<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7077496605849243532</id><updated>2022-09-03T04:33:43.704-04:00</updated><category term="engagements"/><category term="webinar"/><category term="events"/><category term="NSF Summit"/><category term="iam"/><category term="Trusted CI"/><category term="vulnerabilities"/><category term="framework"/><category term="cybersecurity programs"/><category term="compliance"/><category term="situational-awareness"/><category term="software assurance"/><category term="TTP"/><category term="large facilities"/><category term="major facilities"/><category term="Fellows"/><category term="trustworthy data"/><category term="CyberCheckup"/><category term="PEARC"/><category term="presentations"/><category term="project-news"/><category term="reports"/><category term="science gateways"/><category term="success story"/><category term="CUI"/><category term="Internet2"/><category term="oscrp"/><category term="annual challenge"/><category term="engagement-cfp"/><category term="identity federation"/><category term="incident response"/><category term="COVID-19"/><category term="Survey"/><category term="cybertraining"/><category term="ransomware"/><category term="secure coding"/><category term="solicitations"/><category term="ESnet"/><category term="NSF-cybersecurity-guide"/><category term="students"/><category term="CMMC"/><category term="OSG"/><category term="ResearchSOC"/><category term="authentication"/><category term="incommon"/><category term="open source software"/><category term="openssl"/><category term="software sustainability"/><category term="tutorial"/><category term="working group"/><category term="BD Hubs"/><category term="Cloud-computing"/><category term="Cybersecurity"/><category term="DKIST"/><category term="FABRIC"/><category term="Jupyter"/><category term="benchmarking"/><category term="cici"/><category term="cyberinfrastructure"/><category term="data assurance"/><category term="idm"/><category term="jobs"/><category term="network"/><category term="news"/><category term="ARF"/><category term="CERN"/><category term="CPP"/><category term="HPC"/><category term="LSST"/><category term="NCSA"/><category term="Pegasus"/><category term="REED+"/><category term="advisory committee"/><category term="blockchain"/><category term="controls"/><category term="educause"/><category term="epoc"/><category term="law and policy"/><category term="office hours"/><category term="ren-isac"/><category term="video conferencing"/><category term="xsede"/><category term="AMNH"/><category term="AoT"/><category term="EDI"/><category term="Gemini Observatory"/><category term="GenApp"/><category term="Globus"/><category term="NEON"/><category term="NRAO"/><category term="NSF Summit Survey"/><category term="OSiRIS"/><category term="SLATE"/><category term="Science DMZs"/><category term="Skim Reaper"/><category term="TransPac"/><category term="Trusted CI Vision"/><category term="UC Berkeley"/><category term="UNH-RCC"/><category term="USAP"/><category term="WISE"/><category term="ask@trustedci.org"/><category term="cilogon"/><category term="cyber-physical systems"/><category term="higher education"/><category term="ligo"/><category term="log analysis"/><category term="operational technology"/><category term="racial inequities"/><category term="research computing"/><category term="risk"/><category term="trust community"/><category term="2021 Summit report"/><category term="2022 Jean-Claude Laprie Award in Dependable Computing"/><category term="Bart Miller"/><category term="CI CoE"/><category term="CI Compass"/><category term="EPSCoR"/><category term="IEEE/IFIP International Conference on Dependable Systems and Networks"/><category term="JASON"/><category term="NOIRLab"/><category term="NSPM-33"/><category term="Ocean Sciences"/><category term="White House"/><category term="cohort"/><category term="cpe"/><category term="cyberattacks"/><category term="cybercrime"/><category term="cybersecurity program"/><category term="engagement"/><category term="research"/><title type='text'>Trusted CI Blog</title><subtitle type='html'>Blog for &lt;a href=&quot;https://www.trustedci.org/&quot;&gt;Trusted CI&lt;/a&gt;.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://blog.trustedci.org/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default?start-index=26&amp;max-results=25'/><author><name>Mark Krenz</name><uri>http://www.blogger.com/profile/13524023996157340111</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//2.bp.blogspot.com/-_ctXKrOAp60/YSjyyh2141I/AAAAAAAAAjA/9fs0AAZqoGsASZaJRVlEO1GiDGO--mqugCK4BGAYYCw/s220/mark-museum-of-the-north.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>445</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-23327862817145980</id><published>2022-08-08T15:48:00.003-04:00</published><updated>2022-08-08T15:50:58.313-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secure coding"/><category scheme="http://www.blogger.com/atom/ns#" term="software assurance"/><title type='text'>New Trusted CI Software Security Training Materials for the Community</title><content type='html'>&lt;p&gt;In a world of continuous cyber attacks, cybersecurity is a responsibility of every person involved in the software development life cycle: managers, designers, developers, and testers. Trusted CI offers an evolving collection of training materials on software security covering topics such as secure design, secure implementation, testing, code auditing, dependency tools, static analysis tools, and fuzz testing.&lt;/p&gt;&lt;p&gt;The materials are freely available at &lt;a href=&quot;https://www.cs.wisc.edu/mist/SoftwareSecurityCourse&quot;&gt;https://www.cs.wisc.edu/mist/SoftwareSecurityCourse&lt;/a&gt;. Apart from videos and corresponding book chapters, they include hands-on exercises and quizzes for many of the topics. Classroom exercises and the solutions to the hands-on exercises and quizzes are provided to instructors by request. Most of the videos now have captions in both English and Spanish.&lt;/p&gt;&lt;p&gt;These materials are being continuously updated, as we develop new modules. The latest additions are modules on address space layout optimization (ASLR), memory safety checks, fuzz testing and using AFL, and dependency analysis tools.&lt;/p&gt;&lt;p&gt;These materials have been used at conferences, workshops, and government agencies to train CI professionals in secure coding, design, and testing. They are also used at the University of Wisconsin-Madison to teach CS542, &lt;i&gt;Introduction to Software Security&lt;/i&gt;. &lt;br /&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/23327862817145980'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/23327862817145980'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/08/new-software-security-materials.html' title='New Trusted CI Software Security Training Materials for the Community'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-668981727469796225</id><published>2022-08-08T14:33:00.002-04:00</published><updated>2022-08-08T14:36:02.946-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="controls"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: CIS Controls, August 22nd @11am EST</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ioaB3_iJOWwNQ-Z8g8KHcQRX81HoVo0XK657QjJzmwVHfdHlWXO3mKKKls4Mx5wIGjTgv5usmgbjTyZjyOWGsHlwGLoAfWDaktJX0Znls-aJaGb_hQ5Wefvu8y0JmeqC5paRNffh1a1AFIk0FdVtyeW2VWUIeY3lUhKM2tXITvbm1DO-C8orMysY/s982/mark%20and%20shane.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;792&quot; data-original-width=&quot;982&quot; height=&quot;258&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ioaB3_iJOWwNQ-Z8g8KHcQRX81HoVo0XK657QjJzmwVHfdHlWXO3mKKKls4Mx5wIGjTgv5usmgbjTyZjyOWGsHlwGLoAfWDaktJX0Znls-aJaGb_hQ5Wefvu8y0JmeqC5paRNffh1a1AFIk0FdVtyeW2VWUIeY3lUhKM2tXITvbm1DO-C8orMysY/s320/mark%20and%20shane.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Trusted CI&#39;s Shane Filus and Mark Krenz will be giving a presentation on CIS Controls on Monday, August 22nd at 11am (Eastern).&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_N8j-EQY1SEibNRIqfFPlVQ&quot;&gt;register here&lt;/a&gt;.&lt;/p&gt;&lt;blockquote&gt;The Trusted CI Information Security Office (ISO) team will be presenting a webinar on the &lt;a href=&quot;https://www.cisecurity.org/controls&quot;&gt;CIS Controls&lt;/a&gt;. This will include background and information on the CIS controls, our recent experiences using the controls to assess Trusted CI’s own cybersecurity program and operations, and how that can be applied to your own project.&lt;/blockquote&gt;&lt;blockquote&gt;&lt;div&gt;Topics include:&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Who Trusted CI is and why we have a cybersecurity program.&lt;/li&gt;&lt;li&gt;Background on the CIS controls and what an assessment is.&lt;/li&gt;&lt;li&gt;What led us to perform a CIS assessment.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Overview and discussion of our results.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Differences between control versions 7.1 and 8.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Discussion on methodology and tools that can be used in assessments.&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Speaker Bios&lt;/b&gt;:&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Shane Filus&lt;/u&gt; serves as a Senior Security Engineer at the Pittsburgh Supercomputer Center, and works with Trusted CI, XSEDE/ACCESS, and HuBMAP projects on all aspects of cybersecurity; from operations, to incident response, to policy, and everything in between.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;Mark Krenz&lt;/u&gt; serves as Chief Security Analyst at Indiana University’s Center for Applied Cybersecurity Research. Mark’s focus is on cybersecurity operations, research and education. He has more than two decades of experience in system and network administration and has spent the last decade focused on cybersecurity. He serves as the CISO of the ResearchSOC and the Deputy CISO of Trusted CI.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;---&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://list.iu.edu/sympa/subscribe/ctsc-announce-l&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/668981727469796225'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/668981727469796225'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/08/trusted-ci-webinar-cis-controls-august.html' title='Trusted CI Webinar: CIS Controls, August 22nd @11am EST'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ioaB3_iJOWwNQ-Z8g8KHcQRX81HoVo0XK657QjJzmwVHfdHlWXO3mKKKls4Mx5wIGjTgv5usmgbjTyZjyOWGsHlwGLoAfWDaktJX0Znls-aJaGb_hQ5Wefvu8y0JmeqC5paRNffh1a1AFIk0FdVtyeW2VWUIeY3lUhKM2tXITvbm1DO-C8orMysY/s72-c/mark%20and%20shane.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-3724241633019769253</id><published>2022-08-01T13:07:00.001-04:00</published><updated>2022-08-04T09:25:01.470-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="NSPM-33"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>Analysis of NSPM-33: Cybersecurity Requirements for Federally Funded Research Organizations</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; white-space: pre-wrap;&quot;&gt;By: Anurag Shankar and Scott Russell&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-4d776d93-7fff-ce0b-19d3-df84ad9a439d&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;This blog post provides research organizations a summary of the National Security Presidential Memorandum on United States Government-Supported Research and Development National Security Policy” (NSPM-33) and the recent Office of Science and Technology Policy (OSTP) / National Science and Technology Council (NSTC) guidance, along with analysis of the requirements.