<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7077496605849243532</id><updated>2026-04-16T12:28:10.887-04:00</updated><category term="webinar"/><category term="engagements"/><category term="NSF Summit"/><category term="events"/><category term="Trusted CI"/><category term="framework"/><category term="iam"/><category term="major facilities"/><category term="vulnerabilities"/><category term="cybersecurity programs"/><category term="software assurance"/><category term="compliance"/><category term="situational-awareness"/><category term="Fellows"/><category term="large facilities"/><category term="trustworthy data"/><category term="TTP"/><category term="project-news"/><category term="reports"/><category term="science gateways"/><category term="annual challenge"/><category term="success story"/><category term="CyberCheckup"/><category term="PEARC"/><category term="operational technology"/><category term="presentations"/><category term="students"/><category term="Internet2"/><category term="oscrp"/><category term="CUI"/><category term="ransomware"/><category term="ARF"/><category term="Cybersecurity"/><category term="Survey"/><category term="engagement-cfp"/><category term="identity federation"/><category term="incident response"/><category term="secure coding"/><category term="solicitations"/><category term="COVID-19"/><category term="ESnet"/><category term="Ocean Sciences"/><category term="USAP"/><category term="cybertraining"/><category term="CMMC"/><category term="Cloud-computing"/><category term="HPC"/><category term="NSF-cybersecurity-guide"/><category term="ResearchSOC"/><category term="authentication"/><category term="cyber-physical systems"/><category term="data assurance"/><category term="open source software"/><category term="FABRIC"/><category term="Jupyter"/><category term="NSF"/><category term="OSG"/><category term="cyberinfrastructure"/><category term="incommon"/><category term="news"/><category term="openssl"/><category term="software sustainability"/><category term="tutorial"/><category term="working group"/><category term="BD Hubs"/><category term="CERN"/><category term="DKIST"/><category term="advisory committee"/><category term="benchmarking"/><category term="blockchain"/><category term="cici"/><category term="idm"/><category term="jobs"/><category term="network"/><category term="CPP"/><category term="IceCube"/><category term="LSST"/><category term="NCSA"/><category term="NOIRLab"/><category term="Pegasus"/><category term="REED+"/><category term="Science DMZs"/><category term="Trusted CI Vision"/><category term="UC Berkeley"/><category term="controls"/><category term="educause"/><category term="epoc"/><category term="higher ed"/><category term="law and policy"/><category term="office hours"/><category term="ren-isac"/><category term="research computing"/><category term="research infrastructure guide"/><category term="research security"/><category term="video conferencing"/><category term="xsede"/><category term="AMNH"/><category term="AoT"/><category term="EDI"/><category term="GenApp"/><category term="Globus"/><category term="NEON"/><category term="NRAO"/><category term="OSiRIS"/><category term="RISC"/><category term="Research Infrastructure Security Community"/><category term="SLATE"/><category term="Skim Reaper"/><category term="TransPac"/><category term="UNH-RCC"/><category term="ask@trustedci.org"/><category term="cohort"/><category term="mid-scales"/><category term="racial inequities"/><category term="risk"/><category term="science"/><category term="secure AI"/><category term="AI"/><category term="Bart Miller"/><category term="Cybertrack"/><category term="FPVA"/><category term="First Principles Vulnerability Assessment"/><category term="JASON"/><category term="LLM"/><category term="NSF RIW"/><category term="NSMP-33"/><category term="RRCoP"/><category term="SPHERE"/><category term="Tapis"/><category term="Texas Advanced Computing Center"/><category term="USC-ISI"/><category term="White House fact sheet"/><category term="academic research"/><category term="access"/><category term="agentic AI"/><category term="assessment"/><category term="cpe"/><category term="earthscope"/><category term="governance"/><category term="machine learning"/><category term="procurement"/><category term="residency"/><category term="security framework"/><category term="site visit"/><category term="testbed"/><category term="zeek"/><title type='text'>Trusted CI Blog</title><subtitle type='html'>Blog for &lt;a href=&quot;https://www.trustedci.org/&quot;&gt;Trusted CI&lt;/a&gt;.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://blog.trustedci.org/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default?start-index=26&amp;max-results=25'/><author><name>Mark Krenz</name><uri>http://www.blogger.com/profile/13524023996157340111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFgpL8-aPlYcvo0nCuYI7izRHLdXmdo8NEfderwwQh7iCAqZ-0PjoxH97d1wjiifonuqLajf2vw8kyqCz_khzlxURkTBMPFDBy5nL_bxQlTK8WIXoUduW6Cds80XoY/s220/mark-museum-of-the-north.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>548</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-3602705473096721293</id><published>2026-04-10T13:53:00.004-04:00</published><updated>2026-04-16T12:28:10.766-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'> Now Open - 2026 NSF Cybersecurity Summit Call for Proposals</title><content type='html'>&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyY9amwUIn5k_MSwOsBFhncIhNxog0_K0AGIVtyl14K3Kys_slbSulTeaqB9jyuo4UFZ1I0k-OUaNqZ7BSgABm86pGvRQeVrP3GMRHd3NwZMM5faSSarr4EuH8caBmuM_r7m1JA0EapWhuxAyotdqRmOes690LNf1-v36sa4PfkhCTv_j4WboaFALgrizY/s1778/mockup%20a%20(1).png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;1778&quot; height=&quot;158&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyY9amwUIn5k_MSwOsBFhncIhNxog0_K0AGIVtyl14K3Kys_slbSulTeaqB9jyuo4UFZ1I0k-OUaNqZ7BSgABm86pGvRQeVrP3GMRHd3NwZMM5faSSarr4EuH8caBmuM_r7m1JA0EapWhuxAyotdqRmOes690LNf1-v36sa4PfkhCTv_j4WboaFALgrizY/w562-h158/mockup%20a%20(1).png&quot; width=&quot;562&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;It is our pleasure to announce that the 2026 NSF Cybersecurity Summit
 (Oct 27-29, Irvine)&amp;nbsp;Call for Proposals is now open! The Summit 
Program Committee seeks proposals for:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Plenary presentations and Panel talks&lt;/li&gt;&lt;li&gt;Workshops and&amp;nbsp;Trainings&lt;/li&gt;&lt;li&gt;Birds of a Feather (BoFs) and&amp;nbsp;Project-specific meetings&lt;/li&gt;&lt;li&gt;Poster session&lt;/li&gt;&lt;li&gt;TLP:AMBER or RED talks&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;We welcome your proposals relevant to a broad range of topics related to the operational cybersecurity of NSF cyberinfrastructure and programs. We encourage proposals that address topics impacting the NSF CI Community. These include, but are not limited to:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Cybersecurity aspects of Research Security (Ex: &lt;a href=&quot;https://nsf-gov-resources.nsf.gov/files/nsf25200.pdf?VersionId=EEypEgYqQVtlrcxy8A8Rf_Bwm2O5_Wgt&quot;&gt;The 14 NSF Critical Controls&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;Security of AI use in research environments&lt;/li&gt;&lt;li&gt;Procurement, commercial tools, impacts on Controls, leverage in cybersecurity operations, etc.&lt;/li&gt;&lt;li&gt;Regulatory compliance&lt;/li&gt;&lt;li&gt;Securing cloud-based technologies&lt;/li&gt;&lt;li&gt;Network security and defense&lt;/li&gt;&lt;li&gt;HPC security&lt;/li&gt;&lt;li&gt;Digital forensics and incident response&lt;/li&gt;&lt;li&gt;Case studies and lessons learned&lt;/li&gt;&lt;li&gt;Zero-trust architecture implementation&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;More detail and guidance on submitting proposals can be found here:&lt;br /&gt;&lt;a href=&quot;https://www.trustedci.org/2026-cfp&quot;&gt;https://www.trustedci.org/2026-cfp&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The deadline for plenary, workshop, training, BoF, and project meeting submissions is &lt;b&gt;Tuesday, June 30th&lt;/b&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Poster and TLP:AMBER or RED submissions are due Monday, October 5th.&lt;/p&gt;&lt;p&gt;Thank
 you on behalf of the Program and Organizing Committees. We look forward
 to receiving your proposals and hope to see you in October in Irvine!&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3602705473096721293'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3602705473096721293'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/04/2026-Summit-CFP.html' title=' Now Open - 2026 NSF Cybersecurity Summit Call for Proposals'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyY9amwUIn5k_MSwOsBFhncIhNxog0_K0AGIVtyl14K3Kys_slbSulTeaqB9jyuo4UFZ1I0k-OUaNqZ7BSgABm86pGvRQeVrP3GMRHd3NwZMM5faSSarr4EuH8caBmuM_r7m1JA0EapWhuxAyotdqRmOes690LNf1-v36sa4PfkhCTv_j4WboaFALgrizY/s72-w562-h158-c/mockup%20a%20(1).png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7268143354454715499</id><published>2026-03-27T13:53:00.002-04:00</published><updated>2026-03-31T15:09:30.680-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="agentic AI"/><category scheme="http://www.blogger.com/atom/ns#" term="governance"/><category scheme="http://www.blogger.com/atom/ns#" term="LLM"/><category scheme="http://www.blogger.com/atom/ns#" term="machine learning"/><category scheme="http://www.blogger.com/atom/ns#" term="secure AI"/><category scheme="http://www.blogger.com/atom/ns#" term="security framework"/><title type='text'>Navigating AI Governance And Security Frameworks: Quick Practical Considerations for Research Institutions</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;Article by Dhwanit Pandya&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Executive Summary&lt;/h2&gt;&lt;p&gt;Artificial intelligence is rapidly becoming embedded in research workflows, from data analysis and scientific modeling to autonomous agents and large language models (LLMs). A 2025 study indicates that &lt;a href=&quot;https://newsroom.wiley.com/press-releases/press-release-details/2025/AI-Adoption-Jumps-to-84-Among-Researchers-as-Expectations-Undergo-Significant-Reality-Check/default.aspx&quot; target=&quot;_blank&quot;&gt;AI adoption among researchers has surged to 84% globally&lt;/a&gt;, reflecting how quickly the technology is transforming research practices. At the same time, Microsoft asserts that&lt;a href=&quot;https://www.microsoft.com/en-us/corporate-responsibility/topics/ai-economy-institute/reports/global-ai-adoption-2025/&quot; target=&quot;_blank&quot;&gt; generative AI is now used by roughly one in six people worldwide&lt;/a&gt;, while Stanford&#39;s &lt;a href=&quot;https://hai.stanford.edu/news/ai-index-2025-state-of-ai-in-10-charts&quot; target=&quot;_blank&quot;&gt;AI Index 2025&lt;/a&gt; notes a growing increase in organizational stakeholders reporting AI use. These reports highlight the speed at which AI capabilities are diffusing across industries and institutions. As AI adoption accelerates, research organizations increasingly need structured governance and security frameworks to manage emerging risks and ensure responsible deployment of AI systems. This theme also surfaced during the AI, Security, and Research Cyberinfrastructure panel at the &lt;a href=&quot;https://www.trustedci.org/2025-nsf-cybersecurity-summit&quot; target=&quot;_blank&quot;&gt;Trusted CI NSF Cybersecurity Summit&lt;/a&gt; in October 2025.&lt;/p&gt;&lt;p&gt;This blog post examines key governance and industry frameworks on AI and explains how research institutions can use them to build a practical approach for secure use of AI in their research environments. In addition to these frameworks, supporting resources such as &lt;a href=&quot;https://atlas.mitre.org/&quot; target=&quot;_blank&quot;&gt;MITRE&lt;/a&gt; and &lt;a href=&quot;https://genai.owasp.org/&quot; target=&quot;_blank&quot;&gt;OWASP&lt;/a&gt; guidance provide structured insights into adversarial techniques and emerging AI security risks.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Why Industry AI Governance and Security Frameworks Matter in Research Environments&lt;/h2&gt;&lt;p&gt;Artificial intelligence is evolving rapidly. National initiatives such as the The White House &lt;a href=&quot;https://genesis.energy.gov/&quot; target=&quot;_blank&quot;&gt;Genesis Mission&lt;/a&gt;, policy guidance like &lt;a href=&quot;https://www.whitehouse.gov/wp-content/uploads/2025/02/M-25-21-Accelerating-Federal-Use-of-AI-through-Innovation-Governance-and-Public-Trust.pdf&quot; target=&quot;_blank&quot;&gt;OMB Memo M-25-21&lt;/a&gt;, and the &lt;a href=&quot;https://nsf-gov-resources.nsf.gov/files/nsf-ai-strategy.pdf?VersionId=14HwLUg_0sDX0LSz9fVp8flT7kK0s7lV&quot; target=&quot;_blank&quot;&gt;National Science Foundation’s AI Strategy Plan&lt;/a&gt; signal a widespread push to integrate AI across research and scientific infrastructure. As these efforts accelerate, research facilities and cyberinfrastructure teams will need to consider how AI adoption may impact their cybersecurity programs.&lt;br /&gt;&lt;br /&gt;In many research environments, AI capabilities may be adopted faster than industry frameworks can evolve to address them. Rather than waiting for a perfect framework, there is value in understanding the existing governance and security frameworks and evaluating how they can be applied to support the responsible and secure use of AI in research environments.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Current Use of AI&lt;/h3&gt;&lt;p&gt;Across research institutions, AI systems are increasingly being used for tasks such as large-scale data analysis, scientific modeling, literature review, and hypothesis generation. These tools help researchers in fields like climate science, biomedical research, and materials science, extract insights from complex datasets, and accelerate discovery. As generative AI and machine learning capabilities mature, they are becoming integrated into everyday research workflows across universities, laboratories, and shared cyberinfrastructure environments.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Challenges&lt;/h3&gt;&lt;p&gt;While AI is accelerating many aspects of research, it also introduces new challenges for security and governance. Many modern AI systems and agents operate with access to codebases, datasets, research infrastructure, external tools, and networked resources in order to automate tasks and support analysis. As these systems optimize predictions, process large datasets, and assist with troubleshooting or experimentation, questions arise around what level of access they should be granted and how their actions should be monitored. At the same time, the threat landscape surrounding AI is constantly evolving, making it increasingly difficult for institutions to fully understand and secure these systems, particularly in shared research environments where data, models, and infrastructure are widely distributed.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;The Role of AI Governance and Security Frameworks&lt;/h2&gt;&lt;p&gt;AI governance and security frameworks provide structured guidance for managing the risks associated with deploying AI systems within research infrastructure. They help institutions identify potential risks, establish governance practices, and implement safeguards across the AI lifecycle. For research environments that rely on shared datasets, computing resources, and collaborative platforms, the frameworks below offer practical reference points for adopting AI responsibly while protecting research infrastructure and scientific data.&lt;br /&gt;&lt;br /&gt;Below is a summary of four existing frameworks, along with guidance on when a research institution might consider using each one.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;1. NIST Artificial Intelligence Risk Management Framework&lt;/h2&gt;&lt;p&gt;The &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf&quot; target=&quot;_blank&quot;&gt;NIST Artificial Intelligence Risk Management Framework (AI RMF)&lt;/a&gt; provides guidance for organizations and individuals involved in the AI lifecycle (often referred to as AI actors) to design, develop, deploy, and operate AI systems in a trustworthy and responsible manner. The framework is intended to be practical and adaptable as AI technologies evolve, enabling organizations to manage risks while continuing to benefit from AI innovation.&lt;br /&gt;&lt;br /&gt;For research environments, the framework is particularly valuable because it focuses on how AI systems interact with organizational processes and infrastructure (core elements emphasized by the &lt;a href=&quot;https://www.trustedci.org/framework&quot; target=&quot;_blank&quot;&gt;Trusted CI Framework’s&lt;/a&gt; approach to developing and managing a cybersecurity program). Key concepts include:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Govern &lt;/b&gt;- Establish organizational policies, oversight, and accountability to manage AI risks across the AI system lifecycle.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Map &lt;/b&gt;- Establish the context of an AI system by identifying its purpose, stakeholders, operational environment, and potential risks across the AI lifecycle.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Measure &lt;/b&gt;- Use testing, evaluation, verification, and validation (TEVV) methods and metrics to assess AI system performance, trustworthiness, and associated risks.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Manage &lt;/b&gt;- Prioritize and mitigate identified AI risks through continuous monitoring, incident response, and improvements across the AI system lifecycle.&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;When Research Institutions May Consider Using It&lt;/h3&gt;&lt;p&gt;Research institutions can use the NIST AI RMF when they need a structured approach for evaluating and managing AI risks across research infrastructure. The framework is particularly useful for establishing governance processes for how AI systems are developed, tested, deployed, and monitored within research environments. By adopting the NIST AI RMF, institutions can improve their ability to document AI system risks, evaluate tradeoffs between trustworthiness characteristics, and support informed decisions about whether AI systems should be deployed within research infrastructure. The framework also helps organizations strengthen accountability, improve information sharing about AI risks across teams, and develop more consistent approaches for testing, evaluating, verifying, and validating (TEVV) AI systems over time.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;2. NIST AI 600-1&lt;/h2&gt;&lt;p&gt;&lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf&quot; target=&quot;_blank&quot;&gt;NIST AI 600-1&lt;/a&gt; is a companion document to the NIST Artificial Intelligence Risk Management Framework (AI RMF) that focuses specifically on risks associated with generative AI systems. It identifies risks that are unique to or amplified by generative AI and provides guidance for addressing them through considerations such as governance, content provenance, pre-deployment testing, and incident disclosure.&lt;br /&gt;&lt;br /&gt;The document highlights several risk categories that are particularly relevant to research environments:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Confabulation (Hallucinations)&lt;/b&gt;, where AI systems generate incorrect or fabricated information that may affect scientific accuracy&lt;/li&gt;&lt;li&gt;&lt;b&gt;Data privacy risks &lt;/b&gt;when sensitive research datasets are used with generative AI tools&lt;/li&gt;&lt;li&gt;&lt;b&gt;Information security risks&lt;/b&gt;, including the potential misuse of AI systems for cyber activities&lt;/li&gt;&lt;li&gt;&lt;b&gt;Intellectual property concerns &lt;/b&gt;related to AI-generated research content and code&lt;/li&gt;&lt;li&gt;&lt;b&gt;Dual-use risks&lt;/b&gt;, particularly in domains such as chemistry, biology, and materials science&lt;/li&gt;&lt;li&gt;Broader concerns such as &lt;b&gt;bias&lt;/b&gt;, &lt;b&gt;information integrity&lt;/b&gt;, and &lt;b&gt;value-chain dependencies &lt;/b&gt;in AI systems&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;When Research Institutions May Consider Using It&lt;/h3&gt;&lt;p&gt;NIST AI 600-1 can aid research institutions when evaluating risks associated with generative AI systems used in research workflows, particularly in environments involving sensitive datasets, dual-use research domains, or AI-assisted analysis. The document complements the NIST Artificial Intelligence Risk Management Framework by mapping generative AI risks to the RMF’s Govern, Map, Measure, and Manage functions, helping institutions integrate these risks into broader AI risk management practices.