2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
Read the 2018 NSF Cybersecurity Summit Report
Closed: Call for Participation
View the Student Program
View the Training Descriptions
View the Collected Bios for Speakers, Authors, PC Members, Organizers, and Student Awardees
When: August 21 through August 23, 2018
General schedule:
August 21st: Half-day and full-day training workshops
August 22nd, 23rd: Keynote and plenary presentations
A more detailed schedule of events is available on the Final Program Agenda
Where: The Westin Alexandria, near NSF headquarters. Reservations can be made online by clicking here.
Who: Attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.
Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the process initiated in 2013, 2014, 2015, 2016, and 2017: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges.
The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships.
If you are interested in presenting at the Summit, please respond to the 2018 Call for Proposals when released. The Summit organizers welcome proposals from all individuals and agencies.
For more information, please contact us at: info@trustedci.
Slides
Training Slides
Industrial Control System Security - Existing Infrastructure and New Designs - Phil Salkie
Setting up a compliance program for CUI - Erik Deumens
Automated Assessment Tools – Theory & Practice - Bart Miller and Elisa Heymann
Developing Cybersecurity Programs for NSF Projects - Kay Avila, Bob Cowles, Craig Jackson
Compliance 101: HIPAA, FISMA, NIST 800-171 and GDPR - Susan Ramsey
Security Log Analysis Training - Mark Krenz
Plenary Slides
Welcome and NSF Address - Jim Marsteller and Amy Friedlander
Keynote - Von Welch
Involving Students in Cybersecurity for CI - Jeremy Straub
Security Best Practices for Academic Cloud Service Providers - Rion Dooley, Richard Knepper, Mike Lowe
Silent Librarian - Kim Milford, Brett Zupan
Incident Response Communications - Susan Ramsey, Ashwin Jacob Mathew, Dr. Daniel Massey
Password Adventures for a VO - Warren Anderson
A case study on implementing crowdsourced threat intel and active response - Charley Kneifel, Richard Biever
Evidence Based Cybersecurity - Grayson Harbour
Security and Assurance for Research Identities - Jim Basney, Laura Paglione, Steve Tuecke, Romain Wartel