mar. ’17: SDN and IAM Integration at Duke by Richard Biever & Charley Kneifel(Video)(Slides)

  • Feb. ’17 Practical Cybersecurity for Open Science Proj. by Susan Sons, Craig Jackson, & Bob Cowles (Video)(Slides)

  • Jan. ’17: Open Science Cyber Risk Profile (OSCRP) by Von Welch & Sean Peisert (Video)(Slides)

2016

  • Dec. ’16: NSF CICI Regional Cybersecurity Collaboration Projects (Video)(Slides)

  • Oct. ’16: Science or Security by George Strawn (Video)(Slides)

  • Sep. ’16: Tragedy of the Commons by David Nalley (Video)(Slides)

  • Aug. ’16: The Science DMZ as a Security Architecture by Michael Sinatra, ESnet (Video)(Slides)

  • Jul. ’16: XSEDE Information Sharing with James Marsteller (Video)(Slides)

  • Jun. ’16: Risk Self-Evaluation with CTSC's Terry Fleury (Video)(Slides)

  • May 2016: CCoE Webinar Series Kickoff (Video)(Slides)