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;3. Cloud Security Alliance AI Controls Matrix (CSA AICM)&lt;/h2&gt;&lt;p&gt;The &lt;a href=&quot;https://cloudsecurityalliance.org/artifacts/ai-controls-matrix&quot; target=&quot;_blank&quot;&gt;CSA AI Controls Matrix (AICM)&lt;/a&gt;, developed by the &lt;a href=&quot;https://cloudsecurityalliance.org/&quot; target=&quot;_blank&quot;&gt;Cloud Security Alliance&lt;/a&gt;, provides a comprehensive set of security controls specifically designed for AI systems. The framework outlines 243 control objectives across 18 security domains, covering the entire AI lifecycle from data pipelines and training environments to model deployment and third-party integrations. While governance frameworks such as the NIST AI RMF focus on risk management and oversight, the AICM emphasizes practical implementation by defining concrete security controls that organizations can apply when developing and operating AI systems.&lt;br /&gt;&lt;br /&gt;One way to think about the relationship between these frameworks: &lt;i&gt;If NIST outlines the why and additional supporting resources such as MITRE shows the how, CSA AICM delivers the what.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;For research environments where AI systems are used for data analysis, modeling, and experimentation, the AICM highlights several important areas:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Security controls &lt;/b&gt;for AI datasets and training pipelines, ensuring research data used for model development is protected&lt;/li&gt;&lt;li&gt;&lt;b&gt;Controls &lt;/b&gt;for model development, deployment, and lifecycle management across AI systems&lt;/li&gt;&lt;li&gt;&lt;b&gt;Identity and access management &lt;/b&gt;for AI services and infrastructure&lt;/li&gt;&lt;li&gt;Ris&lt;b&gt;k management for third-party AI models&lt;/b&gt; and external components used within research workflows&lt;/li&gt;&lt;li&gt;&lt;b&gt;Monitoring and auditing mechanisms &lt;/b&gt;to track AI system behavior and operational activity&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;When Research Institutions May Consider Using It&lt;/h3&gt;&lt;p&gt;Research institutions can use the CSA AI Controls Matrix when implementing operational security controls for AI systems and supporting infrastructure. The AICM can help research cyberinfrastructure teams translate governance guidance from frameworks such as the NIST AI RMF into practical security controls for AI deployments.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;4. Cisco’s Integrated AI Security and Safety Framework&lt;/h2&gt;&lt;p&gt;The &lt;a href=&quot;https://learn-cloudsecurity.cisco.com/ai-security-framework&quot; target=&quot;_blank&quot;&gt;Cisco Integrated AI Security and Safety Framework&lt;/a&gt; provides a structured approach for understanding and managing risks associated with modern AI systems. It introduces a taxonomy that categorizes AI security and safety risks across the AI lifecycle, including data pipelines, models, system integrations, and agentic components.&lt;br /&gt;&lt;br /&gt;For research environments where AI systems are used for modeling, experimentation, and data analysis, the framework highlights several important areas:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Lifecycle-aware risk analysis &lt;/b&gt;across data pipelines, model development, deployment, and operation&lt;/li&gt;&lt;li&gt;&lt;b&gt;Threat taxonomy &lt;/b&gt;based on attacker objectives and techniques, helping teams understand how AI systems may be targeted&lt;/li&gt;&lt;li&gt;&lt;b&gt;Coverage of emerging AI risks&lt;/b&gt;, including prompt injection, model manipulation, and supply-chain compromise&lt;/li&gt;&lt;li&gt;&lt;b&gt;Integration of safety and security considerations&lt;/b&gt;, recognizing that AI risks may involve both technical vulnerabilities and harmful outputs&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;When Research Institutions May Consider Using It&lt;/h3&gt;&lt;p&gt;Research institutions can reference this framework when evaluating security risks in complex AI architectures and when developing threat models for AI systems used in research workflows. It is particularly useful alongside frameworks such as the NIST AI RMF and NIST AI 600-1, where governance and risk identification are already established, and complements the CSA AICM by providing a system-level view of how threats may emerge across the AI lifecycle.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;How These Four Frameworks Complement Each Other&lt;/h2&gt;&lt;p&gt;Each of these frameworks address different dimensions of AI security and governance and can be used together to provide a more comprehensive approach to managing AI risks in research environments. &lt;b&gt;NIST AI RMF&lt;/b&gt; establishes the governance and risk management structure for AI systems. &lt;b&gt;NIST AI 600-1&lt;/b&gt; extends this by identifying risks specific to generative AI and mapping them to the RMF functions. &lt;b&gt;CSA’s AICM&lt;/b&gt; complements these governance frameworks by translating risk management concepts into concrete security controls that can be implemented in practice. &lt;b&gt;Cisco’s AI Security Framework&lt;/b&gt; adds a lifecycle and threat-modeling perspective, helping organizations understand how risks may emerge across AI systems and supporting infrastructure.&lt;br /&gt;&lt;br /&gt;For example, a research institution’s team developing an AI model for analyzing biomedical datasets could use the NIST AI RMF to establish governance and risk management practices, NIST AI 600-1 to evaluate generative AI risks such as data leakage or hallucinated outputs, CSA AICM to implement operational controls around data access and model deployment, and Cisco’s framework to analyze potential attack surfaces across the AI system lifecycle.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Alignment with the NSF AI Strategy&lt;/h2&gt;&lt;p&gt;The &lt;a href=&quot;https://nsf-gov-resources.nsf.gov/files/nsf-ai-strategy.pdf&quot; target=&quot;_blank&quot;&gt;NSF AI Strategy&lt;/a&gt; emphasizes responsible and secure adoption of AI across research and operational environments through five pillars: governance, mission-driven AI use cases, data and infrastructure, responsible innovation, and workforce readiness. Applying frameworks such as the NIST AI RMF, NIST AI 600-1, CSA AICM, and Cisco AI Security Framework can help research institutions align with these pillars by establishing governance and risk management processes, improving security practices around AI-enabled data and infrastructure, and supporting the safe deployment of AI systems in research environments. Together, these frameworks provide practical guidance that helps translate the strategic goals outlined in the NSF plan into operational practices for AI systems used in scientific research.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Additional Resources for Understanding AI Security Threats&amp;nbsp;&lt;/h2&gt;&lt;p&gt;Alongside governance and control frameworks, resources such as &lt;a href=&quot;https://atlas.mitre.org/&quot; target=&quot;_blank&quot;&gt;MITRE ATLAS&lt;/a&gt; and the &lt;a href=&quot;https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/&quot; target=&quot;_blank&quot;&gt;OWASP Top 10 for Agentic Applications&lt;/a&gt; provide valuable threat intelligence for understanding how AI systems can be attacked or misused. These resources help research institutions identify common adversarial techniques, emerging attack patterns, and security weaknesses in AI-driven systems, supporting more informed threat modeling and risk assessment when deploying AI within research environments.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Conclusion&lt;/h2&gt;&lt;p&gt;As AI becomes more embedded in research workflows, understanding and applying established security and governance frameworks becomes increasingly important. The four frameworks reviewed here (NIST AI RMF, NIST AI 600-1, CSA AI Controls Matrix, and Cisco AI Security Framework) provide complementary perspectives that help research institutions approach AI adoption in a structured and responsible manner. By leveraging these resources alongside threat intelligence guidance such as MITRE ATLAS and OWASP, research organizations can better anticipate risks, strengthen security practices, and support the secure and trustworthy use of AI within research cyberinfrastructure.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7268143354454715499'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7268143354454715499'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/03/navigating-ai-governance-and-security.html' title='Navigating AI Governance And Security Frameworks: Quick Practical Considerations for Research Institutions'/><author><name>Terry Fleury</name><uri>http://www.blogger.com/profile/03313341421176207441</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4692930478840295190</id><published>2026-03-24T08:09:00.001-04:00</published><updated>2026-03-24T08:09:56.013-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secure AI"/><title type='text'>Trusted CI Launches Secure Use of AI Effort</title><content type='html'>&lt;p&gt;Significant numbers of science research projects currently use or will use an array of AI resources to help facilitate scientific research, from machine learning (ML) for elements of the research data lifecycle, to generative AI large language models (LLMs). These resources are part of a rapidly evolving landscape where there is limited guidance on their cybersecurity and research security impacts. To address this critical gap, Trusted CI initiated the &lt;b&gt;&lt;a href=&quot;https://www.trustedci.org/secure-ai&quot; target=&quot;_blank&quot;&gt;Secure Use of AI&lt;/a&gt;&lt;/b&gt; effort in January 2026 as part of its overall initiatives on AI. This new endeavor focuses on gathering and sharing information to help research cyberinfrastructure organizations and institutions of higher education understand the impact of AI on their research and cybersecurity programs, including the inherent limitations and vulnerabilities of different types of AI tools and systems.&lt;br /&gt;&lt;br /&gt;Security risks associated with the use of AI resources in scientific research projects encompass two broad categories. The first involves adversarial attacks that deliberately target AI systems and their underlying components, such as the models, data pipelines, or supporting infrastructure. The second involves operational risks that arise from the behavior and limitations of AI systems, including model hallucinations, design flaws, or improper handling and interpretation of AI-generated outputs. The Secure Use of AI team is mapping the litany of concerns with frameworks for addressing them, thereby identifying urgent areas for scientific cybersecurity programs to adapt or augment their existing approaches. Additionally, as part of the initial phase of activities, the Trusted CI Secure Use of AI team will engage with community stakeholders to gather insights needed to clarify understanding, concerns, and challenges of AI use. This effort will include interviews of community experts on AI and security, and interviews or round table activities with research cyberinfrastructure operators to determine their evolving needs.The activities will result in the socialization of guidance and other outputs from this project among NSF and the broader federally-funded research community.&lt;br /&gt;&lt;br /&gt;Through development and growth of relationships with NSF Major Facilities and collaboration with organizations such as &lt;a href=&quot;https://ci-compass.org/&quot; target=&quot;_blank&quot;&gt;CI Compass&lt;/a&gt;, the &lt;a href=&quot;https://www.secure-center.org/&quot; target=&quot;_blank&quot;&gt;NSF SECURE Center&lt;/a&gt;, the &lt;a href=&quot;https://nairratdoe.ornl.gov/&quot; target=&quot;_blank&quot;&gt;National Artificial Intelligence Research Resource Pilot (NAIRR)&lt;/a&gt; and its &lt;a href=&quot;https://nairrpilot.org/nairr-secure&quot; target=&quot;_blank&quot;&gt;NAIRR Secure&lt;/a&gt; effort, and others, Trusted CI will seek to foster a community of practice focused on the Secure Use of AI in Research environments.&lt;br /&gt;&lt;br /&gt;If you have questions or suggestions, or need help securing AI in your research project or organization, please contact Trusted CI at &lt;a href=&quot;mailto:help@trustedci.org&quot;&gt;help@trustedci.org&lt;/a&gt;.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4692930478840295190'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4692930478840295190'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/03/trusted-ci-launches-secure-use-of-ai.html' title='Trusted CI Launches Secure Use of AI Effort'/><author><name>Terry Fleury</name><uri>http://www.blogger.com/profile/03313341421176207441</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6539191867235070293</id><published>2026-03-17T14:44:00.004-04:00</published><updated>2026-03-17T14:44:50.669-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="advisory committee"/><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="project-news"/><category scheme="http://www.blogger.com/atom/ns#" term="research security"/><title type='text'>Welcome to Our New Advisory Committee Members!</title><content type='html'>&lt;p&gt;In support of our &lt;a href=&quot;https://blog.trustedci.org/2026/01/trusted-ci-mission-expanding-to-address.html&quot; target=&quot;_blank&quot;&gt;expanded mission&lt;/a&gt;, Trusted CI is thrilled to welcome Damian Clarke, Ph.D. and Manish Parashar, Ph.D. to the &lt;a href=&quot;https://www.trustedci.org/advisory-committee&quot; target=&quot;_blank&quot;&gt;Trusted CI Advisory Committee&lt;/a&gt;. Dr. Clarke rejoins the Advisory Committee after 2 years serving as special advisor to the program. His experiences in leadership positions at universities and university consortia, particularly in the U.S. Southeast, will be particularly valuable to Trusted CI as it works to further engage with institutions of higher education to determine how best to address the cybersecurity requirements of research security. Dr. Parashar brings a wealth of experience related to national cyberinfrastructure and artificial intelligence. We look forward to his input on our new AI initiatives and helping to define our future strategy to support the community with the secure use of AI technologies.&lt;/p&gt;&lt;p&gt;In addition to Drs. Clarke and Parashar, we wish to express our gratitude to the entire Advisory Committee for the guidance they provide and for sharing their time and insights to maximize the value of Trusted CI’s programs to the communities we serve.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6539191867235070293'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6539191867235070293'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/03/welcome-to-our-new-advisory-committee.html' title='Welcome to Our New Advisory Committee Members!'/><author><name>Kelli Shute</name><uri>http://www.blogger.com/profile/08611415753623346274</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-2573256860091797147</id><published>2026-02-09T09:18:00.000-05:00</published><updated>2026-02-09T09:18:31.884-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="research security"/><category scheme="http://www.blogger.com/atom/ns#" term="residency"/><category scheme="http://www.blogger.com/atom/ns#" term="SPHERE"/><category scheme="http://www.blogger.com/atom/ns#" term="USC-ISI"/><title type='text'>SPHERE and Trusted CI Collaborate to Strengthen Research Security</title><content type='html'>&lt;p&gt;In February 2026, the NSF-funded &lt;a href=&quot;https://sphere-project.net/&quot;&gt;Security and Privacy Heterogeneous Environment for Reproducible Experimentation&lt;/a&gt; (SPHERE) project hosted a week-long cybersecurity residency with &lt;a href=&quot;https://www.trustedci.org/&quot;&gt;Trusted CI&lt;/a&gt;, the National Science Foundation’s Cybersecurity Center of Excellence. The residency marked an important milestone in SPHERE’s transition from construction toward sustained operations, strengthening an already robust security posture through formal alignment with widely recognized best practices.&lt;/p&gt;&lt;p&gt;SPHERE previously partnered with Trusted CI during the &lt;a href=&quot;https://blog.trustedci.org/2024/07/advancing-cybersecurity-of-nsf.html&quot;&gt;2024 Trusted CI Framework Cohort&lt;/a&gt;, where the SPHERE team adopted the &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt; and completed a structured self-assessment of its cybersecurity program against the framework’s 16 Musts. The Musts identify the concrete, critical requirements for establishing and running a competent cybersecurity program. That cohort experience validated SPHERE’s foundational approach to security, while also highlighting an important next step: formally adopting a baseline cybersecurity control set and performing a gap analysis between that baseline and SPHERE’s existing controls. The Trusted CI Framework specifically recommends adoption of a recognized baseline control set in its Must 15.&lt;/p&gt;&lt;p&gt;Building on that groundwork, the February 2026 residency embedded Trusted CI staff directly with the SPHERE DevOps team for one intensive week at the &lt;a href=&quot;https://isi.edu/&quot;&gt;USC Information Sciences Institute&lt;/a&gt; in Marina del Rey, CA. Working side by side, the teams aligned SPHERE’s existing cybersecurity controls with the &lt;a href=&quot;https://www.cisecurity.org/controls&quot;&gt;CIS Critical Security Controls&lt;/a&gt; (CIS Controls v8), which SPHERE has now formally adopted as its baseline control set.&lt;/p&gt;&lt;p&gt;This work focused on mapping SPHERE’s existing practices to the CIS Controls, identifying gaps, and prioritizing future improvements. The residency also strengthened SPHERE’s alignment with NSF’s evolving expectations for research security, including closer alignment with the &lt;a href=&quot;https://www.nsf.gov/policies/document/research-infrastructure-guide&quot;&gt;NSF Research Infrastructure Guide&lt;/a&gt; (RIG) and its set of 14 critical controls. By grounding its program in both the Trusted CI Framework and the CIS Controls, SPHERE gained a common language for documenting controls, reduced reliance on ad hoc decision-making, and ensured consistency with broadly accepted community standards.&lt;/p&gt;&lt;p&gt;During the residency, Trusted CI conducted site visits at all the sites that host SPHERE physical infrastructure. They visited the ISI and USC server rooms, and met virtually with SPHERE co-PIs and their teams at &lt;a href=&quot;https://www.khoury.northeastern.edu/&quot;&gt;Northeastern University Khoury College of Computer Sciences&lt;/a&gt; and the &lt;a href=&quot;https://www.cs.utah.edu/&quot;&gt;University of Utah Kahlert School of Computing&lt;/a&gt;. These discussions helped ensure that SPHERE’s distributed architecture is protected in a coordinated and consistent manner across institutions.&lt;/p&gt;&lt;p&gt;With the gap analysis complete, SPHERE is well positioned to prioritize future security investments as it moves toward full operations. The outcome directly supports SPHERE’s core mission of enabling realistic and reproducible experimentation without compromising trust in the facility or the science it supports. Achieving this mission requires protecting the underlying infrastructure from attack and security breaches, safeguarding the integrity and availability of shared resources, and ensuring strong isolation and protection of researcher experiments and data.&lt;/p&gt;&lt;p&gt;SPHERE will share lessons learned from the residency with the broader Trusted CI &lt;a href=&quot;https://www.trustedci.org/risc&quot;&gt;Research Infrastructure Security Community&lt;/a&gt; (RISC), contributing back to the ecosystem that helped shape its approach.&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri,sans-serif&quot; id=&quot;docs-internal-guid-fcdcb7f3-7fff-c8d1-f723-11435e8d317e&quot; style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;span style=&quot;border: medium; display: inline-block; height: 333px; overflow: hidden; width: 385px;&quot;&gt;&lt;img height=&quot;333&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhenCdrqqmu-xawofrnFweN9HN0KRhtUh3i_clbTTwlMAlvZwdiOrxqhNTmWyZNSW3j82fRHfTrWaiTBOJUJpzC_H6Y3A4AsCoIxv_VbW5Vc-1ytw43I9cgb605CdZvmcIzqNIEU1MZ6nvqma8lSaaQzF4Zflya8-9zEbDylJGVxVPtfJ2-dc6zsA9Zfr4&quot; style=&quot;margin-left: 0px; margin-top: 0px;&quot; title=&quot;IMG_5458.jpeg&quot; width=&quot;385&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;SPHERE&lt;/b&gt; (Security and Privacy Heterogeneous Environment for Reproducible Experimentation) is an NSF Mid-scale Research Infrastructure-1 project (Award #&lt;a href=&quot;https://www.nsf.gov/awardsearch/show-award/?AWD_ID=2330066&quot;&gt;2330066&lt;/a&gt;) spanning USC Information Sciences Institute, Northeastern University, and the University of Utah. SPHERE provides a public testbed for reproducible science and experimentation tailored to the needs of cybersecurity and privacy researchers and educators.