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Summary&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In January 2021, then President Trump issued a directive “National Security Presidential Memorandum on United States Government-Supported Research and Development National Security Policy” (&lt;a href=&quot;https://trumpwhitehouse.archives.gov/presidential-actions/presidential-memorandum-united-states-government-supported-research-development-national-security-policy/ &quot;&gt;NSPM-33&lt;/a&gt;) to all federal agencies to: 1) standardize disclosure requirements and 2) mandate a research security program for all institutions receiving a total of $50 million or more in federally-funded research. In January 2022, the Office of Science and Technology Policy (OSTP) released &lt;a href=&quot;https://www.whitehouse.gov/wp-content/uploads/2022/01/010422-NSPM-33-Implementation-Guidance.pdf &quot;&gt;further guidance&lt;/a&gt; on these requirements, including details on four elements specified in NSPM-33: cybersecurity, foreign travel security, research security training, and export control training. The cybersecurity guidance identifies 14 controls that it recommends as requirements for federal agencies to flow down to organizations receiving federal research funding. Twelve of these controls are included in the 17 “basic hygiene” controls specified by &lt;a href=&quot;https://www.acq.osd.mil/cmmc/about-us.html &quot;&gt;CMMC Level 1&lt;/a&gt; and the 15 “minimum security controls” specified by &lt;a href=&quot;https://www.acquisition.gov/far/52.204-21 &quot;&gt;FAR 52.204-21&lt;/a&gt;, “Basic Safeguarding of Covered Contractor Information Systems.” The rest are NSPM-33 specific, addressing training and ransomware/data integrity.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The OSTP guidance also includes a number of additional recommendations for federal agencies to flow down to research organizations, summarized below:&lt;/span&gt;&lt;/p&gt;&lt;ol style=&quot;margin-bottom: 0px; margin-top: 0px; padding-inline-start: 48px;&quot;&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Documentation&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;: Research organizations should be required to document their research security program and provide this documentation within 30 days of a request from a research agency that is funding an award or considering an application for award funding.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Certification&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;: Research organizations should be required to provide certification of compliance with the research security program requirement. OSTP, in consultation with the NSTC Subcommittee on Research Security and OMB, plans to develop a single certification standard and process that will apply across all research agencies.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Timeline&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;: Research organizations should establish a research security program as soon as possible, but given one year from the date of issuance of the formal requirement to comply. Organizations that become subject to the requirement in subsequent years are supposed to be similarly provided one additional year to comply.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Assistance&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;: The Federal Government should provide technical assistance to support development of training content and program guidelines, tools, and best practices for research organizations to incorporate at their discretion. Agencies represented on the National Counterintelligence Task Force, in conjunction with the National Counterintelligence and Security Center, should jointly develop content that research organizations can leverage to meet requirements for research security programs and training. The Federal Government should consider supporting the formation of a community consortium to develop and maintain research security program information and implementation resources for research organizations, to include resources suitable for use within research security programs. The development of program content should be a collaborative effort between the government and organizations.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;span style=&quot;font-size: 11pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Discretion&lt;/span&gt;&lt;span style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;: Research organizations should be provided flexibility to structure the organization’s research security program to best serve its particular needs, and to leverage existing programs and activities where relevant, provided that the organization implements all required program components. Research organizations should be given flexibility in how they choose to integrate research security requirements into existing programs, such as existing cybersecurity programs. Research organizations should be strongly encouraged to integrate some or all elements into a coherent research security program, where applicable and feasible.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li aria-level=&quot;1&quot; dir=&quot;ltr&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; list-style-type: decimal; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;p dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Funding agencies should consider integrating the research security program requirement into the Compliance Supplement’s Research and Development Cluster audit guidance as part of the single audit of Federal grant and assistance programs (2 C.F.R. Part 200, Appendix XI).&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Analysis&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The primary questions raised by NSPM-33 and the NTSC/OSTP guidance are 1) How will these requirements be flowed down to research organizations; 2) To what extent will funding agencies follow the guidance put forth by the NTSC; and 3) What is the scope of the requirements?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Regarding the first question, NSPM-33 only directly impacts federal funding agencies (e.g., NSF, DOE): the NSPM does not impose any requirements directly on research institutions. Instead, it instructs federal funding agencies to impose these requirements on research institutions receiving federal research funding. While the NTSC/OSTP guidance specifies January 2023 as the deadline for eligible institutions to comply, it does not specify how the requirements should be imposed. Moreover, the provision of NSPM-33 that specifically mentions cybersecurity is only intended to apply to research institutions receiving over $50 million in federal research funding, without clarifying how these institutions should be identified.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Practically speaking, the funding agencies may impose these requirements on all *new* grants. So although existing grants are technically unaffected, research institutions that wish to continue to get funding will be forced to implement the requirements regardless.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Moreover, it is also unclear to what extent federal funding agencies are bound by the NTSC guidance. NSPM-33 only instructs OSTP to “promulgate guidelines for research institutions to mitigate risks to research security and integrity”: it is not empowered to dictate what requirements federal funding agencies impose. Indeed, neither OSTP nor NTSC were mentioned in the subsection referencing research security programs and cybersecurity.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Scope is another issue. The guidance does not clarify whether the security program requirements apply only to researchers receiving federal funding or every researcher within the organization. It specifies controls for programs to implement but does not explicitly state if every system used by researchers (e.g, their workstations) is in scope or institutional systems only. Since this has financial repercussions, clarity is needed on what the requirements cover.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A research security program clearly requires controls to secure projects. However, prescribing a set of controls which research systems must implement can be problematic, as research systems have unique needs that may not function using traditional controls (instead requiring alternate controls to achieve their mission.) Moreover, the focus on system-centric controls is not well suited for securing research workflows, which require more than technical controls alone. The uniqueness of research systems (telescopes, sensors, microscopes, etc.) requires different approaches than controls designed to secure “systems.” For example, the &lt;a href=&quot;https://www.trustedci.org/framework &quot;&gt;Trusted CI Framework&lt;/a&gt; is a more appropriate fit for research programs. It includes controls, but provides the institution flexibility in choosing a baseline control set that is tailored to the institution’s mission. Additionally, this baseline control set is supplemented with additional and alternate controls that are particularly important in the research context, as research infrastructure often requires specialized protections. Securing research ultimately requires flexibility.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Applying the same level of security to all research is also unwise. How research is protected is currently scoped to data by sensitivity and regulatory requirements. This is done for a reason, namely to apply security proportionally to risk to contain cost. Expanding it indiscriminately will be wasteful and unnecessary. For instance, public data does not need the same level of security as patient data.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The guidance asks agencies to allow flexibility on which program components institutions choose to implement but also directs them to “strongly encourage” choosing them all. With a documentation submission requirement, it is unclear how the program will be judged and what the impact of a “less than perfect choice” might be (e.g., of not having all of the controls in place).&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.37455; margin-bottom: 0pt; margin-top: 12pt;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The certification requirement also is likely to present challenges. As the CMMC rollout shows, designing a certification process for compliance at this scale is extremely challenging. And whereas CMMC is limited in scope, NSPM-33 is potentially much broader. With CMMC compliance, most organizations can design isolated environments for controlled data CUI to limit scope, certifying compliance for research will be much more challenging, given the variety and complexity of research infrastructure.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3724241633019769253'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3724241633019769253'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/08/analysis-of-nspm-33-cybersecurity.html' title='Analysis of NSPM-33: Cybersecurity Requirements for Federally Funded Research Organizations'/><author><name>Scott Russell</name><uri>http://www.blogger.com/profile/02277262829843761335</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-9077785406797527111</id><published>2022-07-29T09:00:00.015-04:00</published><updated>2022-07-29T12:55:17.272-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CI Compass"/><category scheme="http://www.blogger.com/atom/ns#" term="iam"/><category scheme="http://www.blogger.com/atom/ns#" term="reports"/><category scheme="http://www.blogger.com/atom/ns#" term="Trusted CI"/><title type='text'>Trusted CI Co-authors Identity Management Cookbook for NSF Major Facilities</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpmbFM7eL9R4vAuhaIEFuhvP4_kkmrrITFff9KooshTgQhSS-VoenpTlOPSzsgPseAJ0rzgRIP-HHRU2Fr2_08XXjISu5DfDvksP-PPiFytktphGz_nakCeX-XIRf-d_SOOALC2RPMgkAVjkXtKyT176ahLgokUxYq8T7Ba_4Onse_MltzE_LVcFp8/s2266/cicompass_logo.jpeg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;576&quot; data-original-width=&quot;2266&quot; height=&quot;81&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpmbFM7eL9R4vAuhaIEFuhvP4_kkmrrITFff9KooshTgQhSS-VoenpTlOPSzsgPseAJ0rzgRIP-HHRU2Fr2_08XXjISu5DfDvksP-PPiFytktphGz_nakCeX-XIRf-d_SOOALC2RPMgkAVjkXtKyT176ahLgokUxYq8T7Ba_4Onse_MltzE_LVcFp8/s320/cicompass_logo.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Trusted CI’s Josh Drake has co-authored a new document addressing many identity management (IdM) challenges present at NSF Major Facilities. Due to their size and collaborative missions, Major Facilities often have many users, across multiple organizations, all with different access permissions to a diverse collection of CI resources. The Federated Identity Management Cookbook aims to address these challenges by providing time-tested “recipes” for building IdM capabilities, as well as a primer on the topic of IdM itself.