Who we are
As the National Science Foundation Cybersecurity Center of Excellence, Trusted CI draws on expertise from multiple internationally recognized institutions, including Indiana University, the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center. Drawing on this expertise, Trusted CI collaborates with NSF-funded research organizations to focus on addressing the unique cybersecurity challenges faced by such entities. In addition to our leadership team, a world-class Trusted CI Advisory Committee adds its experience and a critical eye to the center's strategic decision-making.
VON WELCH serves as Director and PI of Trusted CI. He is the director of Indiana University’s Center for Applied Cybersecurity Research (CACR) and serves as an identity management expert in the Open Science Grid. Prior to his current role with CACR he served as co-director for NCSA’s Cybersecurity Directorate and TeraGrid’s area director for networking, operations, and security. E-mail.
DR. JIM BASNEY is a senior research scientist in the cybersecurity group at the National Center for Supercomputing Applications at the
University of Illinois at Urbana-Champaign. Jim's area of expertise is identity management for scientific collaborations. He is PI of the
CILogon and SciTokens projects and a co-PI of Trusted CI. Jim also contributes to the LIGO, LSST, and XSEDE projects. Jim received his PhD in computer sciences from the University of Wisconsin-Madison. E-mail.
CRAIG JACKSON is Program Director at the Indiana University Center for Applied Cybersecurity Research (CACR), where his research and development interests include information security program development and governance, cybersecurity assessment design and conduct, legal and regulatory regimes' impact on information security and cyber resilience, evidence-based security, and innovative defenses. He leads CACR’s collaborative work with the defense community and an interdisciplinary assessment and guidance team for the NSF Cybersecurity Center of Excellence. He is a co-author of Security from First Principles: A Practical Guide to the Information Security Practice Principles. Craig is a graduate of the IU Maurer School of Law, IU School of Education, and Washington University in St. Louis. In addition to his litigation experience, Craig’s research, design, project management, and psychology background includes work at the IU Center for Research on Learning and Technology and the Washington University in St. Louis School of Medicine. E-mail.
JAMES A. MARSTELLER , Jr. is the Pittsburgh Supercomputer Center Chief Information Security Officer. He has extensive security leadership experience with the TeraGrid and XSEDE security operations team. James also has served as the program chair for annual NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure since 2007. He has also served on the board of directors for the Pittsburgh chapter of the FBI Infragard program for many years. He holds a Master of Information Technology Management from Carnegie Mellon University and is a Certified Information Systems Security Professional. E-mail.
Prof. BARTON MILLER is a professor of computer science at the University of Wisconsin Madison. Prof. Miller founded the field of fuzz random testing, which is foundational to computer security and software testing. In addition, he founded (with his then-student Prof. Jeffrey Hollingsworth) the field of dynamic binary instrumentation, which is a widely used, critical technology for cyberforensics. Prof. Miller advises the Department of Defense on computer security issues though his position at the Institute for Defense Analysis and was on the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee and the US Secret Service Electronic Crimes Task Force (Chicago Area). He is currently an advisor to the Wisconsin Security Research Council. Prof. Miller is a fellow of the ACM. E-mail.
ANDREW K. ADAMS is a Senior Network Researcher at Pittsburgh Supercomputing Center (PSC). He holds M.S. degrees in both computer science and information science (U. Pittsburgh), and brings 20+ years of experience in computer networking research as a member of PSC’s Networking Group, including operational responsibilities in the 3ROX GigaPoP. Additionally, as a member of PSC’s Security Group, he has designed and developed multiple security oriented systems and performed assessments for PSC. Currently, his focus is in privacy and policy. E-mail
JOEL ATKINS is a Research Specialist with the University of Wisconsin Madison's Middleware Security and Testing project performing vulnerability assessments on large scale grid middleware platforms. In addition he is a Master's Student in the UW Department of Computer Sciences.
KAY AVILA is a Senior Security Engineer at the National Center for Supercomputing Applications. She joined Trusted CI and NCSA in 2017, following previous positions in network security at a Fortune 500 insurance company and in higher education. Formerly, as an undergraduate at the University of Northern Iowa, she was involved with supercomputing outreach through the SC Education Program and the LittleFe and Bootable Cluster CD (BCCD) projects. E-mail.