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Trusted CI&lt;/b&gt;, the NSF Cybersecurity Center of Excellence, is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. Trusted CI’s mission is to enable trustworthy NSF science by partnering with cyberinfrastructure operators to build and maintain effective cybersecurity programs, publishing resources for the broader NSF community, and advancing the processes, tools, and knowledge needed to secure research progress.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2573256860091797147'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2573256860091797147'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/02/sphere-residency.html' title='SPHERE and Trusted CI Collaborate to Strengthen Research Security'/><author><name>Jim Basney</name><uri>http://www.blogger.com/profile/03020327423025316235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhenCdrqqmu-xawofrnFweN9HN0KRhtUh3i_clbTTwlMAlvZwdiOrxqhNTmWyZNSW3j82fRHfTrWaiTBOJUJpzC_H6Y3A4AsCoIxv_VbW5Vc-1ytw43I9cgb605CdZvmcIzqNIEU1MZ6nvqma8lSaaQzF4Zflya8-9zEbDylJGVxVPtfJ2-dc6zsA9Zfr4=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-289517200229879861</id><published>2026-02-04T14:24:00.002-05:00</published><updated>2026-02-04T14:24:43.513-05:00</updated><title type='text'>2026 Trusted CI Scholars Program Now Accepting Applications</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/89941573-69f7-4031-a1c3-c3f6d314dd62/Students.jpg?format=2500w&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1362&quot; data-original-width=&quot;2048&quot; height=&quot;266&quot; src=&quot;https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/89941573-69f7-4031-a1c3-c3f6d314dd62/Students.jpg?format=2500w&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&amp;nbsp;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;As cybersecurity becomes increasingly vital across the scientific community, cultivating the next generation of cybersecurity leaders has never been more important. Trusted CI is proud to announce the &lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI Scholars Program &lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;(formerly Trusted CI Student Program), designed to equip students with essential skills, insights, mentorship, and hands-on experiences in cybersecurity.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-880df88e-7fff-a6a6-ce44-8e24abac5173&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The &lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI Scholars Program&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; goes beyond technical training. It is about building a collaborative and innovative community of emerging leaders. If you are a student passionate about cybersecurity—or know someone who is—we encourage you to apply and join us in shaping a safer, more secure future for science and beyond.&lt;/span&gt;&lt;/p&gt;&lt;h3 dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial, sans-serif; font-size: 14pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Why &lt;/span&gt;&lt;span style=&quot;color: #434343; font-family: Arial, sans-serif; font-size: 14pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI Scholars&lt;/span&gt;&lt;span style=&quot;color: #434343; font-family: Arial, sans-serif; font-size: 14pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Matter&lt;/span&gt;&lt;/h3&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Through mentorship, applied learning, and sustained interaction with cyberinfrastructure practitioners and the broader NSF community, Scholars learn from the processes, tools, and knowledge that Trusted CI advances to support secure research. In doing so, the program extends Trusted CI’s impact into the next generation of the cybersecurity workforce.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Additionally, as Trusted CI begins addressing the needs of higher education institutions related to research security, cybersecurity requirements, and artificial intelligence, early and proactive student engagement with these topics lays important groundwork for developing the skills, awareness, and readiness they may need to secure the nation’s science and research enterprise.&lt;/span&gt;&lt;/p&gt;&lt;h3 dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial, sans-serif; font-size: 14pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Goals of the Program&lt;/span&gt;&lt;/h3&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The &lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI Scholars Program&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; is committed to:&lt;/span&gt;&lt;/p&gt;&lt;ol style=&quot;margin-bottom: 0px; margin-top: 0px; padding-inline-start: 48px;&quot;&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Providing Foundational Knowledge:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Gain practical insights into cybersecurity through workshops, mentorship, and participation in the annual NSF Cybersecurity Summit.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Growing Leadership Skills:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Strengthen communication, collaboration, integrity and adaptability.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Empowering Advocacy:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Serve as cybersecurity ambassadors within your communities, sharing knowledge with peers and connecting them to Trusted CI for advanced support.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Building Long-Term Connections:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Join a growing network of Trusted CI alumni, opening doors to coaching, networking, and career opportunities in the cybersecurity field.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3 dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial, sans-serif; font-size: 14pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Highlights for 2026&lt;/span&gt;&lt;/h3&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;This year’s program includes exciting enhancements:&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;margin-bottom: 0px; margin-top: 0px; padding-inline-start: 48px;&quot;&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: disc; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Focused Workshops and Mentorship:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Scholars will engage in tailored workshops and one-on-one mentorship with Trusted CI staff and subject-matter experts.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: disc; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Alumni Engagement:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Past participants will continue to have access to resources and Summit reunion opportunities, fostering sustained learning and long-term relationships. Alumni are also encouraged to share their experiences through blog posts, presentations, and outreach activities to inspire future cybersecurity professionals.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; list-style-type: disc; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Streamlined Application Process:&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Applicants will submit a personal statement, professional bio sketches, and letters of support, enabling a more holistic evaluation.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Applications are now open on our &lt;/span&gt;&lt;a href=&quot;https://ssl.linklings.net/applications/TrustedCI/&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;submission website&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; and close March 6.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;For more information on how to apply, visit Trusted CI’s &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/student-program-details-on-application&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;website&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; or reach out to &lt;/span&gt;&lt;a href=&quot;mailto:scholars@trustedci.org&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;scholars@trustedci.org&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 12pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Together, we’re preparing the next generation of cybersecurity leaders!&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/289517200229879861'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/289517200229879861'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/02/2026-trusted-ci-scholars-program-now.html' title='2026 Trusted CI Scholars Program Now Accepting Applications'/><author><name>JAM</name><uri>http://www.blogger.com/profile/01976607119989188955</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7909867729301143204</id><published>2026-02-04T11:30:00.002-05:00</published><updated>2026-02-04T11:30:54.899-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'>Trusted CI 2025 Summit Report Now Available</title><content type='html'>&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Last October, Trusted CI convened the 2025 NSF Cybersecurity
Summit. This yearly event provides a forum for National Science Foundation
(NSF) scientists, researchers, cybersecurity, and cyberinfrastructure (CI)
professionals and stakeholders to share effective technical practices and
brainstorm solutions to everyday challenges facing cybersecurity environment
professionals. When the community comes together for the Summit, they
collectively learn from each other.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;The 2025 Summit was held in person in Boulder, CO, at the
Center Green Campus at UCAR and NSF NCAR.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Interested in reading more takeaways from this year&#39;s
Summit? Download the full Summit Report from &lt;a href=&quot;https://doi.org/10.5281/zenodo.18484621&quot;&gt;https://doi.org/10.5281/zenodo.18484621&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;





</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7909867729301143204'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7909867729301143204'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/02/trusted-ci-2025-summit-report-now.html' title='Trusted CI 2025 Summit Report Now Available'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6737362005124751758</id><published>2026-01-16T11:19:00.002-05:00</published><updated>2026-01-16T11:19:43.112-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="higher ed"/><category scheme="http://www.blogger.com/atom/ns#" term="NSMP-33"/><category scheme="http://www.blogger.com/atom/ns#" term="research security"/><title type='text'>Trusted CI Mission Expanding to Address Cybersecurity for Research Security and AI</title><content type='html'>&lt;p&gt;As we enter into 2026, Trusted CI leadership is excited to share some important updates regarding the expansion of our mission. We will begin addressing the needs of higher education institutions as they relate to research security and the cybersecurity requirements of NSPM-33. In addition, we will begin major new strategic initiatives focused on the secure use of AI in research. Both of these changes represent significant expansion of our mission and also the number of institutions that we will directly impact.&lt;/p&gt;&lt;p&gt;Our core mission continues to be supporting the security of research through cybersecurity excellence.&amp;nbsp; This includes our existing community of NSF Major Facilities and Mid-Scales, a community we remain committed to supporting. We will continue to host the annual NSF Cybersecurity Summit and will expand the program to include topics related to research security and AI. In addition, this year we’ll host our first&lt;a href=&quot;https://www.trustedci.org/2026-regional-summit&quot; target=&quot;_blank&quot;&gt; Regional Summit &lt;/a&gt;in partnership with the University of Alabama.&lt;/p&gt;&lt;p&gt;In support of our expanded mission, we will begin partnering strategically with the &lt;a href=&quot;https://www.secure-center.org/&quot; target=&quot;_blank&quot;&gt;SECURE Center&lt;/a&gt; and &lt;a href=&quot;https://www.nsf.gov/focus-areas/ai/nairr&quot; target=&quot;_blank&quot;&gt;NAIRR&lt;/a&gt;-related projects. SECURE Center’s expertise in research security complements our cybersecurity expertise, and we will partner to provide comprehensive support to academic institutions who are navigating compliance with emerging NSPM-33 cybersecurity requirements. We will partner with NAIRR stakeholders to support their cybersecurity program needs.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We have established our plans for 2026 inclusive of our new objectives. This includes pivoting our cohort model to new communities focused on research security in 2026.&lt;/p&gt;&lt;p&gt;We look forward to engaging with new community members in the coming year! Please send any comments or questions to &lt;a href=&quot;mailto:info@trustedci.org&quot;&gt;info@trustedci.org&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6737362005124751758'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6737362005124751758'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/01/trusted-ci-mission-expanding-to-address.html' title='Trusted CI Mission Expanding to Address Cybersecurity for Research Security and AI'/><author><name>Kelli Shute</name><uri>http://www.blogger.com/profile/08611415753623346274</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-2317790556141601816</id><published>2026-01-15T10:14:00.000-05:00</published><updated>2026-01-15T10:14:22.165-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity programs"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="mid-scales"/><title type='text'>Trusted CI Completes Two Assessment Pilots with Cohort Graduates</title><content type='html'>&lt;p&gt;The second half of 2025 was incredibly productive for the Trusted CI team. After a &lt;a href=&quot;https://blog.trustedci.org/2025/09/trusted-ci-celebrates-sixth-cohort.html&quot;&gt;successful cohort&lt;/a&gt; in the first half of 2025, Trusted CI shifted efforts to piloting two new kinds of assessments: a &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt; reassessment for organizations who previously participated in a Trusted CI Framework cohort program and a Cybertrack+ Assessment with NOIRLab focused on assessing the most important cybersecurity controls.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Trusted CI Framework Reassessment Cohort Pilot&lt;/h3&gt;&lt;div&gt;&lt;div&gt;This pilot was a three month group engagement where previous cohort graduates had their cybersecurity programs re-assessed by Trusted CI, culminating in new ratings for each of the Framework’s 16 Musts and updated strategic recommendations. The Framework reassessment cohort was designed to be lighter-weight than the original Framework cohort, allowing organizations who are already well-versed in the Framework to quickly engage with Trusted CI, while preserving the opportunity to meet and learn from one’s peer organizations in a small-group environment. The pilot brought five NSF-sponsored organizations together for opportunities to share their experiences: Corporation for Education Network Initiatives in California (&lt;a href=&quot;https://cenic.org/&quot;&gt;CENIC&lt;/a&gt;), Network for Advanced NMR (&lt;a href=&quot;https://usnan.nmrhub.org/about/nan-mission&quot;&gt;NAN&lt;/a&gt;), US National Science Foundation National Optical-Infrared Astronomy Research Laboratory (&lt;a href=&quot;https://noirlab.edu/public/&quot;&gt;NOIRLab&lt;/a&gt;), National Solar Observatory (&lt;a href=&quot;https://nso.edu/&quot;&gt;NSO&lt;/a&gt;), and Ocean Observatories Initiative (&lt;a href=&quot;https://oceanobservatories.org/&quot;&gt;OOI&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;CENIC reassessment presentation&quot; height=&quot;267&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjGf45M9PFiPdIm4zzxM-nxliNqRCHlbRP5A36z0IFWXmYyzxb8TMBzhGnciSmcbfKuQRtbIu5tVcnJM8OxYWklwUbtEtrKG_R32Ak3DWDvfzg9kNb4-STmDxo7VvtFUQe1Gn_mN_dFm1aeHLFZbPcRo7KkLVYe1K-IjUsTcBQLoOtclIc4m878_m7GWWee=w400-h267&quot; style=&quot;margin-left: auto; margin-right: auto; margin-top: 0px;&quot; title=&quot;CENIC reassessment presentation&quot; width=&quot;400&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;CENIC reassessment presentation&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Each organization had the opportunity to collaborate with other participants at the in-person Reassessment Workshop during the 2025 NSF Cybersecurity Summit in Boulder, CO. During the workshop, organizations presented on their mission and cybersecurity program, highlighted major changes from their previous assessment, as well as successes, challenges, and lessons learned. The group also held a hotwash on their experience with the reassessment cohort to help Trusted CI improve the program going forward.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;“Participating in the Framework reassessment cohort pilot was a worthwhile experience that not only allowed the OOI to reengage with and learn from our Trusted CI and Major Facility colleagues but also to reflect on and better quantify all of the hard work that has gone into improving the OOI cybersecurity program since it was assessed in 2022 as part of the inaugural Framework cohort.”&lt;/i&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;–Craig Risien, Ocean Observatories Initiative&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;img height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEi2H4TGMO08rU9fWBpvxy4KU0Pyjm7qB2Cnt0l6ialWTlVNjd-MThcLBJixP8_2IafbxFFN7V7H8vSukja08ogkIYlzolOBSGzBzbJBHhZ1qD2M7-gTulFnrVSoR2w3U7XTgU71hZ59U4QsKHEjb9FnV0eHWh0_UBpILQzzN5Y--UGxrY1kHTA6ehpAPZsv&quot; style=&quot;margin-left: auto; margin-right: auto; margin-top: 0px;&quot; width=&quot;394&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Reassessment Workshop in Boulder, CO&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Trusted CI Cybertrack+ Assessment Pilot with NOIRLab&lt;/h3&gt;&lt;div&gt;Over last summer, Trusted CI kicked off a pilot assessment focused on assessing the most important cybersecurity controls. To do this, Trusted CI adopted the &lt;a href=&quot;https://incybertrack.org/&quot;&gt;Cybertrack Assessment Methodology&lt;/a&gt;: This assessment methodology was developed through a partnership between Purdue University and Indiana University, with sponsorship from the Indiana Office of Technology. These assessments evaluate the most powerful cybersecurity fundamentals leveraging the &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt; and &lt;a href=&quot;https://www.cisecurity.org/controls&quot;&gt;CIS Controls&lt;/a&gt;, and provide actionable advice to improve an organization&#39;s cybersecurity posture. Cybertrack+ assessments expand this methodology to incorporate additional CIS Safeguards that are most important for operational technology (OT).&amp;nbsp; In future assessments, Trusted CI plans to tailor the methodology to include the NSF Critical Controls that subsequently appeared in the 2025 NSF Research Infrastructure Guide.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Trusted CI engaged with NOIRLab to test the assessment on a research infrastructure organization. The Trusted CI Team worked with NOIRLab over a period of about two months, conducting written discovery and meeting for a fact finding session to clarify any outstanding details. At the end of this pilot, NOIRLab received an assessment report with prioritized recommendations to improve its controls implementation.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;i&gt;&quot;The results of the Trusted CI Cybertrack+ Assessment included 5 top recommendations that will have an immediate impact on our cybersecurity posture.&amp;nbsp; The rest of the report will help drive future projects that will further secure our research infrastructure.&amp;nbsp; This was much more painless than other assessments, with better, more focused recommendations.