Who we are

As the National Science Foundation Cybersecurity Center of Excellence, CTSC draws on expertise from multiple internationally recognized institutions, including Indiana University, the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center. Drawing on this expertise, CTSC collaborates with NSF-funded research organizations to focus on addressing the unique cybersecurity challenges faced by such entities. In addition to our leadership team, a world-class CTSC Advisory Committee adds its experience and a critical eye to the center's strategic decision-making.

VON WELCH serves as Director and PI of CTSC. He is the director of Indiana University’s Center for Applied Cybersecurity Research (CACR) and serves as an identity management expert in the Open Science Grid. Prior to his current role with CACR he served as co-director for NCSA’s Cybersecurity Directorate and TeraGrid’s area director for networking, operations, and security. E-mail.
DR. JIM BASNEY is an identity management expert and the principal investigator of CILogon. CILogon bridges the identity credentials generated by the nation’s universities, through the InCommon Federation, to certificates for authentication to NSF’s CI projects. Dr. Basney also leads MyProxy, which provides credential management software used in many large grid projects including the LHC Computing Grid and XSEDE, and is a member of the International Grid Trust Federation. E-mail.
CRAIG JACKSON is Chief Policy Analyst at Indiana University's Center for Applied Cybersecurity Research (CACR), where his research interests include evidence-based security, risk management, information security program development and governance, legal and regulatory regimes’ impact on information security, securing critical national security systems, and innovative defenses. He is a co-PI for the Center for Trustworthy Scientific Cyberinfrastructure (CTSC); is on the security team for the DHS-funded Software Assurance Marketplace (SWAMP); and part of the DOE-funded XSIM (Extreme Scale Identity Management) project. He leads CACR's Information Security Practice Principles project and work with the US Navy and DoD. He is a graduate of the IU Maurer School of Law (J.D.’10) and IU School of Education (M.S.’04). As a member of the Indiana bar, Mr. Jackson has represented government and corporate clients in constitutional and tort claims. His research, design, and project management background includes work at IU School of Education’s Center for Research on Learning and Technology and Washington University in St. Louis School of Medicine. He is a member of Phi Beta Kappa, and was a Lien Honorary Scholar at Washington University in St. Louis. E-mail.
DR. SCOTT KORANDA is a Senior Scientist in the Physics Department at the University of Wisconsin-Milwaukee. In that role he is the lead architect for the LIGO Identity Management Project and a senior architect for the LIGO Data Grid. Dr. Koranda is also a founding manager of the Spherical Cow Group, a small consulting group focused on identity management for higher education, research, and virtual organizations. E-mail.
JAMES MARSTELLER is the Pittsburgh Supercomputer Center security officer and leads systems and operations. He has extensive security leadership experience with the TeraGrid and XSEDE security operations team and is the XSEDE deputy security officer. E-mail.
Prof. BARTON MILLER is a professor of computer science at the University of Wisconsin Madison. Prof. Miller founded the field of fuzz random testing, which is foundational to computer security and software testing. In addition, he founded (with his then-student Prof. Jeffrey Hollingsworth) the field of dynamic binary instrumentation, which is a widely used, critical technology for cyberforensics. Prof. Miller advises the Department of Defense on computer security issues though his position at the Institute for Defense Analysis and was on the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee and the US Secret Service Electronic Crimes Task Force (Chicago Area). He is currently an advisor to the Wisconsin Security Research Council. Prof. Miller is a fellow of the ACM. E-mail.

ANDREW K. ADAMS is a Senior Network Researcher at Pittsburgh Supercomputing Center (PSC). He holds M.S. degrees in both computer science and information science (U. Pittsburgh), and brings 20+ years of experience in computer networking research as a member of PSC’s Networking Group, including operational responsibilities in the 3ROX GigaPoP. Additionally, as a member of PSC’s Security Group, he has designed and developed multiple security oriented systems and performed assessments for PSC. Currently, his focus is in privacy and policy. E-mail

KAY AVILA is a Senior Security Engineer at the National Center for Supercomputing Applications.  She joined CTSC and NCSA in 2017, following previous positions in network security at a Fortune 500 insurance company and in higher education.  Formerly, as an undergraduate at the University of Northern Iowa, she was involved with supercomputing outreach through the SC Education Program and the LittleFe and Bootable Cluster CD (BCCD) projects. E-mail.

ROBERT (BOB) COWLES is principal in BrightLite Information Security performing cybersecurity assessments and consulting in research and education about information security and identity management. He served as CISO at SLAC National Accelerator Laboratory (1997-2012); participated in security policy development for LHC Computing Grid (2001-2008); and was an instructor at University of Hong Kong in information security (2000-2003).
JEANNETTE DOPHEIDE is an education outreach coordinator at the NCSA. Her experience in education and outreach began as a high school teacher before moving onto business systems analysis and applications training for a commercial software company. Jeannette joined CTSC and NCSA in 2014 and works primarily on education outreach for projects that impact both CTSC and NCSA. Jeannette is a graduate of Illinois State University. E-mail.

TERRY FLEURY is a Senior Research Programmer at the National Center for Supercomputing Applications (NCSA). He has worked in the Cybersecurity Division since 2005 where he has assisted with development of several open-source security projects including MyProxy, CILogon, and SWAMP. In his work with CTSC, he has performed several engagements assisting NSF projects with risk assessments and cybersecurity program development. E-mail.

RANDY HEILAND is a Senior Systems Analyst / Programmer at Indiana University’s Center for Applied Cybersecurity Research. He is a computer scientist (M.S., U. Utah) and applied mathematician (M.A., Arizona State U.) who has worked in industry, government labs, and academia. In 2003, he joined IU's Pervasive Technology Labs (now the Pervasive Technology Institute) as an Associate Director of the Scientific Data Analysis Lab at IUPUI. While at IU, he has contributed to projects at the Medical School, UITS Research Technologies, and grant-funded (NSF and NIH) software development projects that included Purdue's Dept. of Chemistry, IU's Dept. of Physics, and IU's School of Informatics and Computing. E-mail.
MARK KRENZ is the Lead Security Analyst at Indiana University's Center for Applied Cybersecurity Research with over two decades of experience in information security and system administration spread across multiple sectors. His interests at CACR include policy development, operational security development, security auditing and security education. He studied Computer Science and Mathematics at Indiana University. E-mail.

WARREN RAQUEL is a Senior Security Engineer at the National Center for Supercomputing Applications. His duties include security operations, incident response and security awareness for NCSA, Blue Waters and XSEDE. He has given talks and taught classes on Digital Forensics and Incident Response, two fields in which has specialized in for the last decade. E-mail.


AMY STARZYNSKI CODDENS serves as the Education, Outreach and Training Manager at Indiana University’s Center for Applied Cybersecurity Research (CACR). She is a graduate of the IU School of Education (M.S. ’06 & M.S. ’09). Amy comes to the CACR and CTSC from a background in P-16 education and outreach. She has worked for the government, in industry and in academia, contributing to projects with the New England Research Institute, Harvard’s PEAR Institute, the United States Department of Education’s Office of Special Education Programs, and the IU Kelley School of Business.