Who we are
As the National Science Foundation Cybersecurity Center of Excellence, CTSC draws on expertise from multiple internationally recognized institutions, including Indiana University, the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center. Drawing on this expertise, CTSC collaborates with NSF-funded research organizations to focus on addressing the unique cybersecurity challenges faced by such entities. In addition to our leadership team, a world-class CTSC Advisory Committee adds its experience and a critical eye to the center's strategic decision-making.
|VON WELCH serves as Director and PI of CTSC. He is the director of Indiana University’s Center for Applied Cybersecurity Research (CACR) and serves as an identity management expert in the Open Science Grid. Prior to his current role with CACR he served as co-director for NCSA’s Cybersecurity Directorate and TeraGrid’s area director for networking, operations, and security. E-mail.|
|DR. JIM BASNEY is an identity management expert and the principal investigator of CILogon. CILogon bridges the identity credentials generated by the nation’s universities, through the InCommon Federation, to certificates for authentication to NSF’s CI projects. Dr. Basney also leads MyProxy, which provides credential management software used in many large grid projects including the LHC Computing Grid and XSEDE, and is a member of the International Grid Trust Federation. E-mail.|
|CRAIG JACKSON is Chief Policy Analyst at Indiana University's Center for Applied Cybersecurity Research (CACR), where his research interests include evidence-based security, risk management, information security program development and governance, legal and regulatory regimes’ impact on information security, securing critical national security systems, and innovative defenses. He is a co-PI for the Center for Trustworthy Scientific Cyberinfrastructure (CTSC); is on the security team for the DHS-funded Software Assurance Marketplace (SWAMP); and part of the DOE-funded XSIM (Extreme Scale Identity Management) project. He leads CACR's Information Security Practice Principles project and work with the US Navy and DoD. He is a graduate of the IU Maurer School of Law (J.D.’10) and IU School of Education (M.S.’04). As a member of the Indiana bar, Mr. Jackson has represented government and corporate clients in constitutional and tort claims. His research, design, and project management background includes work at IU School of Education’s Center for Research on Learning and Technology and Washington University in St. Louis School of Medicine. He is a member of Phi Beta Kappa, and was a Lien Honorary Scholar at Washington University in St. Louis. E-mail.|
|DR. SCOTT KORANDA is a Senior Scientist in the Physics Department at the University of Wisconsin-Milwaukee. In that role he is the lead architect for the LIGO Identity Management Project and a senior architect for the LIGO Data Grid. Dr. Koranda is also a founding manager of the Spherical Cow Group, a small consulting group focused on identity management for higher education, research, and virtual organizations. E-mail.|
|JAMES MARSTELLER is the Pittsburgh Supercomputer Center security officer and leads systems and operations. He has extensive security leadership experience with the TeraGrid and XSEDE security operations team and is the XSEDE deputy security officer. E-mail.
|Prof. BARTON MILLER is a professor of computer science at the University of Wisconsin Madison. Prof. Miller founded the field of fuzz random testing, which is foundational to computer security and software testing. In addition, he founded (with his then-student Prof. Jeffrey Hollingsworth) the field of dynamic binary instrumentation, which is a widely used, critical technology for cyberforensics. Prof. Miller advises the Department of Defense on computer security issues though his position at the Institute for Defense Analysis and was on the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee and the US Secret Service Electronic Crimes Task Force (Chicago Area). He is currently an advisor to the Wisconsin Security Research Council. Prof. Miller is a fellow of the ACM. E-mail.|
KAY AVILA is a Senior Security Engineer at the National Center for Supercomputing Applications. She joined CTSC and NCSA in 2017, following previous positions in network security at a Fortune 500 insurance company and in higher education. Formerly, as an undergraduate at the University of Northern Iowa, she was involved with supercomputing outreach through the SC Education Program and the LittleFe and Bootable Cluster CD (BCCD) projects. E-mail.
TERRY FLEURY is a Senior Research Programmer at the National Center for Supercomputing Applications (NCSA). He has worked in the Cybersecurity Division since 2005 where he has assisted with development of several open-source security projects including MyProxy, CILogon, and SWAMP. In his work with CTSC, he has performed several engagements assisting NSF projects with risk assessments and cybersecurity program development. E-mail.
DR. ELISA HEYMANN is a Senior Scientist on the NSF Cybersecurity Center of Excellence at the University of Wisconsin, and an Associate Professor at the Autonomous University of Barcelona. She was in charge of the Grid/Cloud security group at the UAB, and participated in two major Grid European Projects: EGI‐InSPIRE and European Middleware Initiative (EMI). Heymann's research interests include security and resource management for Grid and Cloud environments. Her research is supported by the NSF, Spanish government, the European Commission, and NATO.
WARREN RAQUEL is a Senior Security Engineer at the National Center for Supercomputing Applications. His duties include security operations, incident response and security awareness for NCSA, Blue Waters and XSEDE. He has given talks and taught classes on Digital Forensics and Incident Response, two fields in which has specialized in for the last decade. E-mail.
JOHN ZAGE is a Research Programmer at the National Center for Supercomputing Applications. He joined NCSA in 2017 following his participation in Cybercorp's Scholarship for Service (SFS) program in the Information security graduate curriculum at Purdue University. Prior to his participation in SFS, John obtained a Master of Science Degree in Computer Science from Purdue focusing on computer security. His previous work experience includes working as a security researcher with MITRE Corporation and with the US Army Research Lab, and as a security analyst for Ontario Systems, a company specializing in managing receivable accounts.