Trusted CI Webinar Series

The purpose of the webinar series is to provide readily available cybersecurity services tailored to the NSF science community.

Webinars are presented live on the 4th Monday of the month (unless otherwise noted) at 11am Eastern time.

The webinars are recorded and will be linked to this page for later viewing. Each webinar includes time for questions from attendees. We use Zoom to conduct the webinars. Trusted CI Virtual Code of Conduct.

Upcoming topics are communicated on our blog. See our call for presentations to submit a request to present. For questions or feedback, email us at webinars@trustedci.org.

The podcast version of our webinar is available to Apple, Google, and other podcatchers.

2024 Season

  • November 18th: Privacy Preserving Aggregate Range Queries on Encrypted Multi-dimensional Databases (NSF Award #2232813) with Hoda Maleki

  • December 12th (Thursday): HazardMon (NSF Award #2319944) with Sudarsun Kannan and Ramakrishnan Durairajan

Contact us to request to present:

(Other series that may be of interest to our community):

The Bace Cybersecurity Institute

ESnet’s CI Engineering Lunch & Learn Series

The ResearchSOC’s Webinars and Trainings

The Washington Area Trustworthy Computing Hour (WATCH) seminar series

InCommon IAM Online Webinar Series

Software Engineering Institute (SEI) Webinar Series

Great Plains Network ENCITE Webinars

Best Practices for HPC Software Developers (IDEAS)

Regulated Research Community of Practice

Past Events

Recorded presentations are listed below. Videos are also available on our YouTube channel.

2024

2023

2022

  • December ‘22: Science DMZ Engagement with University of Arkansas (Video)(Slides)

  • September ‘22: Lowering the Barrier to Entry for Regulated Research Through Community Building with Carolyn Ellis and Erik Deumens (Video)(Slides)

  • August ‘22: CIS Controls with Trusted CI (Video)(Slides)

  • June ‘22: Ransomware with REN-ISAC’s Sarah Bigham and Krysten Stevens (Video)(Slides)

  • April ’22: Updates from the Trusted CI Framework Cohort with Scott Russell (Video)(Slides)

  • February ‘22: The Results of the Trusted CI Annual Challenge on Software with Sean Peisert, Elisa Heymann, and Barton Miller (Video)(Slides)

  • January ‘22: EDUCAUSE HECVAT v3 and OSC engagement with Kyle Early and Charles Escue (Video)(Slides)

2021

  • December ‘21: Lessons from a Real-World Ransomware Attack on Research (Video)(Slides)

  • October ‘21: The Trusted CI Framework; Overview and Recent Developments with Scott Russell (Video)(Slides)

  • September ‘21: Q-Factor: Real-time data transfer optimization leveraging In-band Network provided by P4 data planes (Video)(Slides)

  • August ‘21: NCSA Experience with SOC2 in the Research Computing Space with Alex Withers (Video)(Slides)

  • July ’21: Open Science Grid with Brian Bockleman (Video)(Slides)

  • June ’21: Investigating Secure Development In Practice: A Human-Centered Perspective with Michelle Mazurek (Video)(Slides)

  • May ’21: Identifying Vulnerable GitHub Repositories with Sagar Samtani (Video)(Slides)

  • April ’21: Arizona State’s ScienceDMZ with Douglas Jennewein and Chris Kurtz (Video)(Slides)

  • March ’21: REED+ ecosystem with Carolyn Ellis, Jay Yang, and Preston Smith (Video)(Slides)

  • February ’21: The CARE Lab: Application, Research, and Education with Aunshul Rege (Video)(Slides)

  • January ’21: SciTokens with Jim Basney, Brian Bockelman, and Derek Weitzel (Video)(Slides)

2020

  • December ’20: Trustworthy Data panel (Video)(Slides)

  • October ’20: RDP: Enforcing Security and Privacy Policies to Protect Research Data with Yuan Tian (Video)(Slides)

  • October ’20: Cybersecurity Maturity Model Certification (CMMC) with Scott Russell (Video)(Slides)

  • September ’20: Trusted CI Webinar: ACCORD: Integrating CI policy and mechanism to support research on sensitive data; with Ron Hutchinson, Tho Nguyen, Neal Magee (Video)(Slides)

  • August ’20: Transitioning Cybersecurity Research to Practice - Success stories and tools you can use,” with Patrick Traynor, Florence Hudson, and Ryan Kiser (Video)(Slides)

  • July ’20: Whose line is it anyway? - Problem solving in complex networks with Doug Southworth (EPOC) (Video)(Slides)

  • June ’20: The ResearchSOC with Susan Sons (Video)(Slides)

  • May ’20: Is your code safe from attack? with Barton Miller and Elisa Heymann (Video)(Slides)

  • April ’20: Trustworthy Decision Making and Artificial Intelligence with Arjan Durresi (Video)(Slides)

  • March ’20: OnTimeURB: Multi-cloud Broker Framework for Creation of Secure and High-performance Science Gateways with Prasad Calyam (Video)(Slides)