ROBERT (BOB) COWLES is principal in BrightLite Information Security performing cybersecurity assessments and consulting in research and education about information security and identity management. He served as CISO at SLAC National Accelerator Laboratory (1997-2012); participated in security policy development for LHC Computing Grid (2001-2008); and was an instructor at University of Hong Kong in information security (2000-2003).
JEANNETTE DOPHEIDE is a senior education outreach and training coordinator at NCSA. Her experience in education and outreach began as a high school teacher before moving onto business systems analysis and applications training for a commercial software company. Jeannette joined Trusted CI and NCSA in 2014 and works primarily on education outreach for projects that impact both Trusted CI and NCSA. Jeannette is a graduate of Illinois State University. E-mail.
TERRY FLEURY is a Senior Research Programmer at the National Center for Supercomputing Applications (NCSA). He has worked in the Cybersecurity Division since 2005 where he has assisted with development of several open-source security projects including MyProxy, CILogon, and SWAMP. In his work with Trusted CI, he has performed several engagements assisting NSF projects with risk assessments and cybersecurity program development. E-mail.
DR. ELISA HEYMANN is a Senior Scientist on the NSF Cybersecurity Center of Excellence at the University of Wisconsin, and an Associate Professor at the Autonomous University of Barcelona. She was in charge of the Grid/Cloud security group at the UAB, and participated in two major Grid European Projects: EGI‐InSPIRE and European Middleware Initiative (EMI). Heymann's research interests include security and resource management for Grid and Cloud environments. Her research is supported by the NSF, Spanish government, the European Commission, and NATO.
FLORENCE HUDSON is Special Advisor for TrustedCI, and Special Advisor for Next Generation Internet at the Northeast Big Data Innovation Hub at Columbia University. She serves on the Editorial Board for the journal "Blockchain in Healthcare Today", is Co-Founder of the IEEE-Industry Standards and Technology Organization "Blockchain in Healthcare Global", and serves on engineering advisory boards at Princeton University, Cal Poly San Luis Obispo, and Stony Brook University, as well as on a cybersecurity advisory board at Union County College. She was formerly an IBM Vice President and Chief Technology Officer, and Internet2 Senior Vice President and Chief Innovation Officer. Florence began her career at NASA JPL and Grumman Aerospace. She has a BSE in Mechanical and Aerospace Engineering from Princeton University, and attended Executive Education at Harvard Business School and Columbia University. E-mail.
RYAN KISER is a System Analyst at the Indiana University Center for Applied Cybersecurity (CACR) and Trusted CI. Ryan comes to CACR and Trusted CI from a system administration and small business consulting background. In addition to his role with Trusted CI, his current responsibilities include performing security assessments for public and private sector IT systems as well as risk assessment and regulated data efforts for Indiana University's central IT systems
MARK KRENZ is the Lead Security Analyst at Indiana University's Center for Applied Cybersecurity Research with over two decades of experience in information security and system administration spread across multiple sectors. His interests at CACR include policy development, operational security development, security auditing and security education. He studied Computer Science and Mathematics at Indiana University. E-mail.
SCOTT RUSSELL is a Senior Policy Analyst with CACR, where his work focuses on the improvement of federal cybersecurity standards. A lawyer and researcher, Scott specializes in privacy, cybersecurity, and international law, and his past research has included cybersecurity due diligence norms under international law, cybersecurity self-governance, international data jurisdiction, and constitutional issues on digital surveillance. He received his B.A. in Computer Science and History from the University of Virginia, received his J.D. from Indiana University, interned at MITRE, and served as a postdoctoral fellow at CACR.
JOHN ZAGE is a Research Programmer at the National Center for Supercomputing Applications. He joined NCSA in 2017 following his participation in Cybercorp's Scholarship for Service (SFS) program in the Information security graduate curriculum at Purdue University. Prior to his participation in SFS, John obtained a Master of Science Degree in Computer Science from Purdue focusing on computer security. His previous work experience includes working as a security researcher with MITRE Corporation and with the US Army Research Lab, and as a security analyst for Ontario Systems, a company specializing in managing receivable accounts.