&lt;p&gt;&lt;/p&gt;&lt;p&gt;“While operating the IdM working group and CI Compass, we had many opportunities to engage with major facilities on identity and access management issues facing researchers. We were able to explore a variety of options to help researchers integrate federated identities into their cyberinfrastructure,” said Josh Drake. “This cookbook represents the distilled version of months of engagement with the MF community and a primer to identity management concepts that we hope will be of use to research cyberinfrastructure operators everywhere.” Trusted CI’s Ryan Kiser and Adrian Crenshaw also participated in the engagements that contributed to the cookbook.&lt;/p&gt;&lt;p&gt;This work was created in partnership with Erik Scott (RENCI) and &lt;a href=&quot;https://ci-compass.org/&quot;&gt;CI Compass&lt;/a&gt;. CI Compass provides expertise and active support to cyberinfrastructure practitioners at NSF Major Facilities in order to accelerate the data lifecycle and ensure the integrity and effectiveness of the cyberinfrastructure upon which research and discovery depend.&lt;/p&gt;&lt;p&gt;The cookbook is available in the &lt;a href=&quot;https://ci-compass.org/resource-library/publication-the-federated-identity-management-cookbook/&quot;&gt;CI Compass Resource Library&lt;/a&gt;&amp;nbsp; and on &lt;a href=&quot;https://zenodo.org/record/6815944#.YtWYV-zMK3K&quot;&gt;Zenodo&lt;/a&gt;. See CI Compass’s website to &lt;a href=&quot;https://ci-compass.org/news-and-events/news/ci-compass-builds-resource-for-nsf-major-facilities-to-address-identity-management-challenges/&quot;&gt;read the full press release&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/9077785406797527111'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/9077785406797527111'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/07/idm-cookbook.html' title='Trusted CI Co-authors Identity Management Cookbook for NSF Major Facilities'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpmbFM7eL9R4vAuhaIEFuhvP4_kkmrrITFff9KooshTgQhSS-VoenpTlOPSzsgPseAJ0rzgRIP-HHRU2Fr2_08XXjISu5DfDvksP-PPiFytktphGz_nakCeX-XIRf-d_SOOALC2RPMgkAVjkXtKyT176ahLgokUxYq8T7Ba_4Onse_MltzE_LVcFp8/s72-c/cicompass_logo.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-302806800909359248</id><published>2022-07-26T11:47:00.001-04:00</published><updated>2022-07-26T11:54:32.084-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cohort"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity program"/><category scheme="http://www.blogger.com/atom/ns#" term="engagement"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="large facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><title type='text'>Advancing the Cybersecurity of NSF Major Facilities: Trusted CI’s Inaugural Framework Cohort Successfully Completes Six-Month Program (June 2022)</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiffeT6JqEtn9XBU8WF4taO7vda7kQW6xzY7iYHQmFzY1zpawVwaB6TRHaEl_AGJzSU2jQhyQIvQIq2CwXtDQGKeQB71gCFvd2mQaEErIRB_HtmKQk86oLQ4rRNwZOd8PEk2MVIMskUUalfb_ZCvLtN3-o0Rj_-qBvWOn868x-gbJULHQOBIWuvgYq/s401/Copy%20of%20cybersecurity%20program%20badge_logo.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;401&quot; data-original-width=&quot;401&quot; height=&quot;129&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiffeT6JqEtn9XBU8WF4taO7vda7kQW6xzY7iYHQmFzY1zpawVwaB6TRHaEl_AGJzSU2jQhyQIvQIq2CwXtDQGKeQB71gCFvd2mQaEErIRB_HtmKQk86oLQ4rRNwZOd8PEk2MVIMskUUalfb_ZCvLtN3-o0Rj_-qBvWOn868x-gbJULHQOBIWuvgYq/w129-h129/Copy%20of%20cybersecurity%20program%20badge_logo.png&quot; width=&quot;129&quot; /&gt;&lt;/a&gt;Trusted CI’s first Framework Cohort has successfully completed its initial six-month period of workshops designed to improve NSF Major Facilities’ alignment to the Trusted CI Framework. Each cohort member adopted the Trusted CI Framework as the foundation for their cybersecurity program. Additionally, each cohort member worked closely with Trusted CI to produce 1) a validated self-assessment of their cybersecurity program’s alignment with the Trusted CI Framework; and 2) a draft Cybersecurity Program Strategic Plan identifying priorities and directions for further refining their cybersecurity programs.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The inaugural Cohort included the following NSF Major Facilities:&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://www.unavco.org/&quot;&gt;Geodetic Facility for the Advancement of Geoscience (GAGE)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.ligo.caltech.edu/&quot;&gt;Laser Interferometer Gravitational-wave Observatory (LIGO)&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://noirlab.edu/public/&quot;&gt;NOIRLab&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://public.nrao.edu/&quot;&gt;National Radio Astronomy Observatory (NRAO)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://nso.edu/&quot;&gt;National Solar Observatory (NSO)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://oceanobservatories.org/&quot;&gt;Ocean Observatories Initiative (OOI)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;The success of the Framework Cohort is particularly notable as each of these facilities voluntarily adopted and rallied around the Trusted CI Framework as the foundation for their cybersecurity programs.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The foundation of the Cohort program is the &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;Trusted CI Framework&lt;/a&gt;, which was created as a minimum standard for cybersecurity programs. In contrast to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity.&lt;/p&gt;&lt;p&gt;For GAGE, LIGO, NRAO, NSO, and OOI, the Cohort was their first formal training in the Trusted CI Framework’s “Pillars” and “Musts” and how to apply these fundamental principles to assess and strengthen their cybersecurity programs. NOIRLab contributed their experience as an early adopter of the Framework, having previously completed a one-on-one Framework engagement with Trusted CI.&lt;/p&gt;&lt;p&gt;Feedback from members of the first cohort on their experience has been strongly positive:&lt;/p&gt;&lt;p&gt;Eric Cross, Head of Information Technology, National Solar Observatory, said the following about his experience:&lt;/p&gt;&lt;p&gt;&quot;The TrustedCI Framework Cohort was a valuable experience. The process required us to research and reflect on our internal cybersecurity policies and procedures. The Cohort provided a platform to meet with other facilities and work through challenges with feedback from peers. The experience resulted in formal documentation that provided our organization&#39;s leadership clear direction to improve our cybersecurity program with specific short-term and long-term goals. I highly recommend this exercise for all NSF facilities.&quot;&lt;/p&gt;&lt;p&gt;Craig Risien, CI Systems Project Manager, Ocean Observatories Initiative, said the following about his experience:&amp;nbsp;&lt;/p&gt;&lt;p&gt;“I found participating in Trusted CI’s first Framework Cohort to be exceptionally instructive and really enjoyed the opportunities to discuss cybersecurity challenges and lessons learned with Trusted CI and colleagues at other NSF Major Facilities. Working with Trusted CI on creating a validated self-assessment based on the Trusted CI Framework over the past six months has helped the Ocean Observatories Initiative (OOI) better understand the current state of its cybersecurity program. Being part of this cohort has also assisted the OOI with the development of a plan to fully implement the Trusted CI Framework and create a well-established and mature cybersecurity program. I look forward to the follow-on cohort sessions in the coming months.”&lt;/p&gt;&lt;p&gt;Trusted CI is continuing to support the first cohort through the end of 2022 by facilitating monthly workshops. Each facility will have the opportunity to lead a workshop in which they are encouraged to share their specific challenges and seek advice among the other cohort members.&lt;/p&gt;&lt;p&gt;Concurrently, Trusted CI is conducting its second cohort engagement leveraging the lessons learned from the first cohort. The second cohort includes the following organizations:&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://cenic.org/&quot;&gt;Corporation for Education Network Initiatives in California (CENIC)&lt;/a&gt;, a California research and education network&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.iodp.org/&quot;&gt;International Ocean Discovery Program (IODP)&lt;/a&gt;, an NSF Major Facility&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://fabric-testbed.net/&quot;&gt;FABRIC&lt;/a&gt;, an NSF Mid-Scale Research Infrastructure Facility&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.neonscience.org/&quot;&gt;National Ecological Observatory Network (NEON)&lt;/a&gt;, an NSF Major Facility&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.iris.edu/hq/&quot;&gt;Seismological Facility for the Advancement of GEoscience (SAGE)&lt;/a&gt;, an NSF Major Facility&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Trusted CI is excited to be working with these new facilities to advance their understanding and implementation of cybersecurity programs and best practices!&lt;/p&gt;&lt;p&gt;For more information, please contact us at &lt;a href=&quot;mailto:info@trustedci.org&quot;&gt;info@trustedci.org&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/302806800909359248'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/302806800909359248'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/07/advancing-cybersecurity-of-nsf-major.html' title='Advancing the Cybersecurity of NSF Major Facilities: Trusted CI’s Inaugural Framework Cohort Successfully Completes Six-Month Program (June 2022)'/><author><name>Kathy Benninger</name><uri>http://www.blogger.com/profile/06543545418478475494</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiffeT6JqEtn9XBU8WF4taO7vda7kQW6xzY7iYHQmFzY1zpawVwaB6TRHaEl_AGJzSU2jQhyQIvQIq2CwXtDQGKeQB71gCFvd2mQaEErIRB_HtmKQk86oLQ4rRNwZOd8PEk2MVIMskUUalfb_ZCvLtN3-o0Rj_-qBvWOn868x-gbJULHQOBIWuvgYq/s72-w129-h129-c/Copy%20of%20cybersecurity%20program%20badge_logo.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-7565324545336409135</id><published>2022-07-15T12:59:00.002-04:00</published><updated>2022-08-02T10:05:37.978-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="annual challenge"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber-physical systems"/><category scheme="http://www.blogger.com/atom/ns#" term="operational technology"/><title type='text'>Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research</title><content type='html'>&lt;p&gt;This year, Trusted CI is conducting a &lt;a href=&quot;https://blog.trustedci.org/2022/01/announcing-2022-trusted-ci-annual.html&quot;&gt;year-long effort on the security of operational technology in science&lt;/a&gt;. Operational technology (OT) encompasses broad categories of computing and communication systems that in some way interact with the physical world. &amp;nbsp;This includes devices that either have sensing elements or control elements, or some combination of the two. &amp;nbsp;Networked sensors and control systems are increasingly important in the context of science as they are critical in &amp;nbsp;operating scientific instruments. &amp;nbsp;Trusted CI is pleased to share its &lt;a href=&quot;https://doi.org/10.5281/zenodo.6828675&quot;&gt;findings&lt;/a&gt; from this study, published in the following report:&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Emily K. Adams, Daniel Gunter, Ryan Kiser, Mark Krenz, Sean Peisert, Susan Sons, and John Zage. “Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research,” July 13, 2022. DOI: 10.5281/zenodo.6828675 &amp;nbsp;&lt;span style=&quot;font-family: Times; orphans: 2; widows: 2;&quot;&gt;&lt;a href=&quot;https://doi.org/10.5281/zenodo.6828675&quot;&gt;https://doi.org/10.5281/zenodo.6828675&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;In support of this study, Trusted CI gratefully acknowledges the many individuals from the following NSF Major Facilities that contributed to this effort: &lt;a href=&quot;https://icecube.wisc.edu/&quot;&gt;IceCube Neutrino Observatory&lt;/a&gt;, &lt;a href=&quot;https://www.noirlab.edu/&quot;&gt;NOIRLab&lt;/a&gt;, &lt;a href=&quot;https://oceanobservatories.org/&quot;&gt;Ocean Observatories Initiative&lt;/a&gt;, and the &lt;a href=&quot;https://www.unols.org/&quot;&gt;United States Academic Research Fleet&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Now that Trusted CI has finished its examination of the current state of the security of OT in science, it will turn its focus to developing a roadmap of solutions to sustainably advance security of scientific operational technology, which will be published in late 2022.