&quot; &lt;/i&gt;&lt;b&gt;–Jerry Brower, NOIRLab&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The success of both the reassessment cohort and the Cybertrack+ pilot was significantly amplified by strong collaboration among all participants and the Trusted CI team. Trusted CI extends its sincere thanks to all participants for their commitment, time, and helpful contributions throughout these pilot assessments.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2317790556141601816'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2317790556141601816'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/01/trusted-ci-completes-two-assessment.html' title='Trusted CI Completes Two Assessment Pilots with Cohort Graduates'/><author><name>Cory Gleyze</name><uri>http://www.blogger.com/profile/11345984305466019128</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjGf45M9PFiPdIm4zzxM-nxliNqRCHlbRP5A36z0IFWXmYyzxb8TMBzhGnciSmcbfKuQRtbIu5tVcnJM8OxYWklwUbtEtrKG_R32Ak3DWDvfzg9kNb4-STmDxo7VvtFUQe1Gn_mN_dFm1aeHLFZbPcRo7KkLVYe1K-IjUsTcBQLoOtclIc4m878_m7GWWee=s72-w400-h267-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4034078842975441367</id><published>2026-01-09T14:46:00.004-05:00</published><updated>2026-01-09T14:47:29.213-05:00</updated><title type='text'>Trusted CI Director contributes to oral history project</title><content type='html'>&lt;p class=&quot;mb-2 whitespace-pre-wrap&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgba(59, 130, 246, .5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 rgba(0,0,0,0); --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 rgba(0,0,0,0); --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 rgba(0,0,0,0); --tw-shadow: 0 0 rgba(0,0,0,0); --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-color: white; border-color: rgb(227, 227, 227); border-style: solid; border-width: 0px; box-sizing: border-box; color: #424242; margin: 1.25em 0px; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Trusted CI&#39;s Director Sean Peisert recently sat down with members of the &lt;span style=&quot;color: #212529; white-space-collapse: preserve-breaks;&quot;&gt;Charles Babbage Institute at the University of Minnesota and recorded an oral history for the &quot;Mining a Usable Past&quot; project&lt;/span&gt;. In this conversation, Peisert discusses his early interests at UCSD, his transition into computer science, and the mentors who influenced his career path.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;background-color: white; color: #424242; white-space-collapse: preserve;&quot;&gt;He al&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #424242; white-space-collapse: preserve;&quot;&gt;so shares valuable experiences from his time at the UCSD Supercomputer Center and outlines his current roles as a Research Scientist at Lawrence Berkeley National Laboratory and an Adjunct Professor at UC Davis, highlighting the importance of collaboration in the field of &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #424242; white-space-collapse: preserve;&quot;&gt;computer security.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Feel free to listen to his full interview on the &lt;a href=&quot;https://conservancy.umn.edu/items/e076d479-b49e-4fe0-971b-315d9865b174&quot; target=&quot;_blank&quot;&gt;University Digital Conservancy&#39;s website.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7xv75uNPeb5u40J6tActxUoCcsrZ98DHTHc0wsSQIoCgXfV74ZAqEORlAKc5PygnDzXgTRC5Z5F1vzU-QRUoTR4Q-zZAf0o5bTpn4vFgNCFrvWMGQiGFZXN_Bk6u67BbCQEWlO2hqT6s1xdusKwejxH9MELMUMIZOu1-Ev5UM_bSNsNQ7PcXbkb2dhsc/s677/sean.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;453&quot; data-original-width=&quot;677&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7xv75uNPeb5u40J6tActxUoCcsrZ98DHTHc0wsSQIoCgXfV74ZAqEORlAKc5PygnDzXgTRC5Z5F1vzU-QRUoTR4Q-zZAf0o5bTpn4vFgNCFrvWMGQiGFZXN_Bk6u67BbCQEWlO2hqT6s1xdusKwejxH9MELMUMIZOu1-Ev5UM_bSNsNQ7PcXbkb2dhsc/s320/sean.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;https://conservancy.umn.edu/items/e076d479-b49e-4fe0-971b-315d9865b174&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4034078842975441367'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4034078842975441367'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2026/01/peiserthistory.html' title='Trusted CI Director contributes to oral history project'/><author><name>Ingrid Ockert</name><uri>http://www.blogger.com/profile/13416426047919076418</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7xv75uNPeb5u40J6tActxUoCcsrZ98DHTHc0wsSQIoCgXfV74ZAqEORlAKc5PygnDzXgTRC5Z5F1vzU-QRUoTR4Q-zZAf0o5bTpn4vFgNCFrvWMGQiGFZXN_Bk6u67BbCQEWlO2hqT6s1xdusKwejxH9MELMUMIZOu1-Ev5UM_bSNsNQ7PcXbkb2dhsc/s72-c/sean.webp" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7797110503315524683</id><published>2025-12-10T16:31:00.002-05:00</published><updated>2025-12-10T16:34:06.802-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="NSF"/><category scheme="http://www.blogger.com/atom/ns#" term="operational technology"/><title type='text'>Ships, Winches, and Cybersecurity: Trusted CI at RVTEC</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZRW3Fae2RqGDFlCtW26v58Ce3i_Vxy2FDOflnSnpaSueo-Fsp3UOxP_FwLbHTbTO4N1jgK_VE3d7R19MpQqnwGxNsi4G67J2uIUxyNeYcLgSdGog5fwkTxnNFSniu64pxzA9t4lNFG9DCyZcQ8uNPjyPu2XvwTPu87vtHficoa0pIxAiTNcti1nFvcoy/s4032/RVTEC2025.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2268&quot; data-original-width=&quot;4032&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZRW3Fae2RqGDFlCtW26v58Ce3i_Vxy2FDOflnSnpaSueo-Fsp3UOxP_FwLbHTbTO4N1jgK_VE3d7R19MpQqnwGxNsi4G67J2uIUxyNeYcLgSdGog5fwkTxnNFSniu64pxzA9t4lNFG9DCyZcQ8uNPjyPu2XvwTPu87vtHficoa0pIxAiTNcti1nFvcoy/w400-h225/RVTEC2025.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;RVTEC attendees, Scripps Institution of Oceanography&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;In November, members of Trusted CI attended the &lt;a href=&quot;https://www.unols.org/event/meeting/unols-2025-rvtec-meeting&quot;&gt;2025 UNOLS RVTEC Meeting&lt;/a&gt; in La Jolla, CA. The RVTEC (Research Vessel Technical Enhancement Committee) Meeting, “brings together marine technicians, engineers, and vessel operators from the U.S. Academic Research Fleet (ARF) and other agencies to share knowledge, advance best practices, and collaborate on technical solutions.”&lt;p&gt;&lt;/p&gt;&lt;p&gt;The team contributed to many of the sessions on Cyber Monday, including a cybersecurity update from the Academic Research Fleet, the Secure by Design &lt;a href=&quot;https://trustedci.org/ot-matrix&quot;&gt;Operational Technology Vendor Procurement Matrix&lt;/a&gt;, and how-tos on developing a cyber risk assessment, an incident response plan, and cyber-incident drills.&amp;nbsp;&lt;/p&gt;&lt;p&gt;During Mike Simpson’s presentation reviewing the 2025 activities of ARFSEC (the team that runs the fleet-wide cybersecurity program), he announced a new Ship Site Visit template that Trusted CI developed to collect information during NSF inspections of the ARF’s vessels. The purpose of the template is to document details about a vessel’s cybersecurity and cyberinfrastructure (CI) in order to identify what gaps might need attention. The template has been field tested during visits to the RV &lt;i&gt;Sikuliaq&lt;/i&gt;, the RV &lt;i&gt;Atlantic Explorer&lt;/i&gt;, the RV &lt;i&gt;Rachel Carson&lt;/i&gt;, and will be used in the inspection of the RV &lt;i&gt;Neil Armstrong&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;The template can be found here: &lt;a href=&quot;https://doi.org/10.5281/zenodo.17807879&quot;&gt;https://doi.org/10.5281/zenodo.17807879&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The 5-day meeting was packed with presentations, trainings, breakout sessions, and an impressive tour of the Scripps Nimitz Marine Facility.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Maritime vessels in the U.S. Academic Research Fleet are arguably the most complicated pieces of cyberinfrastructure in the NSF research infrastructure portfolio, and as such have complex and changing cybersecurity requirements. Trusted CI looks forward to continuing to support the ARF and the scientific progress that it enables.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAjxXrRWCUpr3tqSj0V9U3CDSOVmqhCfV9RNiK7Ag-EEcr86L8KMmjjcZJWEZqJN2z0TNOJTLEYyozZLJUNh_GGI2UW9Ja0Md3OLthfngOvlDNHgJnzEIzSA3A4XtLYnR33-7_Z0enlBUoPKtpNtqSs8pA_obXi7I580VygcIaeIB8B8UsxI2sBBxoucqD/s960/RVTEC_2025_SATNAG_UPDATE.pptx.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;960&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAjxXrRWCUpr3tqSj0V9U3CDSOVmqhCfV9RNiK7Ag-EEcr86L8KMmjjcZJWEZqJN2z0TNOJTLEYyozZLJUNh_GGI2UW9Ja0Md3OLthfngOvlDNHgJnzEIzSA3A4XtLYnR33-7_Z0enlBUoPKtpNtqSs8pA_obXi7I580VygcIaeIB8B8UsxI2sBBxoucqD/w400-h300/RVTEC_2025_SATNAG_UPDATE.pptx.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Slide from SatNAG update displaying CI resources available to the fleet&amp;nbsp;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiAkAP3mjguO9vE1v8cO8Rh-Duo0a6s6ru-y35xbGFK4EheB5VXq1ddIKQXsQV8K98aR1Gr4bXWFUodzw-TELeOy6bgKKb_3VSxkXJ-ix1KkpQwyGTnfUNRjhCqHyDIkVN8g29VB1GqdyC8glEUPXoUfbhyphenhyphen3v5czPzYNYDDd7jDBrMx4ZHsCFZa2fF3irx/s6000/DSC05934.JPG&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4000&quot; data-original-width=&quot;6000&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiAkAP3mjguO9vE1v8cO8Rh-Duo0a6s6ru-y35xbGFK4EheB5VXq1ddIKQXsQV8K98aR1Gr4bXWFUodzw-TELeOy6bgKKb_3VSxkXJ-ix1KkpQwyGTnfUNRjhCqHyDIkVN8g29VB1GqdyC8glEUPXoUfbhyphenhyphen3v5czPzYNYDDd7jDBrMx4ZHsCFZa2fF3irx/w400-h266/DSC05934.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Helm control panel on the R/V&amp;nbsp;&lt;i&gt;Sally Ride&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6J7P34OFLWKP4BFtXVfhXCnqsBmolt7RvHUq3ymsgVU5B3HQ3bjGSVjIj2NkgSGTZUl-Y3LCLxBbV7c8fXPe61W6qlHeKjnqq9K6x6xrgQ3uohYkg8Sp95OFa7EQjSgBN0MwHTHpPYbiQwWMpeJ37bvZAN28rvoVBWff1vJ3naBFIB6yn-PL-pRRkpZo9/s6000/DSC05920.JPG&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4000&quot; data-original-width=&quot;6000&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6J7P34OFLWKP4BFtXVfhXCnqsBmolt7RvHUq3ymsgVU5B3HQ3bjGSVjIj2NkgSGTZUl-Y3LCLxBbV7c8fXPe61W6qlHeKjnqq9K6x6xrgQ3uohYkg8Sp95OFa7EQjSgBN0MwHTHpPYbiQwWMpeJ37bvZAN28rvoVBWff1vJ3naBFIB6yn-PL-pRRkpZo9/w400-h266/DSC05920.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Test bench at the Shipboard Technical Support Calibration Lab&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMFjgbexjGQLtj-s7G0WdGEXoB9S011G2EEiDjTFDMF0WjesTQe3IVtkvKupISOG1Sbyu2wMPf8Hs6cZWFTVnV8e_xLeEke9NMF71gBFPz3JEp6BBmbs1YhLfWbcaaISIcnX70dBmbACX8_4Ni6y_AtoH1HkL7rjvcFFcvLxqSrQJsNG7ddRTbQOwZNZet/s6000/DSC05910.JPG&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4000&quot; data-original-width=&quot;6000&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMFjgbexjGQLtj-s7G0WdGEXoB9S011G2EEiDjTFDMF0WjesTQe3IVtkvKupISOG1Sbyu2wMPf8Hs6cZWFTVnV8e_xLeEke9NMF71gBFPz3JEp6BBmbs1YhLfWbcaaISIcnX70dBmbACX8_4Ni6y_AtoH1HkL7rjvcFFcvLxqSrQJsNG7ddRTbQOwZNZet/w400-h266/DSC05910.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;R/V&amp;nbsp;&lt;i&gt;Sally Ride&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7797110503315524683'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7797110503315524683'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/12/2025 RVTEC.html' title='Ships, Winches, and Cybersecurity: Trusted CI at RVTEC'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZRW3Fae2RqGDFlCtW26v58Ce3i_Vxy2FDOflnSnpaSueo-Fsp3UOxP_FwLbHTbTO4N1jgK_VE3d7R19MpQqnwGxNsi4G67J2uIUxyNeYcLgSdGog5fwkTxnNFSniu64pxzA9t4lNFG9DCyZcQ8uNPjyPu2XvwTPu87vtHficoa0pIxAiTNcti1nFvcoy/s72-w400-h225-c/RVTEC2025.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-616063584389368415</id><published>2025-10-21T12:31:00.000-04:00</published><updated>2025-10-21T12:31:22.657-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="solicitations"/><title type='text'>Leverage Trusted CI in your NSF Proposal</title><content type='html'>&lt;p&gt;NSF recently announced solicitations for both the &lt;a href=&quot;https://www.nsf.gov/funding/opportunities/idss-integrated-data-systems-services/nsf25-544/solicitation&quot; target=&quot;_blank&quot;&gt;Integrated Data Systems &amp;amp; Services (IDSS)&lt;/a&gt; and &lt;a href=&quot;https://www.nsf.gov/funding/opportunities/nairr-oc-foundations-operating-national-artificial-intelligence/nsf25-546/solicitation&quot; target=&quot;_blank&quot;&gt;NAIRR Operations&lt;/a&gt; programs.&lt;/p&gt;&lt;p&gt;“The Integrated Data Systems and Services (IDSS) program supports operations-level national-scale cyberinfrastructure systems and services that broadly advance and facilitate open, data-intensive and artificial intelligence-driven science and engineering research, innovation, and education.” Proposals to this solicitation (NSF 25-544) are due by December 4.&lt;/p&gt;&lt;p&gt;The NAIRR-OC solicitation seeks proposals to establish a community-based organization that will be responsible for the foundational visioning, coordination, operations, and development activities in support of an integrated national infrastructure for AI research and education. The resulting award would advance the National Artificial Intelligence Research Resource (NAIRR) vision for a public-private partnership to accelerate AI innovation and national competitiveness. Letters of intent for this solicitation (NSF 25-546) are due by December 15.&lt;/p&gt;&lt;p&gt;Trusted CI offers the following suggestions to engage us in these areas:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Identify and utilize Trusted CI resources.&lt;/b&gt; The Trusted CI &lt;a href=&quot;https://www.trustedci.org/framework&quot; target=&quot;_blank&quot;&gt;Framework&lt;/a&gt; provides recommendations and templates for establishing and maintaining cybersecurity programs. Our &lt;a href=&quot;https://www.trustedci.org/trainingmaterials&quot; target=&quot;_blank&quot;&gt;online training materials&lt;/a&gt; and &lt;a href=&quot;https://www.trustedci.org/webinars&quot; target=&quot;_blank&quot;&gt;webinars&lt;/a&gt; cover many cybersecurity topics tailored to the NSF cyberinfrastructure community. Our &lt;a href=&quot;https://www.trustedci.org/summit&quot; target=&quot;_blank&quot;&gt;annual cybersecurity summit&lt;/a&gt; provides a venue for training sessions for cybersecurity practitioners, technical leaders, and risk owners from within the NSF Major Facilities, Mid-Scales, and broader NSF research cyberinfrastructure community.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Indicate your intent to approach Trusted CI. &lt;/b&gt;We invite proposing NSF research cyberinfrastructure projects to indicate their intention to approach Trusted CI once they are funded. Trusted CI resources and staff are available to assist NSF projects with cybersecurity plans and training, via consultations and other Trusted CI activities. Proposers are free to include language showing an awareness of cybersecurity of a specific issue and showing you are aware of Trusted CI, how we can help, and that you plan to approach us if funded to collaborate on addressing the issue. You can do this unilaterally without any commitment from Trusted CI (and please be aware it does not commit Trusted CI, we do our best to help all NSF projects, but are subject to our own resource availability).&amp;nbsp; We ask that you let us know if you reference Trusted CI this way to help us plan ahead.&lt;/p&gt;&lt;p&gt;Possible language to include in a proposal:&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Our proposal team recognizes [that cybersecurity is important for the effort we are undertaking | we have a cybersecurity challenge with regards to XXX]. To address this issue we plan to approach Trusted CI, the NSF Cybersecurity Center of Excellence (trustedci.org). Trusted CI engages projects such as the one we propose to help them address cybersecurity challenges and maintain the trustworthy nature of the computational science we support. We understand that engagements with Trusted CI are collaborative and have budgeted resources in our project to work with Trusted CI on our challenge.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;Include Trusted CI as a funded partner in your proposal. &lt;/b&gt;You can include one or more of the institutions that compose Trusted CI (IU, LBNL, UIUC/NCSA, PSC, University of Wisconsin-Madison, Arizona State University, Sustainable Horizons Institute) via a subcontract on your proposal, a process that provides a firm commitment of our participation. Please contact us to discuss which partner would be most appropriate, whether the commitment would be exclusive for a given solicitation, and the level of effort that would be involved. In this case, we would provide a custom letter of collaboration indicating our agreement to the terms of the subcontract.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Including Trusted CI in other ways. &lt;/b&gt;The above are examples and we are open to discussions on other collaborations not listed. If you are preparing a proposal and would like additional assistance from Trusted CI, don&#39;t hesitate to contact us to discuss how Trusted CI can help.&lt;/p&gt;&lt;p&gt;More information can be found here: &lt;a href=&quot;https://www.trustedci.org/includingtrustedci&quot;&gt;https://www.trustedci.org/includingtrustedci&lt;/a&gt;. Please reach out to us at info@trustedci.org&amp;nbsp;with any questions.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/616063584389368415'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/616063584389368415'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/10/leverage-trusted-ci-in-your-nsf-proposal.html' title='Leverage Trusted CI in your NSF Proposal'/><author><name>Kelli Shute</name><uri>http://www.blogger.com/profile/08611415753623346274</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-595282362673151843</id><published>2025-10-15T14:59:00.185-04:00</published><updated>2025-10-15T17:22:49.728-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="earthscope"/><category scheme="http://www.blogger.com/atom/ns#" term="engagements"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="science"/><title type='text'>Trusted CI Ambassador Engagement at the EarthScope Retreat</title><content type='html'>&lt;p&gt;Earth’s movements tell a story, from shifting tectonic plates to subtle tremors beneath the Earth’s surface; movements that uncover the Earth’s ever-changing dynamics. Understanding that story requires precise, continuous measurements, and &lt;a href=&quot;https://www.earthscope.org/&quot;&gt;EarthScope&lt;/a&gt; provides the infrastructure to make this possible. The facility supports transformative research and education in the geosciences, offering a global community of scientists and educators access to instrumentation, observations, and infrastructure that help decode the physical processes of our planet.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;In September 2025, Trusted CI Ambassador Megha Moncy attended the EarthScope Data Services Retreat in Warwick, Rhode Island, spending three engaging days with the dedicated staff. At the retreat, she had the chance to meet the Data Services team face-to-face and share insights on how Trusted CI supports NSF facilities. She connected with researchers, managers, and leadership, gaining a deeper understanding of EarthScope and exploring practical ways to integrate cybersecurity into day-to-day operations.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Bridging Science and Cybersecurity&lt;/h3&gt;&lt;p&gt;As part of her ongoing Ambassador engagement, which includes regular check-ins with Rob Casey, Moncy serves as a liaison between EarthScope and the broader Trusted CI team. She connects the facility with the right cybersecurity expertise, offering guidance on information security, risk management, and other security needs tailored to support the facility’s mission. Building on this ongoing work, the retreat provided an ideal setting for Moncy to highlight how smart, mission-focused cybersecurity can enable groundbreaking scientific work and support EarthScope’s research effectively.&amp;nbsp;&lt;br /&gt;
