Who we are

As the National Science Foundation Cybersecurity Center of Excellence, CTSC draws on expertise from multiple internationally recognized institutions, including Indiana University, the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center. Drawing on this expertise, CTSC collaborates with NSF-funded research organizations to focus on addressing the unique cybersecurity challenges faced by such entities. In addition to our leadership team, a world-class CTSC Advisory Committee adds its experience and a critical eye to the center's strategic decision-making.

VON WELCH serves as Director and PI of CTSC. He is the director of Indiana University’s Center for Applied Cybersecurity Research (CACR) and serves as an identity management expert in the Open Science Grid. Prior to his current role with CACR he served as co-director for NCSA’s Cybersecurity Directorate and TeraGrid’s area director for networking, operations, and security. E-mail.
DR. JIM BASNEY is an identity management expert and the principal investigator of CILogon. CILogon bridges the identity credentials generated by the nation’s universities, through the InCommon Federation, to certificates for authentication to NSF’s CI projects. Dr. Basney also leads MyProxy, which provides credential management software used in many large grid projects including the LHC Computing Grid and XSEDE, and is a member of the International Grid Trust Federation. E-mail.
CRAIG JACKSON is Chief Policy Analyst at Indiana University's Center for Applied Cybersecurity Research (CACR), where his research interests include evidence-based security, risk management, information security program development and governance, legal and regulatory regimes’ impact on information security, securing critical national security systems, and innovative defenses. He is a co-PI for the Center for Trustworthy Scientific Cyberinfrastructure (CTSC); is on the security team for the DHS-funded Software Assurance Marketplace (SWAMP); and part of the DOE-funded XSIM (Extreme Scale Identity Management) project. He leads CACR's Information Security Practice Principles project and work with the US Navy and DoD. He is a graduate of the IU Maurer School of Law (J.D.’10) and IU School of Education (M.S.’04). As a member of the Indiana bar, Mr. Jackson has represented government and corporate clients in constitutional and tort claims. His research, design, and project management background includes work at IU School of Education’s Center for Research on Learning and Technology and Washington University in St. Louis School of Medicine. He is a member of Phi Beta Kappa, and was a Lien Honorary Scholar at Washington University in St. Louis. E-mail.
JAMES MARSTELLER is the Pittsburgh Supercomputer Center security officer and leads systems and operations. He has extensive security leadership experience with the TeraGrid and XSEDE security operations team and is the XSEDE deputy security officer. E-mail.
Prof. BARTON MILLER is a professor of computer science at the University of Wisconsin Madison. Prof. Miller founded the field of fuzz random testing, which is foundational to computer security and software testing. In addition, he founded (with his then-student Prof. Jeffrey Hollingsworth) the field of dynamic binary instrumentation, which is a widely used, critical technology for cyberforensics. Prof. Miller advises the Department of Defense on computer security issues though his position at the Institute for Defense Analysis and was on the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee and the US Secret Service Electronic Crimes Task Force (Chicago Area). He is currently an advisor to the Wisconsin Security Research Council. Prof. Miller is a fellow of the ACM. E-mail.

ANDREW K. ADAMS is a Senior Network Researcher at Pittsburgh Supercomputing Center (PSC). He holds M.S. degrees in both computer science and information science (U. Pittsburgh), and brings 20+ years of experience in computer networking research as a member of PSC’s Networking Group, including operational responsibilities in the 3ROX GigaPoP. Additionally, as a member of PSC’s Security Group, he has designed and developed multiple security oriented systems and performed assessments for PSC. Currently, his focus is in privacy and policy. E-mail

KAY AVILA is a Senior Security Engineer at the National Center for Supercomputing Applications.  She joined CTSC and NCSA in 2017, following previous positions in network security at a Fortune 500 insurance company and in higher education.  Formerly, as an undergraduate at the University of Northern Iowa, she was involved with supercomputing outreach through the SC Education Program and the LittleFe and Bootable Cluster CD (BCCD) projects. E-mail.

ROBERT (BOB) COWLES is principal in BrightLite Information Security performing cybersecurity assessments and consulting in research and education about information security and identity management. He served as CISO at SLAC National Accelerator Laboratory (1997-2012); participated in security policy development for LHC Computing Grid (2001-2008); and was an instructor at University of Hong Kong in information security (2000-2003).
JEANNETTE DOPHEIDE is an education outreach coordinator at the NCSA. Her experience in education and outreach began as a high school teacher before moving onto business systems analysis and applications training for a commercial software company. Jeannette joined CTSC and NCSA in 2014 and works primarily on education outreach for projects that impact both CTSC and NCSA. Jeannette is a graduate of Illinois State University. E-mail.

TERRY FLEURY is a Senior Research Programmer at the National Center for Supercomputing Applications (NCSA). He has worked in the Cybersecurity Division since 2005 where he has assisted with development of several open-source security projects including MyProxy, CILogon, and SWAMP. In his work with CTSC, he has performed several engagements assisting NSF projects with risk assessments and cybersecurity program development. E-mail.

DR. ELISA HEYMANN is a Senior Scientist on the NSF Cybersecurity Center of Excellence at the University of Wisconsin, and an Associate Professor at the Autonomous University of Barcelona. She was in charge of the Grid/Cloud security group at the UAB, and participated in two major Grid European Projects: EGI‐InSPIRE and European Middleware Initiative (EMI). Heymann's research interests include security and resource management for Grid and Cloud environments. Her research is supported by the NSF, Spanish government, the European Commission, and NATO.

MARK KRENZ is the Lead Security Analyst at Indiana University's Center for Applied Cybersecurity Research with over two decades of experience in information security and system administration spread across multiple sectors. His interests at CACR include policy development, operational security development, security auditing and security education. He studied Computer Science and Mathematics at Indiana University. E-mail.

WARREN RAQUEL is a Senior Security Engineer at the National Center for Supercomputing Applications. His duties include security operations, incident response and security awareness for NCSA, Blue Waters and XSEDE. He has given talks and taught classes on Digital Forensics and Incident Response, two fields in which has specialized in for the last decade. E-mail.

SCOTT RUSSELL is a Senior Policy Analyst with CACR, where his work focuses on the improvement of federal cybersecurity standards. A lawyer and researcher, Scott specializes in privacy, cybersecurity, and international law, and his past research has included cybersecurity due diligence norms under international law, cybersecurity self-governance, international data jurisdiction, and constitutional issues on digital surveillance. He received his B.A. in Computer Science and History from the University of Virginia, received his J.D. from Indiana University, interned at MITRE, and served as a postdoctoral fellow at CACR.

JOHN ZAGE is a Research Programmer at the National Center for Supercomputing Applications.  He joined NCSA in 2017 following his participation in Cybercorp's Scholarship for Service (SFS) program in the Information security graduate curriculum at Purdue University.  Prior to his participation in SFS, John obtained a Master of Science Degree in Computer Science from Purdue focusing on computer security.  His previous work experience includes working as a security researcher with MITRE Corporation and with the US Army Research Lab, and as a security analyst for Ontario Systems, a company specializing in managing receivable accounts.