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7565324545336409135'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/7565324545336409135'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/07/findings-of-2022-trusted-ci-study-on.html' title='Findings of the 2022 Trusted CI Study on the Security of Operational Technology in NSF Scientific Research'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-5483309379398790923</id><published>2022-06-30T11:43:00.003-04:00</published><updated>2022-06-30T11:50:36.279-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2022 Jean-Claude Laprie Award in Dependable Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Bart Miller"/><category scheme="http://www.blogger.com/atom/ns#" term="IEEE/IFIP International Conference on Dependable Systems and Networks"/><category scheme="http://www.blogger.com/atom/ns#" term="Trusted CI"/><title type='text'>Trusted CI co-PI Bart Miller wins award for landmark paper on dependable computing</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Bart Miller, Trusted CI co-PI, and his two student co-authors were honored with the 2022 Jean-Claude Laprie Award in Dependable Computing on June 28 in Baltimore, Md. Miller, along with L. Fredriksen, and B. So, were presented the award during the opening session of the Annual &lt;a href=&quot;https://dsn2022.github.io/&quot; target=&quot;_blank&quot;&gt;IEEE/IFIP International Conference on Dependable Systems and Networks&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The groundbreaking paper, “An Empirical Study of the Reliability of UNIX Utilities,&quot; published in 1990, launched the field of fuzz random testing, or fuzzing as it is commonly called. The paper created a new technique for easy-to-use software testing and then used that technique to evaluate UNIX utilities crashes. As part of this research, the authors also studied the root causes of the failures. They also released its code and data openly (a novelty at that time). The paper has been cited more than 1,300 times and was responsible for creating an entire new branch of testing and security research. Hundreds of papers and tens of PhD dissertations are produced each year in this area.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Today, fuzzing is taught in introductory software testing and security courses, is a prominent area of focus at numerous conferences, and is recognized by major companies. For example, Microsoft recently published a paper on how they integrate fuzzing in the life cycle of almost all their products. Similarly, Google recently reported that 80 percent of the bugs they find in production in the Chrome web browser are due to fuzzing.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Fuzzing is heavily used in security research and is often the tool of choice for penetration testers. Thus, this paper has important implications for reliability and security research.&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;About Bart Miller&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBRsuvimVNgvL727p2kkfmHtlw-WX-V7hDAVUwZ__STLZlG-o18LC2yIZX5a6yaGqUt8rwPIn8ut3tSP3JTZvSSxLb5LXX-zx-v0s3wO68VOiQ6sEra8Mlxf3dE0ND6Nk7wO-MFRU623e-mFhjErz0XehYpAvTl3ugx1x4rM9eI_a5EdtRPr6GOx7-/s2576/062822BartMiller+8CUairplane.jpg&quot; style=&quot;clear: left; display: inline; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1932&quot; data-original-width=&quot;2576&quot; height=&quot;392&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBRsuvimVNgvL727p2kkfmHtlw-WX-V7hDAVUwZ__STLZlG-o18LC2yIZX5a6yaGqUt8rwPIn8ut3tSP3JTZvSSxLb5LXX-zx-v0s3wO68VOiQ6sEra8Mlxf3dE0ND6Nk7wO-MFRU623e-mFhjErz0XehYpAvTl3ugx1x4rM9eI_a5EdtRPr6GOx7-/w523-h392/062822BartMiller+8CUairplane.jpg&quot; width=&quot;523&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Bart Miller with his Cessna TR182 that he bought in 1980. He&#39;s had his commercial pilots license since 1979.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Barton Miller is the Vilas Distinguished Achievement Professor at the University of Wisconsin-Madison. Co-PI on Trusted CI, where he leads the software assurance effort. Research interests include software security, in-depth vulnerability assessment, and binary code analysis. In 1988, Miller founded the field of fuzz random software testing, a foundation of many security and software engineering disciplines. In 1992, Miller and his then­-student Jeffrey Hollingsworth founded the field of dynamic binary code instrumentation and coined the term “dynamic instrumentation.” Miller is a Fellow of the ACM.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;About the Jean-Claude Laprie Award in Dependable Computing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The &lt;a href=&quot;https://www.dependability.org/?page_id=450&quot;&gt;award&lt;/a&gt; was created in 2011, in honor of Jean-Claude Laprie (1944-2010), whose pioneering contributions to the concepts and methodologies of dependability were influential in defining and unifying the field of dependable and secure computing. The award recognizes outstanding papers that have significantly influenced the theory and/or practice of dependable computing.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;About IFIP WG 10.4 on Dependable Computing and Fault Tolerance&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.dependability.org/?page_id=265&quot;&gt;IFIP Working Group 10.4&lt;/a&gt; was established in 1980 with the aim of identifying and integrating approaches, methods, and techniques for specifying, designing, building, assessing, validating, operating, and maintaining dependable computer systems (those that are reliable, available, safe, and secure). Its 75 members from around the world meet twice a year to conduct in-depth discussions of important technical topics to further the understanding of the fundamental concepts of dependable computing.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;About the International Federation for Information Processing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.ifip.org/&quot;&gt;IFIP&lt;/a&gt; is a non-governmental, non-profit umbrella organization for national societies working in the field of information processing. It was established in 1960 under the auspices of UNESCO as a result of the first World Computer Congress held in Paris in 1959. It is the leading multinational, apolitical organization in Information and Communications Technologies and Sciences.&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/5483309379398790923'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/5483309379398790923'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/06/trusted-ci-co-pi-bart-miller-wins-award.html' title='Trusted CI co-PI Bart Miller wins award for landmark paper on dependable computing'/><author><name>Julie Songer</name><uri>http://www.blogger.com/profile/16161323599287966774</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='28' height='32' src='//3.bp.blogspot.com/-vz8_E72P63A/X6v_QaAML_I/AAAAAAAAAA8/LAKfZGcPW_gOjTBrHHvPN4nZ-3AqNTf0wCK4BGAYYCw/s220/JulieatCiot.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBRsuvimVNgvL727p2kkfmHtlw-WX-V7hDAVUwZ__STLZlG-o18LC2yIZX5a6yaGqUt8rwPIn8ut3tSP3JTZvSSxLb5LXX-zx-v0s3wO68VOiQ6sEra8Mlxf3dE0ND6Nk7wO-MFRU623e-mFhjErz0XehYpAvTl3ugx1x4rM9eI_a5EdtRPr6GOx7-/s72-w523-h392-c/062822BartMiller+8CUairplane.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6731583407413830001</id><published>2022-06-27T14:34:00.000-04:00</published><updated>2022-06-27T14:34:32.237-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="project-news"/><title type='text'>Announcement of Trusted CI Director Transition</title><content type='html'>&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt;Dear Trusted CI community, friends, and partners,&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt;After 10 years of directing Trusted CI, I am stepping down as Trusted CI Director today. I thank all of you for your support over the past decade - you have made my job both a huge privilege and a pleasure. I also extend my gratitude to NSF for providing this unique opportunity.&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-b4f53a56-7fff-2752-b412-ccbb1e533228&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I’m excited to share that Jim Basney has agreed to accept the role of Trusted CI Director. Jim has served as Trusted CI’s Deputy Director for the past three years and has been part of its leadership team since its inception. I suspect most of you already know Jim and will join me in my optimism that Jim will serve as an excellent leader for Trusted CI’s second decade.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I thank Jim for his contributions as deputy, which I found invaluable, and I’m happy to also share that Jim will receive similar support from Sean Peisert, who has agreed to serve as Trusted CI Deputy Director going forward. Since Sean joined Trusted CI in 2019 he has made strong leadership contributions, including serving as a co-PI the last year&amp;nbsp; and leading annual challenges and the OSCRP effort.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Kelli Shute will be staying on as Executive Director and has my thanks for her contributions in this role both past and into the future. Jim, Sean, and Kelli will be supported by the rest of the current leadership team: Kathy Benninger, Professor Bart Miller, and Mark Krenz.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I ask you to join me in congratulating Jim and Sean, and providing them and the rest of the team with the same support and collaboration going forward which you extended to me over the past decade. You can contact Jim and Sean directly at &lt;/span&gt;&lt;a href=&quot;mailto:jbasney@illinois.edu&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #1155cc; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;jbasney@illinois.edu&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;mailto:sppeisert@lbl.gov&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #1155cc; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;sppeisert@lbl.gov&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;While my stepping down as Trusted CI Director is part of a larger life change I am making in that I will be leaving Indiana University at the end of the month, I will remain involved with Trusted CI to support this transition.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Thank you, it has been an honor.&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 10pt; margin-top: 0pt;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Von&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6731583407413830001'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6731583407413830001'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/06/announcement-of-trusted-ci-director.html' title='Announcement of Trusted CI Director Transition'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-9019943000356775274</id><published>2022-06-22T14:02:00.000-04:00</published><updated>2022-06-22T14:02:57.901-04:00</updated><title type='text'>Indiana University Center for Applied Cybersecurity Research releases an “ Effective Cybersecurity for Research” Whitepaper</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The tension between cybersecurity and research has kept institutional cybersecurity efforts for research confined to the most sensitive research, especially in academia.&amp;nbsp; Evolving threats and new cybersecurity requirements scoped beyond individual awards are now slated to change the status quo.