2017 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
Read the 2017 NSF Cybersecurity Summit Report
Theme: Ensuring Data Provenance, Integrity and Resilience
View the Agenda (Updated August 11, 2017)
View the Training Descriptions
Registration is now Closed.
View the Call for Participation (now closed)
View the Student Program
View the Collected Bios for Speakers, Authors, PC Members, Organizers, and Student Awardees
When: August 15 through August 17, 2017
Where: The Westin Arlington Gateway near NSF headquarters. A group rate will be available for lodging until July 28, 2017. Hotel reservations may be made online.
Who: Attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.
Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the processes initiated in 2013, 2014, 2015 and 2016: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges.
The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships.
If you are interested in presenting at the Summit, please respond to the 2017 Call for Proposals when released. The Summit organizers welcome proposals from all individuals and agencies.
For more information, please contact us at: info@trustedci.org
Slides
Training Slides
Federated Identity Management for Research Organizations - Jim Basney, Scott Koranda
Security Log Analysis Training - Mark Krenz
Legacy Industrial Control Systems - Secure / Replace / Ignore? - Phil Salkie
Handling Regulated Government Data, Protected Health Information, and CUI - Anurag Shankar
Digital Forensics and Incident Response - Warren Raquel
Rebuilding a Plane in Flight: Refactors Under Pressure - Susan Sons
Developing Cybersecurity Programs for NSF Projects - Bob Cowles, Craig Jackson, Jim Marsteller
Automated Assessment Tools - Theory & Practice
Plenary Slides
Keynote #1: A Workflow-Centric Approach to Increasing Reproducibility and Data Integrity - Jeff Spies
CCoE Update - Von Welch
From Bare Metal to Virtual: Lessons Learned When A Supercomputing Institute Deploys Its First Cloud - Evan F. Bollig
Cornell Red Cloud: Campus-Based Hybrid Cloud Computing - Steven Lee
HTCondor - Todd Tannenbaum
Beyond the Beltway: The Problems with NIST’s Approaches to Cybersecurity and Alternatives for NSF Science - Craig Jackson, Bob Cowles, Scott Russell
Finding Your Way in the Dark: Security from First Principles - Susan Sons
Keynote #2: Data, Data Everywhere - How Shall We Live With It? - Marjory Blumenthal
The Applicability of HPC for Cyber Situational Awareness - Leslie Leonard
Internet2 NOC Risk Assessment - Paul Howell