  • February ’20: FABRIC: Adaptive programmaBle networked Research Infrastructure for Computer science with Anita Nikolich (Video)(Slides)

  • January ’20: REN-ISAC for Research Facilities & Projects with Kim Milford (Video)(Slides)

2019

  • December ’19: DDoS Defense in Depth for DNS: Project Overview and Early Results with John Heidemann and colleagues (Video)(Slides)

  • October ’19: Trends in Global Privacy: GDPR One Year Later with Scott Russell (Video)(Slides)

  • September ’19: Jupyter Security at LLNL with Thomas Mendoza (Video)(Slides)

  • August ’19: Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences with Anirban Mandal and Mats Rynge (Video)(Slides)

  • July ’19: Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Policy with Jason Waterman (Video)(Slides)

  • June ’19: The Trusted CI Framework: Toward Practical, Comprehensive Cybersecurity Programs with the Trusted CI team (Video)(Slides)

  • May ’19: Deployable Internet Routing Security with Amir Herzberg (Video)(Slides)

  • April ’19: REED+: A cybersecurity framework for research data at Purdue University with Preston Smith (Video)(Slides)

  • March ’19: The NSF CC-DNI SecureCloud Project: Autonomic Cybersecurity for Zero Trust Cloud Computing with Casimer DeCusatis (Video)(Slides)

  • February ’19: Anticipatory Cyber Defense via Predictive Analytics, Machine Learning and Simulation by Shanchieh (Jay) Yang (Video)(Slides)

  • January ’19: The Research Security Operations Center (ResearchSOC) with Von Welch and RSOC leadership team (Video)(Slides)

2018

  • December ’18: Best Practices for Academic Cloud Service Providers with Rion Dooley (Video)(Slides)

  • October ’18: Urgent Problems and (Mostly) Open Solutions with Jeff Spies (Video)(Slides)

  • September ’18: SCI Trust Framework with David Kelsey (Video)(Slides)

  • August ’18: NIST 800-171 Compliance Program at University of Connecticut with Jason Pufahl (Video)(Slides)

  • July ’18: Trustworthy Computing for Scientific Workflows with Mayank Varia and Andrei Lapets (Video)(Slides)

  • June ’18: Security Program at LSST with Alex Withers (Video)(Slides)

  • May ’18: General Data Protection Regulation (GDPR) with Scott Russell (Video)(Slides)

  • April ’18: Toward Security-Managed Virtual Science Networks with Jeff Chase and Paul Ruth (Video)(Slides)

  • March ’18: Data Quality & Security Evaluation Framework Dev. with Leon Reznik & Igor Khokhlov (Video)(Slides)

  • February ’18: SMARTDATA Blockchain with Murat Kantarcioglu (Video)(Slides)

2017

  • December ’17: CTSC's Services and Vision with Von Welch (Video)(Slides)

  • October ’17: Cybersecurity in an Open and Decentralized Network with Aashish Sharma (Video)(Slides)

  • September ’17: Demystifying Threat Intelligence with Romain Wartel (Video)(Slides)

  • August ’17: An overview of CTSC Engagements & Application Process with Von Welch (Video)(Slides)

  • August ’17: Stronger Security for Password Authentication with Stanislaw Jarecki (Video)(Slides)

  • July ’17: Inaugural Security Program at Internet2 by Paul Howell (Video)(Slides)

  • June ’17: Provenance Assurance Using Currency Primitives with Anthony Skjellum & Richard Brooks (Video)(Slides)

  • May ’17: Cybersecurity Research: Transition to Practice with Emily Nichols and Alec Yasinsac (Video)(Slides)

  • Apr. ’17: HIPAA and FISMA: Computing with Regulated Data with Susan Ramsey & Anurag Shankar (Video)(Slides)

  • Mar. ’17: SDN and IAM Integration at Duke by Richard Biever & Charley Kneifel(Video)(Slides)

  • Feb. ’17 Practical Cybersecurity for Open Science Proj. by Susan Sons, Craig Jackson, & Bob Cowles (Video)(Slides)

  • Jan. ’17: Open Science Cyber Risk Profile (OSCRP) by Von Welch & Sean Peisert (Video)(Slides)

2016

  • Dec. ’16: NSF CICI Regional Cybersecurity Collaboration Projects (Video)(Slides)

  • Oct. ’16: Science or Security by George Strawn (Video)(Slides)

  • Sep. ’16: Tragedy of the Commons by David Nalley (Video)(Slides)

  • Aug. ’16: The Science DMZ as a Security Architecture by Michael Sinatra, ESnet (Video)(Slides)

  • Jul. ’16: XSEDE Information Sharing with James Marsteller (Video)(Slides)

  • Jun. ’16: Risk Self-Evaluation with CTSC's Terry Fleury (Video)(Slides)

  • May 2016: CCoE Webinar Series Kickoff (Video)(Slides)