&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDa13cI4IX7gjiOBapJ6vuoOpICF0zI9YoeDCCaetzLAlTleV8iqoAoB3SgyOvsDbsKCVfG-YfaLprJEQlepMezfsC8_2soDplO_M_0IAFP0Mubz_C5xaINITOEUwODTB4Ychyphenhyphenn_5HLt6CZ9urn93opjI_mxrYLdxDyvGgr1daVGavQtVD7P_Q9TfH/s4032/IMG_5584.jpg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;auto&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDa13cI4IX7gjiOBapJ6vuoOpICF0zI9YoeDCCaetzLAlTleV8iqoAoB3SgyOvsDbsKCVfG-YfaLprJEQlepMezfsC8_2soDplO_M_0IAFP0Mubz_C5xaINITOEUwODTB4Ychyphenhyphenn_5HLt6CZ9urn93opjI_mxrYLdxDyvGgr1daVGavQtVD7P_Q9TfH/s320/IMG_5584.jpg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot; width=&quot;300&quot;&gt;Megha Moncy, Trusted CI Ambassador to EarthScope presenting cybersecurity insights to the EarthScope team.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;During her 30-minute session, Moncy presented Trusted CI’s core mission and the need for helping research facilities find the sweet spot between pushing the boundaries of science and managing cybersecurity risk. From there, she guided attendees through the &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt;’s four pillars, Mission Alignment, Governance, Resources, and Controls; demonstrating how each pillar provides practical guidance to strengthen security while supporting the facility’s scientific mission. The session also explored the challenges and opportunities of securing operational technology (OT) and Internet of things (IoT) - enabled instruments. Moncy also highlighted the “Secure by Design” approach, explaining how building security into systems from the start can prevent problems that would be much harder to fix later.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Beyond her formal presentation, Moncy participated in team-building activities and lunches with leadership and management. These moments allowed informal conversations about cybersecurity priorities, potential collaborations, and the ways Trusted CI can support EarthScope’s mission. Amid the retreat, some exciting news arrived: EarthScope Consortium received the much awaited &lt;a href=&quot;https://ngf.earthscope.org/&quot;&gt;National Geophysical Facility (NGF) award&lt;/a&gt;, opening the door to expanded resources and new opportunities, including for strengthening cybersecurity across the facility.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Reflections from the Retreat&lt;/h3&gt;&lt;p&gt;Attending the EarthScope retreat gave Moncy the opportunity to connect with staff and gain an up-close view of the inner workings of a major geophysical facility. She observed a team deeply committed to advancing Earth science and was able to share insights on how Trusted CI’s guidance and services can help strengthen the security and resilience of that work. She is especially grateful to Rob Casey for the invitation to participate, to the organizers who made the retreat run so smoothly, and to the EarthScope staff whose engagement, curiosity, and energy made the three days fly by. The experience left her inspired by the team’s dedication and the collaborative spirit that drives discovery at EarthScope, and she looks forward to many more opportunities to work together.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/595282362673151843'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/595282362673151843'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/10/trusted-ci-ambassador-engagement-at.html' title='Trusted CI Ambassador Engagement at the EarthScope Retreat'/><author><name>Megha Moncy</name><uri>http://www.blogger.com/profile/12910477341970511660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDa13cI4IX7gjiOBapJ6vuoOpICF0zI9YoeDCCaetzLAlTleV8iqoAoB3SgyOvsDbsKCVfG-YfaLprJEQlepMezfsC8_2soDplO_M_0IAFP0Mubz_C5xaINITOEUwODTB4Ychyphenhyphenn_5HLt6CZ9urn93opjI_mxrYLdxDyvGgr1daVGavQtVD7P_Q9TfH/s72-c/IMG_5584.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7328016094560684941</id><published>2025-10-01T12:38:00.002-04:00</published><updated>2025-10-13T19:03:19.586-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Ocean Sciences"/><title type='text'>Safely Steering Scientific Progress on the High Seas</title><content type='html'>&lt;p&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Modern cars are like computers on wheels. From the dashboard displays to the steering wheel and even your car keys, a complex dance of computer parts and mechanical components work together to keep you safe and on the road. Today’s maritime ships are a similar blend of machinery and software. From computers to networks and satellites, the modern ship purrs with an electronic hum, but also includes more mechanical tools like winches, cranes,&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; engines, and bilge pumps. But the very same seamless systems that help ships run smoothly can be compromised. &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Like cars, ships must be protected against potential hackers and other malicious actors.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-ba59c58e-7fff-d733-5326-03924ea46dea&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlk50tF23nAvGboa6UQ8_wCjsUuR67umBJrKapp1vNXq76_5XJAesdvUuem_8NTyxC3LIjCxzb6dFUwgxbpPFACVhv03ZU8qrB88tFUsqxbiAoM_Zffsyt6aynzeK_3Ve1NpY55Wn78ohTMqRzdVeim2BGXQuZgsxEB-bIiIhgCA2vhxrferzHbzOSwU/s5712/IMG_7957.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4284&quot; data-original-width=&quot;5712&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlk50tF23nAvGboa6UQ8_wCjsUuR67umBJrKapp1vNXq76_5XJAesdvUuem_8NTyxC3LIjCxzb6dFUwgxbpPFACVhv03ZU8qrB88tFUsqxbiAoM_Zffsyt6aynzeK_3Ve1NpY55Wn78ohTMqRzdVeim2BGXQuZgsxEB-bIiIhgCA2vhxrferzHbzOSwU/s320/IMG_7957.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span id=&quot;docs-internal-guid-5333fecc-7fff-a9bc-9179-1fe686712abe&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The R/V &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Sally Ride&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;, docked in Alameda, CA in 2024.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Trusted CI, the NSF Cybersecurity Center for Excellence, has been working with operators of research vessels across the United States to defend ships from cyberattacks. They have been supporting ships before construction on&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &quot;secure by design&quot; approaches as well as cybersecurity in research vessel operations. &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Research vessels are floating laboratories and instruments for landlocked researchers to gather information about what lies beneath the waves. The U.S. Academic Research Fleet includes 17 vessels, which are built with the finest electronics and observational instrumentation. They depend upon strict safety protocols to keep them safe.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;But as Sean Peisert, the director of Trusted CI explains, “&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;There are the experiments and equipment that are brought onboard, many of which also have digital and computing elements in them, making them potentially vulnerable to cybersecurity issues.”&amp;nbsp; The consequences of a successful cyberattack could range from loss of data in a scientific experiment to a ship being dead in the water without propulsion, with the implications ranging from loss of time and funding to dangers of the safety of those on board.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh8hYSzKDkXOyj9xJrl4vPvLWZnonq_74duSHeaq3I2WtT87uO3Se-_omQR_iOi9dXcC4ehWB01ZjjwPjkBLEfVt7h-wp432WlLUBHSiAZYpTpDkUwah1BlyqS96b6bh5fZ2HOrGoeK1MoLLtxdssvi5RXRtTx38l7IXAbss17CDZbwSX9QMMBuRLUF1TE&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;2306&quot; data-original-width=&quot;3786&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh8hYSzKDkXOyj9xJrl4vPvLWZnonq_74duSHeaq3I2WtT87uO3Se-_omQR_iOi9dXcC4ehWB01ZjjwPjkBLEfVt7h-wp432WlLUBHSiAZYpTpDkUwah1BlyqS96b6bh5fZ2HOrGoeK1MoLLtxdssvi5RXRtTx38l7IXAbss17CDZbwSX9QMMBuRLUF1TE&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;span id=&quot;docs-internal-guid-e933bd38-7fff-f0cc-e51e-d99e22936db5&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Trusted CI’s Sean Peisert prepares for an inspection of the R/V &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Sally Ride&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; in 2024.&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Cybersecurity for a ship isn’t easy. It’s hard enough just keeping a ship running without thinking about computers. Case in point, Trusted CI had plans to join a training cruise in 2024 that was cancelled due to weather conditions. These are the kinds of real-world issues that research vessel operators have to deal with on top of all of the computers and science equipment that makes research vessels so special and distinctive.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;In 2023, Trusted CI worked with experts in maritime operational technology at Scripps Institution of Oceanography and Oregon State University to develop &lt;/span&gt;&lt;a href=&quot;https://zenodo.org/records/15014703&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #1155cc; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;“The Operational Technology Procurement Vendor Matrix,”&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; a guide to ensure protection against cyberattacks by a proactive procurement process. &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Additionally, Trusted CI’s staff has been involved in visiting ships to better understand just how technology operates in real-world conditions.&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&amp;nbsp; Most recently, Trusted CI&#39;s visits have also included observation of ship inspections, which happen at regular intervals by the National Science Foundation, the U.S. Coast Guard, and the U.S. Navy.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;What happens during one of these ship inspections? &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Peisert says that when he visited the Office of Naval Research’s&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; R/V&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Sally Ride&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; for a National Science Foundation and US Navy / INSURV inspection, they examined the vessel’s in-port&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; and onboard elements. The inspection of the ship involved evaluating its performance while underway, including its engines, navigation equipment, and crew procedures, and verifying that it met Coast Guard requirements for communication and navigation, including a range of traditional and modern systems. A man-overboard drill was also conducted, including communications between the ship and the recovery team.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhmfG-OuasMMLdTQsaflXIlk8KMw6rywqRMtsUlIlUPPljJiHa4v-7oM570R-UJ7Uf9JBeRhxeufDPKawIXlsaYJ1r-6Xgc6qknZ8C1zeX6X6DyyPAdr5M8hzBRAxRIb5uubOU21ASfbW1ZX09ESqh-wY0Co5VaMfgX_EaJEseErytd31Easn6vPQfZrs8&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhmfG-OuasMMLdTQsaflXIlk8KMw6rywqRMtsUlIlUPPljJiHa4v-7oM570R-UJ7Uf9JBeRhxeufDPKawIXlsaYJ1r-6Xgc6qknZ8C1zeX6X6DyyPAdr5M8hzBRAxRIb5uubOU21ASfbW1ZX09ESqh-wY0Co5VaMfgX_EaJEseErytd31Easn6vPQfZrs8&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span id=&quot;docs-internal-guid-7d29d6d2-7fff-b1b8-239f-e52c0dee6bda&quot;&gt;&lt;span style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline;&quot;&gt;Trusted CI’s Dan Arnold, left, conferring with marine technicians on the R/V &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-size: 10pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline;&quot;&gt;Sally Ride&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline;&quot;&gt; in 2023.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;text-wrap-mode: nowrap;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The inspection wasn’t just limited to computer systems; inspectors also checked the state of the vessel&#39;s physical assets. “&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;It may be interesting to know that Coast Guard rules require not just satellite, modern GPS, and digital, topological navigation charts,” Peisert observes, “but that ships must also carry HF radios that can propagate for thousands of miles, as well as paper charts, and even a sextant for determining latitude.” &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Inspectors even conducted visual inspections of the ship’s overboard handling system (“A-Frame”) to check the metal for potentially corrosive rust.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;So far, the Trusted CI team has visited the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Office of Naval Research’s&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; R/V&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Sally Ride&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; and Oregon State University’s Hatfield Marine Science Center in Newport, Oregon, the future home port of the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;R/V&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Taani&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;. Team members Mike Simpson and Mikeal Jones were present for the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Office of Naval Research’s &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;R/V &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #222222; font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Thomas G. &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Thompson&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; inspection in September 2024. The Trusted CI team was also involved at the &lt;/span&gt;&lt;a href=&quot;https://www.unols.org/event/meeting/2024-rvtec-meeting&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #1155cc; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;RVTEC 2024 Meeting&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #1155cc; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;hosted by the University of New Hampshire in October 2024.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The Trusted CI team is currently preparing for upcoming collaborations with research vessel teams. Simpson and Jones will be present in October for the National Science Foundation Inspection of the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;R/V Atlantic Explorer&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; in Bermuda.&amp;nbsp; Another Trusted CI team member, Ishan Abhinit will be involved in the National Science Foundation inspection of the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;R/V Rachel Carson &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;this November. Finally, Mike Simpson will be involved in the National Science Foundation inspection of the &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; color: #222222; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Office of Naval Research’s &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;R/V&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-style: italic; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Armstrong&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; in December 2025.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; white-space-collapse: preserve;&quot;&gt;As for Trusted CI Director Peisert, he plans to join the crew of the R/V Sikulaq, operated by University of Alaska, Fairbanks, in the Spring. While on board, he plans to participate in a cyber-incident drill that will take place during the transit to exercise the crew&#39;s skills and procedures in responding to simulated cybersecurity threats while at sea. Peisert says, “Trusted CI looks forward to more of these visits going forward as it continues its ongoing support of the U.S. Academic Research Fleet to ensure that the vessels&#39; cybersecurity programs are as robust as possible for ensuring ship safety and the progress of the ocean science being conducted on the vessels.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;background-color: white; font-size: 11pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Stay tuned for more information about Trusted CI’s maritime activities. Want to check out the activities happening on land this fall? &lt;/span&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;We are hosting a ‘birds of a feather’ session at the&lt;/span&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #444746; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://trustedci.org/summit&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #1155cc; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;NSF Cybersecurity Summit&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #444746; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; and we will be presenting during&lt;/span&gt;&lt;a href=&quot;https://www.unols.org/event/meeting/2025-rvtec-meeting&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #1155cc; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #1155cc; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Cyber Monday at RVTEC&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; color: #444746; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; &lt;/span&gt;&lt;span face=&quot;Roboto, sans-serif&quot; style=&quot;background-color: white; font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;this November.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7328016094560684941'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7328016094560684941'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/10/researchvessels.html' title='Safely Steering Scientific Progress on the High Seas'/><author><name>Ingrid Ockert</name><uri>http://www.blogger.com/profile/13416426047919076418</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlk50tF23nAvGboa6UQ8_wCjsUuR67umBJrKapp1vNXq76_5XJAesdvUuem_8NTyxC3LIjCxzb6dFUwgxbpPFACVhv03ZU8qrB88tFUsqxbiAoM_Zffsyt6aynzeK_3Ve1NpY55Wn78ohTMqRzdVeim2BGXQuZgsxEB-bIiIhgCA2vhxrferzHbzOSwU/s72-c/IMG_7957.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7535931277190493446</id><published>2025-09-26T11:22:00.000-04:00</published><updated>2025-09-26T11:22:10.353-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fellows"/><category scheme="http://www.blogger.com/atom/ns#" term="NSF"/><title type='text'>Announcing the 2025 Trusted CI Fellowship!</title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;Aptos&amp;quot;,sans-serif; font-size: 13.5pt; mso-ansi-language: EN-US; mso-bidi-font-family: Aptos; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;&quot;&gt;Trusted CI, the NSF Cybersecurity Center of Excellence, is proud to
announce the 2025 Trusted CI Fellowship recipients!&lt;/span&gt;&lt;/p&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; role=&quot;presentation&quot; style=&quot;border-collapse: collapse; min-width: 100%; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184; width: 100%;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;padding: 0.25in 0in;&quot;&gt;&lt;div class=&quot;attributed-text-segment-list__container relative mt-1 mb-1.5 babybear:mt-0 babybear:mb-0.5&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto; border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 8px 0px 12px; padding: 0px; position: relative; vertical-align: baseline;&quot;&gt;&lt;p class=&quot;attributed-text-segment-list__content text-color-text !text-sm whitespace-pre-wrap break-words
        &quot; data-test-id=&quot;main-feed-activity-card__commentary&quot; dir=&quot;ltr&quot; style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto; border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; font-size: 14px !important; line-height: 1.5; margin: 0px; overflow-wrap: break-word; padding: 0px; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;We have selected ten individuals with professional interests in cybersecurity from a competitive national pool. These Fellows represent a wide range of institutions, disciplines, and experiences, united by a shared commitment to advancing cybersecurity in their communities in support of trustworthy open science.

Throughout their Fellowship year, the Fellows will receive:
* Recognition for their contributions to cybersecurity in the open science community.
* Professional development opportunities, including specialized training.
* Full travel support to participate in the 2025 NSF Cybersecurity Summit in Boulder, CO (October 20-23).

Trusted CI looks forward to supporting their journey and seeing the impact they will make in strengthening the security of scientific cyberinfrastructure.&lt;/p&gt;&lt;p class=&quot;attributed-text-segment-list__content text-color-text !text-sm whitespace-pre-wrap break-words
        &quot; data-test-id=&quot;main-feed-activity-card__commentary&quot; dir=&quot;ltr&quot; style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto; border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; font-size: 14px !important; line-height: 1.5; margin: 0px; overflow-wrap: break-word; padding: 0px; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;
Please join us in congratulating the 2025 Trusted CI Fellows! 