&amp;nbsp; They point to a future where securing research &lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;holistically&lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; is no longer optional.&amp;nbsp; Indiana University’s Center for Applied Cybersecurity Research released a paper this week outlining an approach to cybersecurity for research that shows great promise in breaking the prevailing security versus research impasse. It focuses exclusively on the researcher and the research mission, reduces the cybersecurity and compliance burden on the researcher, and secures not only research subject to rules and regulations, but &lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;all&lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; research.&amp;nbsp; It is being embraced by researchers &lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;voluntarily &lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;and accelerating research &lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;measurably&lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-fa5d4e5c-7fff-6268-65b9-030c3beea539&quot;&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 30pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The paper can be accessed by visiting this EDUCAUSE library page:&amp;nbsp; &lt;/span&gt;&lt;a href=&quot;https://library.educause.edu/resources/2022/6/effective-cybersecurity-for-research&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Garamond, serif; font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Effective Cybersecurity for Research&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/9019943000356775274'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/9019943000356775274'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/06/indiana-university-center-for-applied.html' title='Indiana University Center for Applied Cybersecurity Research releases an “ Effective Cybersecurity for Research” Whitepaper'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1834041784840197807</id><published>2022-05-24T11:34:00.002-04:00</published><updated>2022-05-24T11:34:39.658-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'> 2022 NSF Cybersecurity Summit- Call for Participation is now open- Submission deadline June 10th</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;We are pleased&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;to an&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Arial, sans-serif;&quot;&gt;nounce that the 2022 NSF Cybersecurity Summit is taking place the week of October 17th with the training and workshops occurring on &lt;/span&gt;&lt;u style=&quot;font-family: Arial, sans-serif;&quot;&gt;Tuesday, October 18th, &lt;/u&gt;&lt;span style=&quot;background-color: white; font-family: Arial, sans-serif;&quot;&gt;and plenary sessions occurring on &lt;/span&gt;&lt;u style=&quot;font-family: Arial, sans-serif;&quot;&gt;Wednesday, October 19th, and Thursday, October 20th.&amp;nbsp;&lt;/u&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;background: white; font-family: Arial, sans-serif;&quot;&gt;The final program is still evolving, but we will maintain our mission of providing a format designed to increase the NSF community’s understanding of cybersecurity strategies that strengthen trustworthy science: what data, processes, and systems are crucial to the scientific mission, what risks they face, and how to protect them.&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;h3 style=&quot;background: white; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 11pt;&quot;&gt;Call for Participation (CFP)&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/h3&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;background: white; font-family: Arial, sans-serif;&quot;&gt;Program content for the Summit is driven by our community. We invite proposals for plenary presentations &amp;amp; workshops. The deadline for CFP submissions is July 8th. To learn more about the CFP, please visit: &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/2022-summit-cfp&quot;&gt;&lt;span style=&quot;background: white; color: #1155cc; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;www.trustedci.org/2022-summit-cfp&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;h3 style=&quot;background: white; margin: 0in;&quot;&gt;&lt;span style=&quot;background: rgb(250, 250, 250); font-family: Arial, sans-serif; font-size: 11pt;&quot;&gt;Student Program&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/h3&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;To support workforce development, the Summit organizers invite several students to attend the Summit at no cost every year. Both undergraduate and graduate students may apply, and no specific major or course of study is required, as long as the student is interested in learning and applying cybersecurity innovations to scientific endeavors. To learn more about the student program, visit our website: &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/summit2022/students&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;https://www.trustedci.org/summit2022/students&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;On behalf of the 2022 NSF Cybersecurity Summit organizers and program committee, we welcome your participation and hope to see you in October.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;More information can be found at:&lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/2022-cybersecurity-summit&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt; https://www.trustedci.org/2022-cybersecurity-summit&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1834041784840197807'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1834041784840197807'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/05/2022-nsf-cybersecurity-summit-call-for.html' title=' 2022 NSF Cybersecurity Summit- Call for Participation is now open- Submission deadline June 10th'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-2436703661061823481</id><published>2022-05-13T11:08:00.001-04:00</published><updated>2022-05-13T11:08:47.475-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="annual challenge"/><category scheme="http://www.blogger.com/atom/ns#" term="software assurance"/><title type='text'>Better Scientific Software (BSSw) Helps Promote Trusted CI Guide to Securing Scientific Software</title><content type='html'>&lt;p&gt;Trusted CI is grateful to &lt;a href=&quot;https://bssw.io&quot;&gt;Better Scientific Software (BSSw)&lt;/a&gt; for helping to publicize the results of Trusted CI’s software security &lt;a href=&quot;https://blog.trustedci.org/2021/03/announcing-2021-trusted-ci-annual.html&quot;&gt;study&lt;/a&gt;, including its recently published &lt;a href=&quot;https://hdl.handle.net/2022/26799&quot;&gt;findings report&lt;/a&gt; and &lt;i&gt;&lt;a href=&quot;https://zenodo.org/record/5777646#.YbjuVL3MKUk&quot;&gt;Guide to Securing Scientific Software (GS3)&lt;/a&gt;&lt;/i&gt;, via its widely-read blog. &amp;nbsp;Read &lt;a href=&quot;https://bssw.io/blog_posts/trusted-cyberinfrastructure-evaluation-guidance-and-programs-for-assurance-of-scientific-software&quot;&gt;the full blog post here&lt;/a&gt;.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2436703661061823481'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2436703661061823481'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/05/better-scientific-software-bssw-helps.html' title='Better Scientific Software (BSSw) Helps Promote Trusted CI Guide to Securing Scientific Software'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6960239772964630080</id><published>2022-05-10T08:17:00.007-04:00</published><updated>2022-07-25T15:35:35.732-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="ren-isac"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: Ransomware: Threats &amp; Mitigations, June 27th @11am EST</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqz03f6w8R7gFjQFWd1PvW83H-fYDRqmaURTXzeUe6M7ZlFFP5yDM31HTM1_I4r_xKVZFJA98LT27680YbRVvdNfJaNk_fdAfubHVjvz8vsBZIl6yYc4CkJUC-5ZtWdFVzVCjWEkCK4Wvzv1WX4EuGF1jKcJe5b3eOdjAU6hksPTfaK11FyeO6E2mI/s576/ren-isac%20logo%20.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;138&quot; data-original-width=&quot;576&quot; height=&quot;77&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqz03f6w8R7gFjQFWd1PvW83H-fYDRqmaURTXzeUe6M7ZlFFP5yDM31HTM1_I4r_xKVZFJA98LT27680YbRVvdNfJaNk_fdAfubHVjvz8vsBZIl6yYc4CkJUC-5ZtWdFVzVCjWEkCK4Wvzv1WX4EuGF1jKcJe5b3eOdjAU6hksPTfaK11FyeO6E2mI/s320/ren-isac%20logo%20.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;i&gt;This event was originally scheduled to occur on May 23rd and has been rescheduled to June 27th.&lt;/i&gt; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;REN-ISAC&#39;s Sarah Bigham and Krysten Stevens will be presenting the talk, &lt;i&gt;Ransomware: Threats &amp;amp; Mitigations&lt;/i&gt;, on Monday June 27th at 11am (Eastern).&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_VqK7OK5aSfKKt6G67cKIIg&quot;&gt;register here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;The education industry has unceremoniously emerged as the second most common target for ransomware. It continues to evolve in how it is used as a fund-raiser for criminal organizations and how the technology works, to keep its victims guessing as to defense and eradication. Institutions face the difficult challenge of preserving academic freedom, easy access to information, and open collaboration while defending from threat actors who exploit these same characteristics. This presentation will focus on the current threats and provide guidance on protecting against ransomware attacks.&lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Speaker Bios&lt;/b&gt;:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Sarah Bigham&lt;/u&gt;: joined the REN-ISAC in March 2014. As Lead Security Analyst, her day-to-day responsibilities include managing the REN-ISAC Blended Threat&amp;nbsp; Workshops, working closely with the National Council of ISACs (NCI), FBI, DHS, and other state and federal peers to stay abreast of new and emerging threats, as well as special projects, and&amp;nbsp; member relations. Before coming to the REN-ISAC, Sarah worked at Harvard University as a Systems Support Specialist focusing on campus-wide Identity &amp;amp; Access Management (IdM) and HIPAA compliance for Harvard University Health Services. Prior to that, Sarah was a defense contractor at the United States Naval Academy where she focused on user and desktop support across the Yard for all faculty, staff, and midshipmen. Sarah holds an Associate of Applied Science in Computer Network Management from Anne Arundel Community College (Annapolis, MD) and a Bachelor of Science in Information Systems Management from University of Maryland Global Campus.&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Krysten Stevens&lt;/u&gt; joined REN-ISAC as Director of Technical Operations in 2020. She has a background in IT security analysis and cyber threat intelligence from Purdue University, where she used her leadership and expertise to train other security analysts, create security awareness programs, and develop threat intelligence strategies on an organizational level. Krysten graduated from Purdue University Global with an MS Cybersecurity Management in 2020, and she holds CISSP and GCTI certifications. When not at work, Krysten enjoys spending time with her husband, two children, five cats, and two golden retrievers (who refuse to retrieve).&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;---&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://list.iu.edu/sympa/subscribe/ctsc-announce-l&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6960239772964630080'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6960239772964630080'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/05/may-webinar-ransomware.html' title='Trusted CI Webinar: Ransomware: Threats &amp; Mitigations, June 27th @11am EST'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqz03f6w8R7gFjQFWd1PvW83H-fYDRqmaURTXzeUe6M7ZlFFP5yDM31HTM1_I4r_xKVZFJA98LT27680YbRVvdNfJaNk_fdAfubHVjvz8vsBZIl6yYc4CkJUC-5ZtWdFVzVCjWEkCK4Wvzv1WX4EuGF1jKcJe5b3eOdjAU6hksPTfaK11FyeO6E2mI/s72-c/ren-isac%20logo%20.