Learn more about our Fellows on our website: &lt;a class=&quot;link&quot; data-tracking-control-name=&quot;public_post-text&quot; data-tracking-will-navigate=&quot;&quot; href=&quot;https://www.trustedci.org/2025-fellows&quot; rel=&quot;nofollow&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto; border-color: rgb(10, 102, 194); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; color: #0a66c2; font-weight: 600; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;&quot; target=&quot;_self&quot;&gt;https://www.trustedci.org/2025-fellows&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;ul class=&quot;grid grid-cols-6 grid-rows-[60%_40%] w-main-feed-card-media feed-images-content list-none pl-0
          
          &quot; data-test-id=&quot;feed-images-content&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto; border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.9); display: grid; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; grid-template-columns: repeat(6, minmax(0px, 1fr)); grid-template-rows: 60% 40%; list-style: none; margin: 0px 0px 0px -16px; padding: 0px; vertical-align: baseline; width: calc(100% + 32px);&quot;&gt;&lt;li class=&quot;bg-color-background-container-tint text-[0px]
                  col-span-full row-span-full 
                  
                  
                  &quot; data-position=&quot;0&quot; data-test-id=&quot;feed-images-content__list-item&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background: none 0% 0% / auto repeat scroll padding-box border-box rgb(245, 247, 249); border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; font-size: 0px; grid-area: 1 / 1 / -1 / -1; margin: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;No alternative text description for this image&quot; aria-busy=&quot;false&quot; class=&quot;w-full object-cover object-center h-full babybear:max-h-[400px] lazy-loaded&quot; data-ghost-url=&quot;https://static.licdn.com/aero-v1/sc/h/921ynb2z53z33mhm3061qvjag&quot; src=&quot;https://media.licdn.com/dms/image/v2/D5622AQECByESefS4Pg/feedshare-shrink_1280/B56ZmB6pMdI4As-/0/1758821258509?e=2147483647&amp;amp;v=beta&amp;amp;t=TwNzPj7pYc_qdxVfnfWCMHYMWMBNLYjEoCNWeCfT-dE&quot; style=&quot;--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 #0000; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-skew-x: 0; --tw-skew-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; background: none 0% 0% / auto repeat scroll padding-box border-box rgba(0, 0, 0, 0); border-color: rgba(0, 0, 0, 0.9); border-image: none 100% / 1 / 0 stretch; border-style: none; border-width: 0px; box-sizing: border-box; height: 514.688px; margin: 0px; object-fit: cover; object-position: center center; opacity: 1; outline: rgba(0, 0, 0, 0.9) none 0px; padding: 0px; transition-duration: 336ms; transition-property: opacity; transition-timing-function: cubic-bezier(0.34, 0, 0.21, 1); vertical-align: baseline; width: 614px;&quot; /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;table align=&quot;left&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; role=&quot;presentation&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-table-anchor-horizontal: column; mso-table-anchor-vertical: paragraph; mso-table-left: left; mso-table-lspace: 2.25pt; mso-table-rspace: 2.25pt; mso-yfti-tbllook: 1184; width: 100%;&quot;&gt;&lt;tbody&gt;
  &lt;/tbody&gt;&lt;/table&gt;
&lt;!--End: Text--&gt;&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;display: none; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hide: all;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7535931277190493446'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7535931277190493446'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/09/announcing-2025-trusted-ci-fellowship.html' title='Announcing the 2025 Trusted CI Fellowship!'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-2448088768864854186</id><published>2025-09-22T10:04:00.000-04:00</published><updated>2025-09-22T10:04:31.772-04:00</updated><title type='text'>NSF Cybersecurity Summit | Extended Hotel Block Deadlines – Book Now!</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;Planning to attend this year&#39;s&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;https://www.trustedci.org/2025-nsf-cybersecurity-summit&quot; target=&quot;_blank&quot;&gt;NSF
Cybersecurity Summit&lt;/a&gt;&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;in Boulder, CO&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;Great news — the hotel room
block deadlines have been extended!&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Verdana&amp;quot;,sans-serif; font-size: 10.0pt;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;a href=&quot;https://www.marriott.com/event-reservations/reservation-link.mi?id=1734457162219&amp;amp;key=GRP&amp;amp;guestreslink2=true&amp;amp;app=resvlink&quot; target=&quot;_blank&quot;&gt;Boulder Marriott &amp;amp; Residence Inn&lt;/a&gt;&lt;br /&gt;
&lt;/b&gt;&amp;nbsp;Book by&amp;nbsp;&lt;b&gt;Tomorrow, September 23,&lt;/b&gt;&amp;nbsp;to secure your group
discount.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Verdana&amp;quot;,sans-serif; font-size: 10.0pt;&quot;&gt;&amp;nbsp;&lt;b&gt;&lt;a href=&quot;https://www.hilton.com/en/attend-my-event/nsf-cybersecurity-rooms/&quot; target=&quot;_blank&quot;&gt;Hilton Garden Inn&lt;/a&gt;&lt;br /&gt;
&lt;/b&gt;&amp;nbsp;Book by&amp;nbsp;&lt;b&gt;Friday, September 26,&lt;/b&gt;&amp;nbsp;to secure your group discount.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2448088768864854186'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2448088768864854186'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/09/nsf-cybersecurity-summit-extended-hotel.html' title='NSF Cybersecurity Summit | Extended Hotel Block Deadlines – Book Now!'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4655377941814172974</id><published>2025-09-09T11:58:00.003-04:00</published><updated>2025-09-09T11:58:58.453-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secure coding"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: No Harness, No Problem: Extending Fuzzing’s Reach via Oracle-guided Harness Generation, Monday September 22nd @ 10am Central</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5edmzWAHKLKkWI_gJ_vEmbt_-u-I_MQN7gTnzlcCoHo0E22JplIi0Nnq6zOFmf3hWUL2yHmPoEvmKX8vH4sSum4JzoJ8kOrfOKEVBbwV1OvSSUtYxAAkLPHg5Vgz4Kr4e-Dj7cBfnTdUoHQQYzZUBfDrboW3FSae61rkFK6ATrvr2dopRdff7uoZ2qHpc/s2312/webinar_nagy.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2312&quot; data-original-width=&quot;1720&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5edmzWAHKLKkWI_gJ_vEmbt_-u-I_MQN7gTnzlcCoHo0E22JplIi0Nnq6zOFmf3hWUL2yHmPoEvmKX8vH4sSum4JzoJ8kOrfOKEVBbwV1OvSSUtYxAAkLPHg5Vgz4Kr4e-Dj7cBfnTdUoHQQYzZUBfDrboW3FSae61rkFK6ATrvr2dopRdff7uoZ2qHpc/s320/webinar_nagy.png&quot; width=&quot;238&quot; /&gt;&lt;/a&gt;&lt;/div&gt;University of Utah&#39;s Stefan Nagy is presenting the talk, &lt;i&gt;No Harness, No Problem: Extending Fuzzing’s Reach via Oracle-guided Harness Generation,&lt;/i&gt; on Monday September 22nd at &lt;b&gt;10am, Central time.&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_9_SlpqK_ToCKc8O8lNg4vQ&quot;&gt;register here&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;margin-left: 40px; text-align: left;&quot;&gt;As NIST estimates that today&#39;s software contains up to 25 bugs per 1,000 lines of code, the prompt discovery of exploitable flaws is now crucial to mitigating the next big cyberattack. Over the last decade, the software industry mitigated increasing complexity by turning to a lightweight approach known as fuzzing: automated testing that uncovers program bugs through repeated injection of randomly-mutated test cases. Academia and industry have extensively studied fuzzing&#39;s three main challenges—input generation, program feedback collection, and, most critically, code harnessing—accelerating fuzzing to find many more vulnerabilities in less time. However, the critical nature of scientific computing—multi-purpose software toolkits, bespoke APIs, and high-performance environments—demands analogous advances in the vetting of scientific cyberinfrastructure.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;In this talk, I will showcase my group&#39;s research on automatic code harnessing, a key step toward making fuzzing scalable to today&#39;s complex scientific libraries. First, I will introduce our core approach Oracle-guided Harnessing: a technique that mutationally constructs and refines fuzzing harnesses using only library headers, validated through correctness oracles spanning compilation, execution, and coverage. Next, I will discuss our extensions of this approach to the C and Python library ecosystems, where it has uncovered over 70 previously-unknown security vulnerabilities and logical bugs across widely-used codebases. Finally, I will outline my vision for synergistic harnessing techniques that combine emergent large-language-model–driven methods with our Oracle-guided strategies, charting a path toward fully automatic, broadly applicable, and error-free harnessing.&lt;/div&gt;&lt;p&gt;Speaker Bio:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://users.cs.utah.edu/~snagy/&quot;&gt;Dr. Stefan Nagy&lt;/a&gt; is an Assistant Professor in the Kahlert School of Computing at the University of Utah, where he directs the &lt;a href=&quot;https://futures.cs.utah.edu/&quot;&gt;FuTURES³ Lab&lt;/a&gt;. His work lies at the intersection of software engineering, computer systems, and security, with a focus on making automated vetting of software and systems more effective and efficient irrespective of kernel, architecture, and source code. His research frequently appears at top venues such as ICSE, USENIX Security, and ACM CCS, and has led to the discovery of more than 200 previously-unknown software bugs and security vulnerabilities (futures.cs.utah.edu/bugs). He holds a PhD from Virginia Tech and a BS from the University of Illinois at Urbana-Champaign.&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMJGk9QSaal_pJu_MwJ5F1M1E000-jmlFWEGCwclHBbfMSIfUR9EthVbG3Bro3Oj__0IHn3inQU-fOG7zIiWxIXygvYOuIvMzKW1tV8wGfap7eKK6cBSmOrqIASBwN3TeesroAGaciCj8vCF7CkNqdYJOlyypqKQkFiALyseDTJ51N5vtQZSAcruQxo3Sm/s851/bartk.jpeg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;---&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://www.trustedci.org/trustedci-email-lists?rq=lists&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4655377941814172974'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4655377941814172974'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/09/fuzzing.html' title='Trusted CI Webinar: No Harness, No Problem: Extending Fuzzing’s Reach via Oracle-guided Harness Generation, Monday September 22nd @ 10am Central'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5edmzWAHKLKkWI_gJ_vEmbt_-u-I_MQN7gTnzlcCoHo0E22JplIi0Nnq6zOFmf3hWUL2yHmPoEvmKX8vH4sSum4JzoJ8kOrfOKEVBbwV1OvSSUtYxAAkLPHg5Vgz4Kr4e-Dj7cBfnTdUoHQQYzZUBfDrboW3FSae61rkFK6ATrvr2dopRdff7uoZ2qHpc/s72-c/webinar_nagy.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-419956580787076902</id><published>2025-09-04T09:25:00.000-04:00</published><updated>2025-09-04T09:25:20.079-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'>Secure Your Hotel Room for the NSF Cybersecurity Summit Before September 19</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhp4n2osC9w5Bbzu6OCyH1KlAwq7gwDb4Wia3jkTifwAq6MzaV32w3Dqbfk1Iu7t6EAU0zm3M7Jfm6KulQEmdQECZsNfFNQXI7T2OWIRdRz319HxZyautHRrq4-gJ7JnQfB8tEie1Afaq7bAWzJFOyCQPTdwBuAMwHRrRjaXgwBWiigbVCaPVEn7h50xFs&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;391&quot; data-original-width=&quot;938&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhp4n2osC9w5Bbzu6OCyH1KlAwq7gwDb4Wia3jkTifwAq6MzaV32w3Dqbfk1Iu7t6EAU0zm3M7Jfm6KulQEmdQECZsNfFNQXI7T2OWIRdRz319HxZyautHRrq4-gJ7JnQfB8tEie1Afaq7bAWzJFOyCQPTdwBuAMwHRrRjaXgwBWiigbVCaPVEn7h50xFs&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;Time
is running out to book your hotel room for this year&#39;s &lt;a href=&quot;https://www.trustedci.org/2025-nsf-cybersecurity-summit&quot; title=&quot;Summit&quot;&gt;NSF Cybersecurity Summit&lt;/a&gt;&amp;nbsp;in Boulder, CO!&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-family: inherit; font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-family: inherit; font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;The
deadline to reserve your room at the discounted group rate is &lt;b&gt;September 19th&lt;/b&gt;,
and availability is limited.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-family: inherit; font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184; text-align: justify;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;padding: 0in;&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.trustedci.org/2025-nsf-cybersecurity-summit&quot;&gt;Reserve your hotel room&lt;o:p&gt;&lt;/o:p&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;/p&gt;

&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 12pt; text-align: left;&quot;&gt;This
annual Summit brings together cybersecurity practitioners, technical leaders,
and risk managers from the NSF Major Facilities and Cyberinfrastructure
community. Attendees will also include key stakeholders and thought leaders
from across the scientific and cybersecurity landscapes.&lt;/span&gt;&lt;/div&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;
There is still time to register for this year&#39;s Summit—the deadline is October
6.&amp;nbsp;If you have any questions or need assistance, please reach out to us.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;&amp;quot;Aptos&amp;quot;,sans-serif&quot; style=&quot;font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Aptos; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span face=&quot;Aptos, sans-serif&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184; text-align: justify;&quot;&gt;
 &lt;tbody&gt;&lt;tr&gt;
  &lt;td style=&quot;padding: 0in;&quot;&gt;
  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://web.cvent.com/event/da5a20cb-ef9b-40dd-8103-13ef5c4d56d7/summary&quot; target=&quot;_blank&quot;&gt;Register for this year&#39;s Summit&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;
  &lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;/div&gt;&lt;div style=&quot;font-size: 12pt; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;font-size: 12pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 12pt; text-align: left;&quot;&gt;We
hope to see you in Boulder!&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 12pt; text-align: left;&quot;&gt;Summit Organizing and Program Committee&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/419956580787076902'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/419956580787076902'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/09/secure-your-hotel-room-for-nsf.html' title='Secure Your Hotel Room for the NSF Cybersecurity Summit Before September 19'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhp4n2osC9w5Bbzu6OCyH1KlAwq7gwDb4Wia3jkTifwAq6MzaV32w3Dqbfk1Iu7t6EAU0zm3M7Jfm6KulQEmdQECZsNfFNQXI7T2OWIRdRz319HxZyautHRrq4-gJ7JnQfB8tEie1Afaq7bAWzJFOyCQPTdwBuAMwHRrRjaXgwBWiigbVCaPVEn7h50xFs=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4533492615174431210</id><published>2025-09-02T10:44:00.000-04:00</published><updated>2025-09-02T10:44:21.603-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity programs"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="mid-scales"/><title type='text'>Trusted CI Celebrates Sixth Cohort Graduation &amp; Opens Call for 2026 Engagement</title><content type='html'>&lt;p&gt;Trusted CI’s sixth Framework Cohort, “Foxtrot”, successfully completed the six-month program of training and workshop engagement focused on learning and applying the &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt;. The Cohort members entered the engagement with a commitment to adopting the Framework at their organizations. They then worked closely with Trusted CI to gather facility information and create validated self-assessments of their cybersecurity programs based on the Framework. Each organization also emerged with a draft Cybersecurity Program Strategic Plan (CPSP) identifying priorities and directions for further refining their cybersecurity programs. Foxtrot cohort included the following research-oriented organizations:&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;a href=&quot;http://almaobservatory.org/en/home/&quot;&gt;ALMA&lt;/a&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://sites.google.com/ucsd.edu/derconnect/home&quot;&gt;DERConnect&lt;/a&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.ucdavis.edu/&quot;&gt;UC Davis&lt;/a&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.usatlas.org/&quot;&gt;US ATLAS&lt;/a&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://zeus.engin.umich.edu/&quot;&gt;ZEUS&lt;/a&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB2ghGF4SzOrvXxP15corddE7qQahaetxV-ZkbI9GjNsK8GYtF5asF8GwIBfIw7BUGfT9CkPZyCAq7S4nSVN5B5a3tMV9f6Y87bPEBEF_tVEMrfDn-bp-Yaf5fcfRFCQ00XHmCKfWQvm56hNsD-8gpBHXU6qeIg87NlstuyqRtOjOeXXiMXvPYYFyIFkiE/s750/Foxtrot%20Cohort.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;image of logos of foxtrot participants; ALMA, DERConnect, UC Davis, US ATLAS, and ZEUS&quot; border=&quot;0&quot; data-original-height=&quot;300&quot; data-original-width=&quot;750&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB2ghGF4SzOrvXxP15corddE7qQahaetxV-ZkbI9GjNsK8GYtF5asF8GwIBfIw7BUGfT9CkPZyCAq7S4nSVN5B5a3tMV9f6Y87bPEBEF_tVEMrfDn-bp-Yaf5fcfRFCQ00XHmCKfWQvm56hNsD-8gpBHXU6qeIg87NlstuyqRtOjOeXXiMXvPYYFyIFkiE/w400-h160/Foxtrot%20Cohort.png&quot; title=&quot;Foxtrot Cohort&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;The foundation of the cohort program is the Trusted CI Framework. The Framework was created as a minimum standard for cybersecurity programs. In contrast to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity. For these organizations, the cohort was their first formal training in the Trusted CI Framework “Pillars” and “Musts” and how to apply these fundamental principles to assess their cybersecurity programs.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Feedback on the program from cohort participants has been strongly positive:&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;i&gt;&quot;Participating in the Trusted CI Cohort was an excellent experience and brought significant value to our team. As a research group working at the intersection of the power grid and renewable energy, cybersecurity is critical for both our daily operations and the broader transition to smarter, more connected technologies. The cohort facilitators provided expert guidance and a practical framework that helped us clarify our cybersecurity risks, baseline controls, stakeholder responsibilities, and more. Through their collaborative and thorough approach, we developed an actionable, strategic plan and gained a holistic understanding of our security posture. With this training, we feel empowered and better prepared to implement a robust cybersecurity program, strengthening both our research and industry collaborations.&quot;&lt;/i&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;-&amp;nbsp;&lt;b&gt;Keaton Chia, R&amp;amp;D Engineer and Project Manager, DERConnect&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;b&gt;2026 Framework Cohort Call for Participation Open&lt;/b&gt;&lt;/h3&gt;&lt;p&gt;Trusted CI has a few spots left for the 2026 Framework Cohort engagement (starting January 2026). To learn more or to submit the interest form for your organization, visit&amp;nbsp;&lt;a href=&quot;http://www.trustedci.org/framework/cohort-participation&quot;&gt;trustedci.org/framework/cohort-participation&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Engagement with RISC&lt;/b&gt;&lt;/h3&gt;&lt;p&gt;Concurrent with leading Foxtrot, Trusted CI continued quarterly engagement with graduates of the five previous Framework cohorts through the &lt;a href=&quot;https://www.trustedci.org/risc&quot;&gt;Research Infrastructure Security Community (RISC)&lt;/a&gt;. Trusted CI established RISC as a community of practice to provide a forum for cohort graduates to expand their cybersecurity knowledge, share experiences, and build relationships within the NSF research cyberinfrastructure community.&lt;/p&gt;&lt;p&gt;For more information, please contact us at &lt;a href=&quot;mailto:framework@trustedci.org&quot;&gt;framework@trustedci.org&lt;/a&gt;.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4533492615174431210'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4533492615174431210'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/09/trusted-ci-celebrates-sixth-cohort.html' title='Trusted CI Celebrates Sixth Cohort Graduation &amp; Opens Call for 2026 Engagement'/><author><name>Cory Gleyze</name><uri>http://www.blogger.com/profile/11345984305466019128</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB2ghGF4SzOrvXxP15corddE7qQahaetxV-ZkbI9GjNsK8GYtF5asF8GwIBfIw7BUGfT9CkPZyCAq7S4nSVN5B5a3tMV9f6Y87bPEBEF_tVEMrfDn-bp-Yaf5fcfRFCQ00XHmCKfWQvm56hNsD-8gpBHXU6qeIg87NlstuyqRtOjOeXXiMXvPYYFyIFkiE/s72-w400-h160-c/Foxtrot%20Cohort.png" height="72" width="72"/><georss:featurename>Bloomington, IN, USA</georss:featurename><georss:point>39.169574 -86.5385549</georss:point><georss:box>10.859340163821152 -121.6948049 67.47980783617885 -51.382304899999994</georss:box></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-8390799441928215964</id><published>2025-08-18T08:04:00.003-04:00</published><updated>2025-08-18T08:04:54.502-04:00</updated><title type='text'>Registration now open:  2025 NSF Cybersecurity Summit – October 20–23 in Boulder, CO</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ6xTyQOel9uidUA3-Gb3QBF3FySZF2JehEadlO6xBGjNSCM4Zn7DETpDTujvzkpQ3KOBDTn7mwtavrHeVKWaA5bCTBs_5arNDuczQf8TSetruZu-KydZLwMkKwFN0KvghznJ6_Dw3gmrTe4vAJ0YxaCFCXRO04ZV3mYtA7lozqE26UThPMiLtmzKqmBY/s8002/NSF_Cybersecurity-Summit-2025_banner.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2501&quot; data-original-width=&quot;8002&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ6xTyQOel9uidUA3-Gb3QBF3FySZF2JehEadlO6xBGjNSCM4Zn7DETpDTujvzkpQ3KOBDTn7mwtavrHeVKWaA5bCTBs_5arNDuczQf8TSetruZu-KydZLwMkKwFN0KvghznJ6_Dw3gmrTe4vAJ0YxaCFCXRO04ZV3mYtA7lozqE26UThPMiLtmzKqmBY/s320/NSF_Cybersecurity-Summit-2025_banner.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;We’re
excited to announce that &lt;/span&gt;&lt;b style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;registration is now open&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt; for the &lt;/span&gt;&lt;b style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;2025 NSF
Cybersecurity Summit&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;, taking place &lt;/span&gt;&lt;b style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;October 20–23, 2025&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;, at the &lt;/span&gt;&lt;b style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;UCAR
Center Green Campus and NSF NCAR&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt; in &lt;/span&gt;&lt;b style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;Boulder, Colorado&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;This
annual Summit brings together cybersecurity practitioners, technical leaders,
and risk managers from the NSF Major Facilities and Cyberinfrastructure
community. Attendees will also include key stakeholders and thought leaders
from across the scientific and cybersecurity landscapes.&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Segoe UI Emoji&amp;quot;,sans-serif;&quot;&gt;🔹&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;,sans-serif;&quot;&gt; &lt;b&gt;&lt;a href=&quot;https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.trustedci.org%2F2025-nsf-cybersecurity-summit&amp;amp;data=05%7C02%7Cdborecky%40iu.edu%7C2674daaf2f904871ff1e08ddde4da612%7C1113be34aed14d00ab4bcdd02510be91%7C1%7C0%7C638911147370238525%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=jGGNqeccwqbpLyjhUBrKvkNOEZJPPttMpTfIOhZwF%2FM%3D&amp;amp;reserved=0&quot;&gt;Explore
the 2025 Program&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
Check out this year’s engaging sessions and speakers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Segoe UI Emoji&amp;quot;,sans-serif;&quot;&gt;🔹&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.cvent.com%2Fevent%2Fda5a20cb-ef9b-40dd-8103-13ef5c4d56d7%2Fsummary&amp;amp;data=05%7C02%7Cdborecky%40iu.edu%7C2674daaf2f904871ff1e08ddde4da612%7C1113be34aed14d00ab4bcdd02510be91%7C1%7C0%7C638911147370269185%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=tb%2B9XgybmtQkK40lFr6gWvcfD%2BVklDQWXjc69BYUEZs%3D&amp;amp;reserved=0&quot;&gt;
&lt;b&gt;Register to Attend&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
Please complete your registration by &lt;b&gt;October 6, 2025&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Segoe UI Emoji&amp;quot;,sans-serif;&quot;&gt;🔹&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;,sans-serif;&quot;&gt; &lt;b&gt;&lt;a href=&quot;https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftrustedci.org%2Fsummit%23hotel-info&amp;amp;data=05%7C02%7Cdborecky%40iu.edu%7C2674daaf2f904871ff1e08ddde4da612%7C1113be34aed14d00ab4bcdd02510be91%7C1%7C0%7C638911147370284328%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=b7z623iEfIDdfrvBlgvfytXcMyvUoHKEeNI%2BPlJmTaM%3D&amp;amp;reserved=0&quot;&gt;Plan
Your Stay&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
Trusted CI has secured hotel accommodations for Summit attendees.&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;,sans-serif;&quot;&gt;If you
have any questions, please don’t hesitate to reach out. Please send an email to
&lt;a href=&quot;mailto:summit@trustedci.org?&quot; target=&quot;_blank&quot;&gt;summit@trustedci.org&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial Narrow&amp;quot;, sans-serif;&quot;&gt;We look
forward to seeing you in Boulder this October!&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8390799441928215964'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8390799441928215964'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/08/registration-now-open-2025-nsf.html' title='Registration now open:  2025 NSF Cybersecurity Summit – October 20–23 in Boulder, CO'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ6xTyQOel9uidUA3-Gb3QBF3FySZF2JehEadlO6xBGjNSCM4Zn7DETpDTujvzkpQ3KOBDTn7mwtavrHeVKWaA5bCTBs_5arNDuczQf8TSetruZu-KydZLwMkKwFN0KvghznJ6_Dw3gmrTe4vAJ0YxaCFCXRO04ZV3mYtA7lozqE26UThPMiLtmzKqmBY/s72-c/NSF_Cybersecurity-Summit-2025_banner.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1852852779825729768</id><published>2025-08-10T13:54:00.001-04:00</published><updated>2025-08-10T13:54:08.198-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: Securing Medical Imaging AI Models Against Adversarial Attacks, Monday August 25th @ 10am Central</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-BX-tM6ritpMm13TG5QHo_SQlMp8HEQu_mWEJKatCXBreCJP87Ha24UOAR1x85A9BZ5ElnIKAbMnESEiZVe-1WYN1L22ulbPbTjPXRmhIWShvS2tP7mcwkEsEGkSI4ut6AMCVy9QFFwRIHcjedGhAdfcwJNPVRQxL0mzT7poMyFBhxTc66hnknz9ZUJfz/s487/Shandong_portrait.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;487&quot; data-original-width=&quot;390&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-BX-tM6ritpMm13TG5QHo_SQlMp8HEQu_mWEJKatCXBreCJP87Ha24UOAR1x85A9BZ5ElnIKAbMnESEiZVe-1WYN1L22ulbPbTjPXRmhIWShvS2tP7mcwkEsEGkSI4ut6AMCVy9QFFwRIHcjedGhAdfcwJNPVRQxL0mzT7poMyFBhxTc66hnknz9ZUJfz/w256-h320/Shandong_portrait.jpg&quot; width=&quot;256&quot; /&gt;&lt;/a&gt;&lt;/div&gt;University of Pittsburgh&#39;s Shandong Wu is presenting the talk, &lt;i&gt;Securing Medical Imaging AI Models Against Adversarial Attacks,&lt;/i&gt; on Monday August 25th at &lt;b&gt;10am, Central time.&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_URNI9UT0Rty2nZa14yBMcw&quot;&gt;register here&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;margin-left: 40px; text-align: left;&quot;&gt;While AI is increasingly present in clinical practice especially for medical imaging, it is imminent to ensure cybersecurity of imaging diagnostic AI models. Newly advanced adversarial attacks pose a threat to the safety of medical AI models, but little is known about the characteristics of this threat. Medical adversarial attacks may lead to serious consequences including patient harm, liability of healthcare providers, and other ethical issues or crimes. It is imperative to study this cybersecurity issue to mitigate potential negative consequences and to ensure safety of health care. In this talk, the speaker will discuss cyber vulnerabilities of deep learning-based medical imaging diagnosis models under adversarial attacks, show real-world experiments on how adversarial attacks can fool AI models to decrease diagnosis performance and to confuse experienced radiologists, and present several methods of defending adversarial attacks to secure AI models in medical imaging applications.&lt;/div&gt;&lt;p&gt;Speaker Bio:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;u&gt;Shandong Wu&lt;/u&gt;, PhD, is a Professor in Radiology, Biomedical Informatics, Bioengineering, and Intelligent Systems at the University of Pittsburgh. Dr. Wu leads the Intelligent Computing for Clinical Imaging (ICCI) lab, and he is the founding director of the Pittsburgh Center for AI Innovation in Medical Imaging. Dr. Wu’s work focuses on developing trustworthy medical imaging AI for clinical/translational applications. Dr. Wu&#39;s lab received multiple research awards such as the RSNA Trainee Research Award twice in 2017 and 2019, the 2021 AANS Natus Resident/Fellow Award for Traumatic Brain Injury, the 2025 SPIE Imaging Informatics Best Paper Award, etc. Dr. Wu’s research is supported by NIH, NSF, multiple research foundations, Amazon AWS, Nvidia, and many institutional funding sources. Dr. Wu has published &amp;gt; 190 journal papers and conference papers/abstracts in both the computing and clinical fields. His research has been featured in hundreds of scientific news reports and media outlets in the world.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMJGk9QSaal_pJu_MwJ5F1M1E000-jmlFWEGCwclHBbfMSIfUR9EthVbG3Bro3Oj__0IHn3inQU-fOG7zIiWxIXygvYOuIvMzKW1tV8wGfap7eKK6cBSmOrqIASBwN3TeesroAGaciCj8vCF7CkNqdYJOlyypqKQkFiALyseDTJ51N5vtQZSAcruQxo3Sm/s851/bartk.jpeg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;---&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://www.trustedci.org/trustedci-email-lists?rq=lists&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1852852779825729768'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1852852779825729768'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/08/securemedicalimagingAImodels.html' title='Trusted CI Webinar: Securing Medical Imaging AI Models Against Adversarial Attacks, Monday August 25th @ 10am Central'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-BX-tM6ritpMm13TG5QHo_SQlMp8HEQu_mWEJKatCXBreCJP87Ha24UOAR1x85A9BZ5ElnIKAbMnESEiZVe-1WYN1L22ulbPbTjPXRmhIWShvS2tP7mcwkEsEGkSI4ut6AMCVy9QFFwRIHcjedGhAdfcwJNPVRQxL0mzT7poMyFBhxTc66hnknz9ZUJfz/s72-w256-h320-c/Shandong_portrait.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4786429880949742809</id><published>2025-07-31T11:10:00.003-04:00</published><updated>2025-07-31T13:35:07.044-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IceCube"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="science"/><category scheme="http://www.blogger.com/atom/ns#" term="site visit"/><title type='text'>Trusted CI visits IceCube</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKnXhCb5yrhlmgovlVLD0351XKlcI8KnX0BAATQxE9H6_bIZ3BFGHozd7WWaMdaozWxaMD4o9u3d_Yj7QXS11D-XBn10XlI-g85ZUvL3MXySSckHKk9Bzog_M4I3h7Ivd4AeHKVjZLxizSK6-thq6lfIG3LpSX0X6zHDVepiol6GVMqz5D-OyTC5hQ/s2000/icecube-site-visit2025-megha-holding-drive.jpg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2000&quot; data-original-width=&quot;1500&quot; height=&quot;390&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKnXhCb5yrhlmgovlVLD0351XKlcI8KnX0BAATQxE9H6_bIZ3BFGHozd7WWaMdaozWxaMD4o9u3d_Yj7QXS11D-XBn10XlI-g85ZUvL3MXySSckHKk9Bzog_M4I3h7Ivd4AeHKVjZLxizSK6-thq6lfIG3LpSX0X6zHDVepiol6GVMqz5D-OyTC5hQ/w292-h390/icecube-site-visit2025-megha-holding-drive.jpg&quot; width=&quot;292&quot; height=&quot;auto&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center; width: 150px;&quot;&gt;Trusted CI staff member Megha Moncy holding one of the many hard drives shipped back from the South Pole containing neutrino research data&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&quot;Have you ever held $300,000 in your hands?&quot; At least that&#39;s the way Steve Barnet put it as he allowed us to hold one of the hard drives that had been shipped back from the main IceCube Neutrino detector in Antarctica. Steve is the IT manager for the &lt;a href=&quot;https://icecube.wisc.edu/&quot;&gt;IceCube Neutrino Detector&lt;/a&gt;, which is an NSF Major Facility allowing scientists from around the globe to study neutrinos. Steve estimates that each drive shipped back has around $300,000 worth of scientific data on it, based on the cost of collecting the data.&lt;p&gt;&lt;/p&gt;&lt;p&gt;In June 2025, members of the Trusted CI team took the opportunity to tour the IceCube Neutrino Detector data center and development facility at the University of Wisconsin - Madison. The team learned about the custom designed sensors and equipment that make up the 1 cubic kilometer detector buried under 1.5 km of ice at the South Pole.&lt;br /&gt;Because the detector produces about 1TB per day of data, and satellite communication to the South Pole is limited, it&#39;s still far more efficient to ship hard drives back to the lab after a season of data collection at the detector is finished. However, because the data is so valuable, they write the data to at least two separate arrays of hard drives and ship them on separate logistical channels in case of catastrophe during shipment.&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicQxhvq_Z3_lWMVALzAX5d3-aGE549zjSRWGQkI2z0gcvaujJESi51czGSqWpdAvSRQvGgyh-CuU3QOgc3i524aaX4ck-pdlwmsLnY6oh1YC6ATOxCaXuhyK4YNvRcqCN1zMKbSb_ejhtZ05KieoFPxRbN2sipdlOUgKHgZYCs903eEPfRacW9MlVN/s1600/icecube-site-visit2025-steve-barnet-leading-tour.jpg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicQxhvq_Z3_lWMVALzAX5d3-aGE549zjSRWGQkI2z0gcvaujJESi51czGSqWpdAvSRQvGgyh-CuU3QOgc3i524aaX4ck-pdlwmsLnY6oh1YC6ATOxCaXuhyK4YNvRcqCN1zMKbSb_ejhtZ05KieoFPxRbN2sipdlOUgKHgZYCs903eEPfRacW9MlVN/s320/icecube-site-visit2025-steve-barnet-leading-tour.jpg&quot; width=&quot;320&quot; height=&quot;auto&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center; width: 200px;&quot;&gt;Steve Barnet (right), giving a tour of the IceCube development facility.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The IceCube data center in Madison also simulates the layout of the facility in Antarctica so that they can better plan any changes made to the infrastructure and to be sure that equipment that is shipped down to the South Pole facility will fit around corners, be compatible with installed equipment, and have enough power.&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;https://icecube.wisc.edu/science/icecube/&quot;&gt;IceCube sensors&lt;/a&gt;, which are called &quot;digital optical modules&quot;, are about the size of a basketball but surprisingly weigh more than a bowling ball. Most of the weight is owed to the thick glass in each sensor pod that shields the sensitive electronics and photomultipliers from the 1 to 2 kilometers of ice that sit above them. The unique sensors were designed and built by several institutions within the international IceCube Collaboration to withstand the extreme environment of Antarctica.&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinU0n3Ewbn6pJvOsj323r2JsX2CE9Kd1Wvg6zh3cAL_hgPpRct1b19_sxbs3h5e6ydM2qlxJ2zrUzHqA-u5zt-sDF4a55XRE5KPAi-cFAdFtjTXO9jHhAx1fJSuVvQArEgIhJP8lh_KgMI5VYo5uR9qs5kIUyf8aJpFlhrKZuCso2L7kMoqCel3MmJ/s2000/icecube-site-visit2025-mark-holding-sensor.jpg&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2000&quot; data-original-width=&quot;1500&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinU0n3Ewbn6pJvOsj323r2JsX2CE9Kd1Wvg6zh3cAL_hgPpRct1b19_sxbs3h5e6ydM2qlxJ2zrUzHqA-u5zt-sDF4a55XRE5KPAi-cFAdFtjTXO9jHhAx1fJSuVvQArEgIhJP8lh_KgMI5VYo5uR9qs5kIUyf8aJpFlhrKZuCso2L7kMoqCel3MmJ/s320/icecube-site-visit2025-mark-holding-sensor.jpg&quot; width=&quot;240&quot; height=&quot;auto&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center; width: 200px;&quot;&gt;Trusted CI staff member Mark Krenz holding one of the digital optical modules.