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-3912771154253415055</id><published>2022-05-05T12:07:00.002-04:00</published><updated>2022-05-19T08:18:35.641-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity programs"/><category scheme="http://www.blogger.com/atom/ns#" term="engagements"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="large facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><title type='text'>Call for Trusted CI Framework Cohort Participation</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYddvEy9VlRzIoPopacVd6etEAJcHr54-NoRuA8tiQrYrsOX4ImqLrROCW27lyCOwj5Dl4klAgVcqnW8MpltN04tSsXjDgW-SUKbdNt_qd2JQWmiiUmK_314eS7l5CGIyufrjGXlYfLw2rA4MLkO7oWkHg5nh_8FKByakApanM38pNXfknBGNMEGJR/s137/Large%20All%20Pillars.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;122&quot; data-original-width=&quot;137&quot; height=&quot;122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYddvEy9VlRzIoPopacVd6etEAJcHr54-NoRuA8tiQrYrsOX4ImqLrROCW27lyCOwj5Dl4klAgVcqnW8MpltN04tSsXjDgW-SUKbdNt_qd2JQWmiiUmK_314eS7l5CGIyufrjGXlYfLw2rA4MLkO7oWkHg5nh_8FKByakApanM38pNXfknBGNMEGJR/s1600/Large%20All%20Pillars.png&quot; width=&quot;137&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: large;&quot;&gt;The Framework Cohort is a six month, group engagement aimed at facilitating adoption and implementation of the &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/framework&quot; style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;Trusted CI Framework&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: large;&quot;&gt; among NSF Major Facilities. During the engagement, members of the cohort will work closely with Trusted CI to adopt the Trusted CI&amp;nbsp; Framework at their facility, emerging with a validated assessment of their cybersecurity program and a strategic plan detailing their path to fully implement each Framework Must.Cohort members will participate in six monthly workshops (each three hours) and spend no more than eight hours each month outside of the workshops&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Garamond, serif; font-size: large;&quot;&gt;on cohort assignments. The second cohort will meet from July to December 2022.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0in 0in 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;Since January 2022, Trusted CI has been working with six Major Facilities in the inaugural Framework cohort: &lt;/span&gt;&lt;a href=&quot;https://www.unavco.org/what-we-do/gage-facility/&quot;&gt;&lt;span style=&quot;color: #3778cd; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;GAGE, &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://www.ligo.caltech.edu/&quot;&gt;&lt;span style=&quot;color: #3778cd; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;LIGO, &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://noirlab.edu/public/&quot;&gt;&lt;span style=&quot;color: #3778cd; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;NOIRLab, &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://public.nrao.edu/&quot;&gt;&lt;span style=&quot;color: #3778cd; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;NRAO, &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://nso.edu/&quot;&gt;&lt;span style=&quot;color: #3778cd; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;NSO and &lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://oceanobservatories.org/&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;OOI&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;. As this inaugural Framework cohort approaches completion in June 2022, Trusted CI is looking for Major Facilities that are interested in participating in the upcoming second cohort.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0in 0in 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;NSF Major Facilities interested in participating in the Framework cohort should respond to the call by completing the form at the bottom of this page: &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/trusted-ci-framework-cohort-participation&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Garamond&amp;quot;,serif;&quot;&gt;https://www.trustedci.org/trusted-ci-framework-cohort-participation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0in 0in 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;If you have any questions, please contact us at &lt;/span&gt;&lt;a href=&quot;mailto:info@trustedci.org&quot; style=&quot;font-family: Garamond, serif;&quot;&gt;info@trustedci.org&lt;/a&gt;&lt;span style=&quot;font-family: Garamond, serif;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0in 0in 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3912771154253415055'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3912771154253415055'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/05/call-for-trusted-ci-framework-cohort.html' title='Call for Trusted CI Framework Cohort Participation'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYddvEy9VlRzIoPopacVd6etEAJcHr54-NoRuA8tiQrYrsOX4ImqLrROCW27lyCOwj5Dl4klAgVcqnW8MpltN04tSsXjDgW-SUKbdNt_qd2JQWmiiUmK_314eS7l5CGIyufrjGXlYfLw2rA4MLkO7oWkHg5nh_8FKByakApanM38pNXfknBGNMEGJR/s72-c/Large%20All%20Pillars.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-2534675377920022022</id><published>2022-05-05T09:34:00.003-04:00</published><updated>2022-05-05T09:34:55.535-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'>2022 NSF Summit Student Program-Call For Application </title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Every year, Trusted CI organizes and hosts the NSF Cybersecurity Summit to bring together leaders in NSF cybersecurity and cyberinfrastructure. To support workforce development, the Summit organizers invite several students to attend the Summit at no cost every year. Both undergraduate and graduate students may apply, no specific major or course of study is required, as long as the student is interested in learning and applying cybersecurity innovations to scientific endeavors.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Students may either self-nominate or be nominated by a mentor or teacher.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;To be considered, students must submit a one-page letter (800-word maximum) describing their interest in and any relevant experience with cybersecurity, emphasizing the benefit to the student and/or community of their attendance at the Summit.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;This letter must include the student&#39;s name, contact information, the institution of higher education of attendance, and their current expected year of graduation. A resume may be submitted in substitution for the requested information.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Up to fifteen successful student applicants will receive invitations to attend the Summit at no cost.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;All applications will be reviewed by the Program Committee and students will be selected. The Program Committee will select students with an interest in advancing diversity and inclusiveness in the program.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;The deadline for applications is August&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt; 1, 2022, with notification of acceptance to be sent by August 10, 2022.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Please discuss attendance with your instructors prior to attending.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://docs.google.com/forms/d/e/1FAIpQLSf2y2uMYbqvwQYdb0wImG7SSsI1sHNkDByw8RPUrjKYv2clZA/viewform?usp=sf_link&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;APPLY TO ATTEND SUMMIT (FORM)&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;For more information on the event itself, please visit:&lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/2022-cybersecurity-summit&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: #1155cc; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;https://www.trustedci.org/2022-cybersecurity-summit&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Tips for Applying:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;The most successful applicants will...&lt;/span&gt;&lt;/p&gt; &lt;ul style=&quot;margin-top: 0in; padding-inline-start: 48px;&quot; type=&quot;disc&quot;&gt; &lt;li class=&quot;MsoNormal&quot; style=&quot;color: black; mso-list: l0 level1 lfo1; tab-stops: list .5in; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Be prepared to actively engage      and participate with the programming.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt; &lt;li class=&quot;MsoNormal&quot; style=&quot;color: black; mso-list: l0 level1 lfo1; tab-stops: list .5in; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Make it known that they are      interested in complex cybersecurity needs around and new, efficient,      effective ways to protect information assets while supporting science,      even if they are new to the subject matter - let the program committee      know why you are interested in this subject matter ; and&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt; &lt;li class=&quot;MsoNormal&quot; style=&quot;color: black; margin-bottom: 12.0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Relay at      least 1-3 personal goals they would strive to meet while at the summit.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Highlighting these interests in the application will allow the review committee to understand why the student feels he or she will be best suited to attend the conference.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 12.0pt; margin-left: 0in; margin-right: 0in; margin-top: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Send questions to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #1155cc; font-family: Arial, sans-serif;&quot;&gt;&lt;a href=&quot;mailto:students@trustedci.org&quot;&gt;students@trustedci.org&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2534675377920022022'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/2534675377920022022'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/05/2022-nsf-summit-student-program-call.html' title='2022 NSF Summit Student Program-Call For Application '/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-3568087875618825790</id><published>2022-04-18T10:01:00.001-04:00</published><updated>2022-04-18T10:01:37.082-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cici"/><category scheme="http://www.blogger.com/atom/ns#" term="solicitations"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>NSF Announces CICI Program Solicitation</title><content type='html'>&lt;p&gt;NSF’s &lt;a href=&quot;https://www.nsf.gov/div/index.jsp?div=OAC&quot; target=&quot;_blank&quot;&gt;Office of Advanced Cyberinfrastructure&lt;/a&gt; recently announced &lt;a href=&quot;https://www.nsf.gov/publications/pub_summ.jsp?WT.z_pims_id=505159&amp;amp;ods_key=nsf22581&quot; target=&quot;_blank&quot;&gt;solicitation 22-581&lt;/a&gt; in the Cybersecurity Innovation for Cyberinfrastructure program. Proposals, due June 27, are solicited in three areas:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Usable and Collaborative Security for Science (UCSS)&lt;/li&gt;&lt;li&gt;Reference Scientific Security Datasets (RSSD)&lt;/li&gt;&lt;li&gt;Transition to Cyberinfrastructure Resilience (TCR)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;NSF is hosting a &lt;a href=&quot;https://www.nsf.gov/events/event_summ.jsp?cntn_id=304910&amp;amp;org=CISE&quot; target=&quot;_blank&quot;&gt;webinar&lt;/a&gt; covering the objectives of the CICI program on April 27th at 2 PM Eastern. During the 90-minute webinar, Program Director Robert Beverly will discuss the program and answer questions. The presentation portion of the webinar will be recorded and posted on the &lt;a href=&quot;https://beta.nsf.gov/funding/opportunities/cybersecurity-innovation-cyberinfrastructure-cici&quot; target=&quot;_blank&quot;&gt;CICI program website&lt;/a&gt;. Please &lt;a href=&quot;https://nsf.zoomgov.com/webinar/register/WN_EvKEwxTgQJW1fRwFpUr6wQ&quot; target=&quot;_blank&quot;&gt;register&lt;/a&gt; to attend.&lt;/p&gt;&lt;p&gt;As a reminder, you can find resources for including Trusted CI in your proposal on &lt;a href=&quot;https://www.trustedci.org/includingtrustedci&quot; target=&quot;_blank&quot;&gt;our website&lt;/a&gt;.