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Neutrinos are a fundamental particle generated by the universe&#39;s most extreme events such as supernovae and black holes. They travel in straight lines from their origin through the universe, passing through ordinary matter. As neutrinos pass through the Earth from all directions, including through the core of the planet, neutrinos whose path takes them through the south pole IceCube detector pass through the large cubic kilometer of ice making up the array. Most of them pass right through the detector without any interaction, but occasionally they hit an atom in the ice and generate secondary charged particles which travel through the ice faster than light travels through ice. This produces &lt;a href=&quot;https://en.wikipedia.org/wiki/Cherenkov_radiation&quot;&gt;Cherenkov radiation&lt;/a&gt;, which creates a blue flash of light. This blue light phenomenon of Cherenkov radiation is what the photomultipliers &lt;a href=&quot;https://gcn.gsfc.nasa.gov/amon_icecube_gold_bronze_events.html&quot;&gt;actually detect&lt;/a&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR3FOMzTOZtniBwEUMc-1qeBh4m0DMsYqtVwrkiAjQMID3ZC5DGjeZVpICItOHHZ__E07OfDi7gLnywup6Pzf6zEAf_cYiWdUp1_JDfphNOKX4X_CWVzzY_r7kAdCERW_umnIr7TmaX3a3LxxicU2FEovn_ySiSHdnnxGOv60tbQuesCiDdRdLpEyX/s2000/icecube-site-visit2025-sensor-test-array.jpg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2000&quot; data-original-width=&quot;1500&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR3FOMzTOZtniBwEUMc-1qeBh4m0DMsYqtVwrkiAjQMID3ZC5DGjeZVpICItOHHZ__E07OfDi7gLnywup6Pzf6zEAf_cYiWdUp1_JDfphNOKX4X_CWVzzY_r7kAdCERW_umnIr7TmaX3a3LxxicU2FEovn_ySiSHdnnxGOv60tbQuesCiDdRdLpEyX/s320/icecube-site-visit2025-sensor-test-array.jpg&quot; width=&quot;240&quot; height=&quot;auto&quot;/&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center; width: 200px;&quot;&gt;IceCube&#39;s testing and development array of sensors.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;The facility also has a test array of sensors that are not encased in glass and stacked closely together that allow IceCube staff to run tests and diagnostics on the electronics before performing the same operations on the production sensor array. This reduces the chance of an incident that damages the entire array, &quot;which would be bad&quot;, according to Steve (he likes understatement). Availability is a crucial security requirement for the IceCube array, and one of the threats against the sensors continuing to function is the extreme cold damaging the electronics inside. If the array loses electricity, it would only be a matter of a day or so before large parts of the array would become unrecoverable. Thus, it is important that a generator powering the array in Antarctica run continuously uninterrupted over the lifetime of the experiment. Trusted CI benefits from visiting the IceCube facility by seeing the equipment and better understanding the processes used to program, deploy, and protect the equipment from a variety of security threats.&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4786429880949742809'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4786429880949742809'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/07/trusted-ci-visits-icecube.html' title='Trusted CI visits IceCube'/><author><name>Mark Krenz</name><uri>http://www.blogger.com/profile/13524023996157340111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFgpL8-aPlYcvo0nCuYI7izRHLdXmdo8NEfderwwQh7iCAqZ-0PjoxH97d1wjiifonuqLajf2vw8kyqCz_khzlxURkTBMPFDBy5nL_bxQlTK8WIXoUduW6Cds80XoY/s220/mark-museum-of-the-north.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKnXhCb5yrhlmgovlVLD0351XKlcI8KnX0BAATQxE9H6_bIZ3BFGHozd7WWaMdaozWxaMD4o9u3d_Yj7QXS11D-XBn10XlI-g85ZUvL3MXySSckHKk9Bzog_M4I3h7Ivd4AeHKVjZLxizSK6-thq6lfIG3LpSX0X6zHDVepiol6GVMqz5D-OyTC5hQ/s72-w292-h390-c/icecube-site-visit2025-megha-holding-drive.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4897357207777740990</id><published>2025-07-14T12:06:00.001-04:00</published><updated>2025-07-14T12:06:28.660-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: TIPPSS to improve Trust, Identity, Privacy, Protection, Safety and Security for Cyberphysical Systems, Monday July 28th @ 10am Central</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOHr8onp7D0TEbph9Q1l1PnIXv38yvMliQCfMdAO9w2szT-mZ_OrR0fUnI4j2izd1YMgrYEZhTYghRtJOyrvt2lmvbprqyRuXMMpmqnaH3rG6krgOvK-8PiiLhrF7RhMdgavnVSOPm9antchMWLT2uc2BxxQPS2-_LEEGFAS7opdlZsXnEnbmDIEWTn2xd/s2664/Florence%20Hudson%20Picture.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2664&quot; data-original-width=&quot;1952&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOHr8onp7D0TEbph9Q1l1PnIXv38yvMliQCfMdAO9w2szT-mZ_OrR0fUnI4j2izd1YMgrYEZhTYghRtJOyrvt2lmvbprqyRuXMMpmqnaH3rG6krgOvK-8PiiLhrF7RhMdgavnVSOPm9antchMWLT2uc2BxxQPS2-_LEEGFAS7opdlZsXnEnbmDIEWTn2xd/s320/Florence%20Hudson%20Picture.jpg&quot; width=&quot;234&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Northeast Big Data Innovation Hub&#39;s Florence Hudson is presenting the talk, &lt;i&gt;TIPPSS to improve Trust, Identity, Privacy, Protection, Safety and Security for Cyberphysical Systems,&lt;/i&gt; on Monday July 28th at &lt;b&gt;10am, Central time.&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_ETKmVkyDT_G578R4iLl9aw&quot;&gt;register here&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;margin-left: 40px; text-align: left;&quot;&gt;The challenge of providing end to end trust and security for operational technology systems has been a growing challenge and increasingly imperative. An IEEE effort was begun in 2016 to tackle that challenge, resulting in the publication of the first IEEE/UL TIPPSS standard (IEEE/UL 2933-2024) and the awarding of the 2024 IEEE Standards Association Emerging Technology Award to the TIPPSS standard working group.&amp;nbsp; The goal of the TIPPSS standard, which is envisioned to be a family of standards, is to improve Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for cyber-physical systems, beginning with Clinical Internet of Things and expanding to research infrastructure, the energy grid, distributed energy resources, and more. In this webinar we will discuss the initial IEEE/UL TIPPSS standard for clinical IoT data and device interoperability, the details of the technical and process elements of the standard, and the opportunity to apply it to all operational technology. Future TIPPSS presentations planned include &quot;TIPPSS for navigating a changing cybersecurity landscape at the Electron-Ion Collider and other scientific research facilities&quot; in collaboration with Brookhaven National Laboratory at the ICALEPS 2025 conference (The 20th International Conference on Accelerator and Large Experimental Physics Control Systems) September 20-26, 2025 in Chicago, bringing the TIPPSS discussion to research infrastructure and the IT systems that support it. Trusted CI&#39;s initiatives in &lt;a href=&quot;https://www.trustedci.org/secure-by-design&quot;&gt;Secure by Design&lt;/a&gt; and the Trusted CI &lt;a href=&quot;https://trustedci.org/ot-matrix&quot;&gt;Operational Technology Procurement Vendor Matrix&lt;/a&gt; are very complementary to the TIPPSS initiative, and there is more we can do as a community in this effort together. Join us to discuss the imperatives and possibilities.&lt;/div&gt;&lt;p&gt;Speaker Bio:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMJGk9QSaal_pJu_MwJ5F1M1E000-jmlFWEGCwclHBbfMSIfUR9EthVbG3Bro3Oj__0IHn3inQU-fOG7zIiWxIXygvYOuIvMzKW1tV8wGfap7eKK6cBSmOrqIASBwN3TeesroAGaciCj8vCF7CkNqdYJOlyypqKQkFiALyseDTJ51N5vtQZSAcruQxo3Sm/s851/bartk.jpeg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;a href=&quot;https://www.linkedin.com/in/florencehudson/&quot;&gt;Florence Hudson&lt;/a&gt;&lt;/b&gt; is Executive Director of the &lt;a href=&quot;https://nebigdatahub.org/about/&quot;&gt;Northeast Big Data Innovation Hub&lt;/a&gt; at Columbia University, leading over $10M in projects funded by the National Science Foundation, National Institutes of Health, and Department of Transportation. She is also Founder &amp;amp; CEO of &lt;a href=&quot;https://www.fdhint.com/about&quot;&gt;FDHint, LLC&lt;/a&gt;, a global advanced technology consulting firm. A former IBM Vice President and Chief Technology Officer, Internet2 Senior Vice President &amp;amp; Chief Innovation Officer, Special Advisor for the NSF Cybersecurity Center of Excellence, and aerospace engineer at the NASA Jet Propulsion Lab and Grumman Aerospace Corporation, she is an Editor in Chief and Author for Springer, Elsevier, Wiley, IEEE, and other publications. She leads the development of global IEEE/UL standards to increase Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for connected healthcare data and devices and cyberphysical systems, and is Vice Chair of the IEEE Engineering Medicine &amp;amp; Biology Society Standards Committee. She earned her Mechanical and Aerospace Engineering degree from Princeton University, and executive education certificates from Harvard Business School and Columbia University.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGhDyr3rg5BAFNF-dquiZLfLxrRQ9o1GYBjEW3OCISgjVadpTlt3hilbp1FgD6OPf9ighXhL1-yIHi3XkBA51Gctpz_52qqF6UGb1D8fGFI9Rjipv5zdESXe_IMpRx_mXxoRTa8dd42k_unFYRbQ4OHEzf_XMrbABe-kj6X12K-lzO-YBMyQrL7-26LJA6/s1226/Florence%20IEEE%20TIPPSS%20award%20pic.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;698&quot; data-original-width=&quot;1226&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGhDyr3rg5BAFNF-dquiZLfLxrRQ9o1GYBjEW3OCISgjVadpTlt3hilbp1FgD6OPf9ighXhL1-yIHi3XkBA51Gctpz_52qqF6UGb1D8fGFI9Rjipv5zdESXe_IMpRx_mXxoRTa8dd42k_unFYRbQ4OHEzf_XMrbABe-kj6X12K-lzO-YBMyQrL7-26LJA6/s320/Florence%20IEEE%20TIPPSS%20award%20pic.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;IEEE Emerging Technology Award&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnpjsti5-q_Il3GUOoIUWh-59fsoq0emCZtn23gwKWJ-_KXWGFMz7pnyTgKbPnG7O9xpHRvgsRsKUUlkARrF6tQW4lYdSeqOns4fOmhyphenhyphenASM1YVrbtMO-GGBMGSvozM8_ezq4ZuJVp9UpwdWo_FMgsGK_V1CFVeis94ttiw8A94FlmszOGNSAPPUurREguk/s720/Slide1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;405&quot; data-original-width=&quot;720&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnpjsti5-q_Il3GUOoIUWh-59fsoq0emCZtn23gwKWJ-_KXWGFMz7pnyTgKbPnG7O9xpHRvgsRsKUUlkARrF6tQW4lYdSeqOns4fOmhyphenhyphenASM1YVrbtMO-GGBMGSvozM8_ezq4ZuJVp9UpwdWo_FMgsGK_V1CFVeis94ttiw8A94FlmszOGNSAPPUurREguk/w320-h180/Slide1.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;IEEE 2933 Working Group Leadership Team&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;---&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://www.trustedci.org/trustedci-email-lists?rq=lists&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4897357207777740990'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4897357207777740990'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/07/tippss.html' title='Trusted CI Webinar: TIPPSS to improve Trust, Identity, Privacy, Protection, Safety and Security for Cyberphysical Systems, Monday July 28th @ 10am Central'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOHr8onp7D0TEbph9Q1l1PnIXv38yvMliQCfMdAO9w2szT-mZ_OrR0fUnI4j2izd1YMgrYEZhTYghRtJOyrvt2lmvbprqyRuXMMpmqnaH3rG6krgOvK-8PiiLhrF7RhMdgavnVSOPm9antchMWLT2uc2BxxQPS2-_LEEGFAS7opdlZsXnEnbmDIEWTn2xd/s72-c/Florence%20Hudson%20Picture.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1675246704297444549</id><published>2025-07-10T09:06:00.000-04:00</published><updated>2025-07-10T09:06:36.572-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fellows"/><category scheme="http://www.blogger.com/atom/ns#" term="Trusted CI"/><title type='text'>Applications are now open for the 2025 Trusted CI Fellowship! </title><content type='html'>&lt;br /&gt;We’re excited to announce that applications are now open for the 2025 Trusted CI Fellowship. This is your chance to receive expert training, work closely with Trusted CI members, and further empower the NSF community to secure its own research. &lt;br /&gt;&lt;br /&gt;Click&amp;nbsp;&lt;a href=&quot;https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.trustedci.org%2Ffellows%2Fabout%3Futm_source%3DMain%2BList%26utm_campaign%3D198da2d4ee-EMAIL_CAMPAIGN_2025_07_02_09_06_COPY_02%26utm_medium%3Demail%26utm_term%3D0_-8db9c86f77-&amp;amp;data=05%7C02%7Cdborecky%40iu.edu%7C7fc4ff8919734e96141a08ddba39d6df%7C1113be34aed14d00ab4bcdd02510be91%7C1%7C0%7C638871479765179079%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=lw9uDKDP8jqjCyFKnkDzxtXrDDNPqWJoXbmNhBdaYEg%3D&amp;amp;reserved=0&quot;&gt;here&lt;/a&gt;&amp;nbsp;to learn more about the Fellows program and to view our past Fellows&lt;div&gt;&lt;br /&gt; Click &lt;a href=&quot;https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fssl.linklings.net%2Fapplications%2FTrustedCI%2F%3Futm_source%3DMain%2BList%26utm_campaign%3D198da2d4ee-EMAIL_CAMPAIGN_2025_07_02_09_06_COPY_02%26utm_medium%3Demail%26utm_term%3D0_-8db9c86f77-&amp;amp;data=05%7C02%7Cdborecky%40iu.edu%7C7fc4ff8919734e96141a08ddba39d6df%7C1113be34aed14d00ab4bcdd02510be91%7C1%7C0%7C638871479765103652%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=ezwus50and8NoCpCUNgY5p7dwbqUMM7eiPwckfJF0bY%3D&amp;amp;reserved=0&quot;&gt;here&lt;/a&gt; to apply for the program&lt;br /&gt;&lt;br /&gt;                    The application deadline is Thursday, July 31, 2025&lt;br /&gt;&lt;br /&gt;Trusted CI’s past Fellows have been an amazing success with 35 Fellows from various fields, including:&lt;div&gt;&lt;br /&gt; Research Technologies&lt;br /&gt;Astrophysics&lt;br /&gt;Criminal Justice&lt;br /&gt;Network and Combinatorial Optimization &lt;br /&gt;and Computer Engineering&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Fellowship Benefits:&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt; Participation in Virtual Cybersecurity Institute Training Workshops&lt;/li&gt;&lt;li&gt;Receive funding to attend the 2025 NSF Cybersecurity Summit&lt;/li&gt;&lt;li&gt;Access to Trusted CI staff and other Cybersecurity professionals&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;                      Participation in the Fellows program will occur from October 2025 to April 2026.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;                   &lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1675246704297444549'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1675246704297444549'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/07/applications-are-now-open-for-2025.html' title='Applications are now open for the 2025 Trusted CI Fellowship! '/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6124435487144244451</id><published>2025-06-10T10:33:00.000-04:00</published><updated>2025-06-10T10:33:24.193-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'> Now Open - 2025 NSF Cybersecurity Summit Call for Participation</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0j-sCfURZaLegArsUloLN6FQpyzDQgk6SwOY8XTU4TFmU6NXS5bv2O-PL_XiXnK_tKWxjlhuxzrmVD7_OKZomsOBHjv52JlI_RBy6_Fz6Jsx0WMvd6vq0QlEj1ueYpqNsphxwlcZuFVcHIUQTroZx6cfuwft4mKIOjoA6FKbNdZlYPLIuiOdq4mnc2om1/s8002/NSF_Cybersecurity-Summit-2025_banner.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2501&quot; data-original-width=&quot;8002&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0j-sCfURZaLegArsUloLN6FQpyzDQgk6SwOY8XTU4TFmU6NXS5bv2O-PL_XiXnK_tKWxjlhuxzrmVD7_OKZomsOBHjv52JlI_RBy6_Fz6Jsx0WMvd6vq0QlEj1ueYpqNsphxwlcZuFVcHIUQTroZx6cfuwft4mKIOjoA6FKbNdZlYPLIuiOdq4mnc2om1/w514-h161/NSF_Cybersecurity-Summit-2025_banner.png&quot; width=&quot;514&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;It is our pleasure to announce that the 2025 NSF Cybersecurity Summit (Oct 20-23, Boulder)&amp;nbsp;Call for Participation is now open! The Summit Program Committee seeks proposals for:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Plenary presentations and Panel talks&lt;/li&gt;&lt;li&gt;Workshops and&amp;nbsp;Trainings&lt;/li&gt;&lt;li&gt;Birds of a Feather (BoFs) and&amp;nbsp;Project meetings&lt;/li&gt;&lt;li&gt;Poster session&lt;/li&gt;&lt;li&gt;TLP:RED talks&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;We welcome your proposals relevant to a broad range of topics related to
 the operational cybersecurity of NSF cyberinfrastructure and programs.&amp;nbsp;
 However, we encourage proposals that address topics highly ranked by 
the NSF CI Community. These include:&amp;nbsp;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;HPC security&lt;/li&gt;&lt;li&gt;AI in cybersecurity:&amp;nbsp; Practical use in operational security and/or&amp;nbsp; balancing automation and oversight&lt;/li&gt;&lt;li&gt;Network security and defense&lt;/li&gt;&lt;li&gt;Regulatory compliance&lt;/li&gt;&lt;li&gt;Staying on top of emerging threats (how-to guide)&lt;/li&gt;&lt;li&gt;Pros and cons of federal, academic, and private research funding&lt;/li&gt;&lt;li&gt;Digital forensics and incident response (case studies)&lt;/li&gt;&lt;li&gt;Zero-trust architecture implementation&lt;/li&gt;&lt;li&gt;Security of research IOT&lt;/li&gt;&lt;li&gt;Adjusting your cybersecurity program during cuts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;More detail and guidance on submitting proposals can be found here:&lt;br /&gt;&lt;a href=&quot;https://www.trustedci.org/2025-cfp&quot;&gt;https://www.trustedci.org/2025-cfp&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The deadline for plenary, workshop, training, BoF, and project meeting submissions is &lt;b&gt;Monday June 30th&lt;/b&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Poster session submissions are due September 5th. TLP: RED submissions are due October 10th.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Thank you on behalf of the Program and Organizing Committees. We look forward to receiving your proposals and hope to see you in October in Boulder!&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6124435487144244451'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6124435487144244451'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2025/06/2025-cfp.html' title=' Now Open - 2025 NSF Cybersecurity Summit Call for Participation'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/15745716926119250550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0j-sCfURZaLegArsUloLN6FQpyzDQgk6SwOY8XTU4TFmU6NXS5bv2O-PL_XiXnK_tKWxjlhuxzrmVD7_OKZomsOBHjv52JlI_RBy6_Fz6Jsx0WMvd6vq0QlEj1ueYpqNsphxwlcZuFVcHIUQTroZx6cfuwft4mKIOjoA6FKbNdZlYPLIuiOdq4mnc2om1/s72-w514-h161-c/NSF_Cybersecurity-Summit-2025_banner.png" height="72" width="72"/></entry></feed>