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3568087875618825790'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/3568087875618825790'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/04/nsf-announces-cici-program-solicitation.html' title='NSF Announces CICI Program Solicitation'/><author><name>Kelli Shute</name><uri>http://www.blogger.com/profile/08611415753623346274</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-8095008592259084585</id><published>2022-04-12T16:06:00.001-04:00</published><updated>2022-04-12T16:08:03.318-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI webinar: Updates from the Trusted CI Framework Cohort, April 25th @11am EST</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXq-HDhqTbxQhTsP1lp1iZ8846T_QNRp1BzuCluQt3VRA4P605hivI9uCMO2j8DXl8D1Smjex1jye_hImY4rTQH9x5NAeOhgR3Yl0IksXlc5KliBCDy6GSB-Pp2pm5HwCrrR6-a_A_pxOyHauuC7FYKQiEHYUp5sD3yvoVyQAScrtQB1QzDMN-QY4/s385/scott%20and%20pillars.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;385&quot; data-original-width=&quot;204&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXq-HDhqTbxQhTsP1lp1iZ8846T_QNRp1BzuCluQt3VRA4P605hivI9uCMO2j8DXl8D1Smjex1jye_hImY4rTQH9x5NAeOhgR3Yl0IksXlc5KliBCDy6GSB-Pp2pm5HwCrrR6-a_A_pxOyHauuC7FYKQiEHYUp5sD3yvoVyQAScrtQB1QzDMN-QY4/s320/scott%20and%20pillars.png&quot; width=&quot;170&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Trusted CI&#39;s Scott Russell will be presenting the talk, &lt;i&gt;Updates from the Trusted CI Framework Cohort&lt;/i&gt;, on Monday April 25th at 11am (Eastern).&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_zD0MMn-MRfqTPLmTLxyX_A&quot;&gt;register here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;The Trusted CI Framework is a minimum standard for cybersecurity programs. In response to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity. In order to encourage adoption of the Trusted CI Framework, we have created a program called the Framework Cohort, where representatives from multiple NSF Major Facilities and other &quot;Key Projects&quot; participate in a group engagement with Trusted CI focused on adoption and implementation of the Framework.&lt;br /&gt;&lt;br /&gt;This webinar will provide updates from the inaugural cohort, currently in progress, and discuss the opportunity to participate in future cohorts.&lt;br /&gt;&lt;br /&gt;More information about the Framework can be found at &lt;a href=&quot;https://www.trustedci.org/framework&quot;&gt;https://www.trustedci.org/framework&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Speaker Bio&lt;/b&gt;:&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Scott Russell is a Senior Policy Analyst at the Indiana University Center for Applied Cybersecurity Research. Scott was previously the Postdoctoral Fellow in Information Security Law &amp;amp; Policy. Scott’s work thus far has emphasized private sector cybersecurity best practices, data aggregation and the First and Fourth Amendments, and cybercrime in international law. Scott studied Computer Science and History at the University of Virginia and received his J.D. from the Indiana University, Maurer School of Law.&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;---&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://list.iu.edu/sympa/subscribe/ctsc-announce-l&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8095008592259084585'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8095008592259084585'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/04/updates-framework-cohort.html' title='Trusted CI webinar: Updates from the Trusted CI Framework Cohort, April 25th @11am EST'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXq-HDhqTbxQhTsP1lp1iZ8846T_QNRp1BzuCluQt3VRA4P605hivI9uCMO2j8DXl8D1Smjex1jye_hImY4rTQH9x5NAeOhgR3Yl0IksXlc5KliBCDy6GSB-Pp2pm5HwCrrR6-a_A_pxOyHauuC7FYKQiEHYUp5sD3yvoVyQAScrtQB1QzDMN-QY4/s72-c/scott%20and%20pillars.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-8577690207610727437</id><published>2022-04-06T15:51:00.000-04:00</published><updated>2022-04-06T15:51:22.902-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="events"/><category scheme="http://www.blogger.com/atom/ns#" term="NSF Summit"/><title type='text'>SAVE THE DATE: Announcing the 2022 NSF Cybersecurity Summit, Oct 18-20 in Bloomington, Indiana</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Please mark your calendars for the 2022 NSF Cybersecurity Summit planned for October 18-20 at the Monroe Convention Center, Bloomington, Indiana, near the Indiana University Campus&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;&lt;span id=&quot;docs-internal-guid-58679f0b-7fff-c9e3-764e-c3555e349a01&quot;&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Plenary sessions are scheduled to take place October 19&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-size: 0.6em; vertical-align: super;&quot;&gt;th&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; and 20&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-size: 0.6em; vertical-align: super;&quot;&gt;th&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, while training and workshops will take place on the 18&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-size: 0.6em; vertical-align: super;&quot;&gt;th&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Stay tuned for more information by following the &lt;/span&gt;&lt;a href=&quot;http://blog.trustedci.org/&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;background-color: white; color: #1155cc; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI Blog&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; or our &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/trustedci-email-lists&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;background-color: white; color: #1155cc; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Announcement email&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; list&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; for more updates.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;On behalf of Trusted CI&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;color: #444444; font-size: 10pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;!--[endif]--&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8577690207610727437'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/8577690207610727437'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/04/save-date-announcing-2022-nsf.html' title='SAVE THE DATE: Announcing the 2022 NSF Cybersecurity Summit, Oct 18-20 in Bloomington, Indiana'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-5947215133402758969</id><published>2022-04-04T11:07:00.000-04:00</published><updated>2022-04-04T11:07:15.415-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fellows"/><title type='text'>Trusted CI Fellows urge researchers to protect their data </title><content type='html'>&lt;p&gt;Each year, Trusted CI selects a small number of community members to become Trusted CI Fellows. They make connections in the research cybersecurity community and receive training, knowledge, and skills from Trusted CI, which they can then take back into their local communities to advance the state of cybersecurity for research and serve as an ongoing Trusted CI liaison. Trusted CI also asks Fellows to produce a report to capture and share what they’ve learned and how it applies to their domain.&lt;/p&gt;&lt;p&gt;Trusted CI Fellows Deb McCaffrey and Michael Kyle have examined the security needs of higher education researchers in recently published reports. Having augmented their security knowledge from Trusted CI webinars and workshops, they advise researchers to take a systemic approach to protecting their data.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In her Trusted CI &lt;a href=&quot;https://hdl.handle.net/2022/27401&quot; target=&quot;_blank&quot;&gt;report&lt;/a&gt;, Deb McCaffrey, a research computing facilitator at the University of Michigan, explores the security needs of basic and clinical research. She concludes that researchers need a better understanding of their security environments to protect their data.&lt;/p&gt;&lt;p&gt;Michael Kyle is a scientific applications consultant for the University of Delaware. In his Trusted CI &lt;a href=&quot;https://hdl.handle.net/2022/27400&quot;&gt;report&lt;/a&gt;, he describes how researchers can manage their risks with the proper classification and protection of digital research data.&lt;/p&gt;&lt;p&gt;Trusted CI thanks Deb and Michael for these contributions and will highlight these and future Fellows reports in the &lt;a href=&quot;https://www.trustedci.org/fellows/about&quot; target=&quot;_blank&quot;&gt;Fellows&lt;/a&gt; section of the Trusted CI website.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/5947215133402758969'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/5947215133402758969'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/04/trusted-ci-fellows-urge-researchers-to.html' title='Trusted CI Fellows urge researchers to protect their data '/><author><name>Julie Songer</name><uri>http://www.blogger.com/profile/16161323599287966774</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='28' height='32' src='//3.bp.blogspot.com/-vz8_E72P63A/X6v_QaAML_I/AAAAAAAAAA8/LAKfZGcPW_gOjTBrHHvPN4nZ-3AqNTf0wCK4BGAYYCw/s220/JulieatCiot.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-4116573984801365429</id><published>2022-03-28T15:43:00.000-04:00</published><updated>2022-03-28T15:43:04.415-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="reports"/><category scheme="http://www.blogger.com/atom/ns#" term="Trusted CI"/><title type='text'>Trusted CI Publishes 2022 Report Summarizing its Impact on Over 500 NSF Projects</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvWZgv4xoLT4Y8GXC-RARcYZyuZ6zK1Ia_s8mBKwMnhk8-pkAPEomUeMqEn6n7j3c5SwaMN0e8RQ0F8TavrTF68S4WDUaqg5YRmDYX5Ckb17f4QK2wV5ga7xpvPtag2O9G3wNsTJAkME5ZdNEb17eIpLTmiaNreRysSjd9NVWgLme-nU76OyPzicrc/s600/Summit%20Impact%20by%20Year.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;371&quot; data-original-width=&quot;600&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvWZgv4xoLT4Y8GXC-RARcYZyuZ6zK1Ia_s8mBKwMnhk8-pkAPEomUeMqEn6n7j3c5SwaMN0e8RQ0F8TavrTF68S4WDUaqg5YRmDYX5Ckb17f4QK2wV5ga7xpvPtag2O9G3wNsTJAkME5ZdNEb17eIpLTmiaNreRysSjd9NVWgLme-nU76OyPzicrc/w320-h198/Summit%20Impact%20by%20Year.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;Trusted CI has &lt;a href=&quot;https://doi.org/10.5281/zenodo.6350540https://doi.org/10.5281/zenodo.6350540&quot;&gt;published its second Impacts Report&lt;/a&gt; analyzing our impact on the NSF community. The &lt;a href=&quot;https://blog.trustedci.org/2018/08/broader-impacts-project.htmlhttps://blog.trustedci.org/2018/08/broader-impacts-project.html&quot;&gt;first report was published in 2018&lt;/a&gt; and summarized our impact from 2012 to 2018. This new report updates our analysis under the current NSF cooperative agreement, which began in 2019 (award #&lt;a href=&quot;https://www.nsf.gov/awardsearch/showAward?AWD_ID=1920430&quot;&gt;1920430&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;We define &quot;impact&quot; as the number of NSF projects (awards) that have had an engagement with Trusted CI or have had staff attend a Trusted CI event; including the NSF Cybersecurity Summit, webinars, and training events. Using that metric, we find that since 2012, Trusted CI has interacted with over 500 NSF projects, including over 300 NSF projects during the last 3 years (2019-2021).&lt;br /&gt;&lt;br /&gt;The full report includes more details about our impact broken down by &lt;a href=&quot;https://www.nsf.gov/staff/orglist.jsp&quot;&gt;NSF Directorate&lt;/a&gt;, our engagements, Summit attendance, and more. It is available at &lt;a href=&quot;https://doi.org/10.5281/zenodo.6350540&quot;&gt;https://doi.org/10.5281/zenodo.6350540&lt;/a&gt;.&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4116573984801365429'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/4116573984801365429'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/03/2022-impact-report.html' title='Trusted CI Publishes 2022 Report Summarizing its Impact on Over 500 NSF Projects'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvWZgv4xoLT4Y8GXC-RARcYZyuZ6zK1Ia_s8mBKwMnhk8-pkAPEomUeMqEn6n7j3c5SwaMN0e8RQ0F8TavrTF68S4WDUaqg5YRmDYX5Ckb17f4QK2wV5ga7xpvPtag2O9G3wNsTJAkME5ZdNEb17eIpLTmiaNreRysSjd9NVWgLme-nU76OyPzicrc/s72-w320-h198-c/Summit%20Impact%20by%20Year.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-279586528594471070</id><published>2022-03-22T16:41:00.000-04:00</published><updated>2022-03-22T16:41:29.511-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="White House"/><title type='text'>White House Fact Sheet on cybersecurity protections</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;On March 21, the White House published “&lt;/span&gt;&lt;a href=&quot;https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/fact-sheet-act-now-to-protect-against-potential-cyberattacks/&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;FACT SHEET: Act Now to Protect Against Potential Cyberattacks&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;” providing guidance on protection against potential Russian cyberattacks in response to sanctions. The White House post was covered by &lt;/span&gt;&lt;a href=&quot;https://www.cnn.com/2022/03/21/politics/biden-russia-cyber-activity/index.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;CNN&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.nbcnews.com/politics/joe-biden/evolving-intelligence-suggests-russia-may-target-us-businesses-cyberat-rcna20921&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;NBC News&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/world/us/white-house-warns-us-companies-about-preparatory-russian-hacking-senior-official-2022-03-21/&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Reuters&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.bloomberg.com/news/articles/2022-03-21/biden-says-russia-weighs-cyberattack-urges-corporate-vigilance&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Bloomberg&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, and others.&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-92825c14-7fff-6887-f27c-6c26e839f415&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The guidance in the Fact Sheet, specifically the Cybersecurity &amp;amp; infrastructure Security Agency’s (CISA) &lt;/span&gt;&lt;a href=&quot;https://www.cisa.gov/shields-up&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Shields Up&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; guidance, is well established advice and in line with recommendations in &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/framework/&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Trusted CI’s Framework&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.trustedci.org/software-assurance&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;software assurance guidance&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. Trusted CI encourages members of the NSF community who are considering or are in the process of implementing controls such as those mentioned in the Fact Sheet to have discussions among their leadership team about accelerating deployment of those protections at this time.&lt;/span&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/279586528594471070'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/279586528594471070'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/03/white-house-fact-sheet-on-cybersecurity.html' title='White House Fact Sheet on cybersecurity protections'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1282078192422772052</id><published>2022-03-22T14:50:00.001-04:00</published><updated>2022-03-22T14:50:47.905-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberCheckup"/><category scheme="http://www.blogger.com/atom/ns#" term="engagements"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><title type='text'>Trusted CI and OOI Complete Engagement</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The Ocean Observatories Initiative (OOI, &lt;/span&gt;&lt;a href=&quot;https://oceanobservatories.org/&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;https://oceanobservatories.org/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;), funded by the NSF OCE Division of Ocean Sciences &lt;a href=&quot;https://www.nsf.gov/awardsearch/showAward?AWD_ID=1743430&quot; target=&quot;_blank&quot;&gt;#1743430&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; white-space: pre-wrap;&quot;&gt;, is a science-driven ocean observing network that delivers real-time data from more than 800 instruments to address critical science questions regarding the world’s oceans. OOI data are freely available online to anyone with an Internet connection.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-ed316663-7fff-7fe2-2036-e482d696890b&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The OOI provides an exponential increase in the scope and timescale of observations of the world’s oceans. Present and future educators, scientists, and researchers are able to draw conclusions about climatological and environmental processes based on these measurements, requiring the data to be accurate, with a flawless pedigree. As a result, the OOI has a requirement to protect its data from being altered by any external agent.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;To this end, OOI-CI (OOI Cyberinfrastructure) solicited a consultation from Trusted CI to evaluate their current security program, along with guidance on reviewing and evaluating potential alternatives for an enhanced security posture. We refined and prioritized OOI’s needs to the following goals: (i) perform a security review of OOI’s cyberinfrastructure using the &lt;a href=&quot;https://trustedci.org/evalws&quot; target=&quot;_blank&quot;&gt;Trusted CI Security Program Evaluation&lt;/a&gt; worksheet&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, (ii) take steps toward adopting the &lt;a href=&quot;https://www.trustedci.org/framework&quot; target=&quot;_blank&quot;&gt;Trusted CI Framework&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; by developing a “master information security policies and procedures” document (&lt;a href=&quot;https://www.trustedci.org/framework/docs/MISPP&quot; target=&quot;_blank&quot;&gt;MISPP&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;), (iii) investigate and document missing policies and procedures, including questions and concerns raised by OOI, and unknowns discovered in above exercises, and (iv) provide guidance on creating an asset inventory, applying a control set, and creating and maintaining a risk registry.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The OOI team completed the Trusted CI Security Program Evaluation spreadsheet. This exercise started&amp;nbsp; the OOI team thinking about and discussing cybersecurity concerns that were raised in the evaluation, both in previously known topics, but also unknown or undefined areas. The Trusted CI team created a list of prioritized recommendations aligned with &lt;a href=&quot;https://www.trustedci.org/framework/core&quot; target=&quot;_blank&quot;&gt;Framework Musts&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; -- core concepts that every cybersecurity program should have -- that the OOI team can use in addressing or documenting gaps.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;We introduced OOI to the &lt;a href=&quot;https://www.trustedci.org/framework/implementation&quot; target=&quot;_blank&quot;&gt;Framework and Implementation Guide&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, and had discussions concerning the Musts, what they entail, and how they apply to and define a mature security program. The OOI team attended the 2021 &lt;a href=&quot;https://www.trustedci.org/2021-cybersecurity-summit&quot; target=&quot;_blank&quot;&gt;NSF Cybersecurity Summit&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; and specifically The Framework Workshop, where they were able to benefit from a deeper dive into the Framework and implementation guidance.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;OOI displayed a solid grasp of the suggested security program solution, the Trusted CI Framework, and of what needs to be done to adopt it.&amp;nbsp; Completely adopting the Framework was beyond the scope of this engagement, however OOI focused on (i) developing the top-level Master Information Security Policy &amp;amp; Procedures (MISPP) document, (ii) develop a Cybersecurity Strategic Plan, and (iii) develop supplemental security program policies, e.g., Incident Response Plan, Disaster Recovery, and Acceptable Use Policies.&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 10pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In addition to creating top level policy documents, Trusted CI stressed the importance of having an up to date asset inventory as well as selecting and applying a base-line control set. The OOI team began identifying their critical assets as well as selecting CIS v8 as a control set and then aimed to apply controls from Implementation Groups 1 and 2. Trusted CI staff also provided a list of ‘high priority’ controls to focus on that would provide the best ROI for time and resources spent implementing.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;We are pleased to announce that OOI is a participant in &lt;a href=&quot;https://blog.trustedci.org/2022/01/trusted-ci-launches-operation-framework.html&quot; target=&quot;_blank&quot;&gt;Trusted CI’s Framework Cohort&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; taking place the first half of 2022 (1H2022). This will allow them to continue their work on creating and refining a mature security program while working with other NSF Major Facilities under the guidance and expertise of Trusted CI’s Framework team.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The engagement ran from August 16, 2021 to December 31, 2021, and was recorded in the document “OOI / Trusted CI Engagement Final Report” (&lt;/span&gt;&lt;a href=&quot;https://hdl.handle.net/2022/27253&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;https://hdl.handle.net/2022/27253&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;).&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1282078192422772052'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1282078192422772052'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/03/trusted-ci-and-ooi-complete-engagement.html' title='Trusted CI and OOI Complete Engagement'/><author><name>Shane Filus</name><uri>http://www.blogger.com/profile/12566288280898673390</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-6180538081252298970</id><published>2022-03-11T09:00:00.003-05:00</published><updated>2022-03-11T09:00:00.172-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="educause"/><category scheme="http://www.blogger.com/atom/ns#" term="events"/><title type='text'>Join Us at EDUCAUSE CPP Conference - Early Registration Ends 3/22</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhopaRuW3UigNynNh5IDRjd5gxGaJRZRPHTHc8qt8O4Yph_rQedH8DPQNHatvtilxhyTLBGtwWsqkzz8WvWR2G8F-WmvdokMKBWhpduxv8Xxm_4xuQxLvT--Jqoc6SxCZORx_4IL-JsYm8NSAAUyq_14hzIkqiUH1210q6AcP6iHb0XLvZlCmCNJVvQ=s1187&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;487&quot; data-original-width=&quot;1187&quot; height=&quot;131&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhopaRuW3UigNynNh5IDRjd5gxGaJRZRPHTHc8qt8O4Yph_rQedH8DPQNHatvtilxhyTLBGtwWsqkzz8WvWR2G8F-WmvdokMKBWhpduxv8Xxm_4xuQxLvT--Jqoc6SxCZORx_4IL-JsYm8NSAAUyq_14hzIkqiUH1210q6AcP6iHb0XLvZlCmCNJVvQ=s320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Trusted CI will be presenting at the 2022 EDUCAUSE &lt;a href=&quot;https://events.educause.edu/cybersecurity-and-privacy-professionals-conference/2022&quot;&gt;Cybersecurity and Privacy Professionals Conference&lt;/a&gt; on May 3 - 5th in Baltimore, MD. The CPPC is “the premier forum for connecting with higher education information security and privacy professionals.” &lt;a href=&quot;https://events.educause.edu/cybersecurity-and-privacy-professionals-conference/2022/registration&quot;&gt;Early registration&lt;/a&gt; for this conference ends Tuesday, March 22nd. Trusted CI’s Ishan Abhinit, Kathy Benninger, and Mark Krenz will be participating in the sessions listed below. We are looking forward to seeing you at this exciting event!&lt;br /&gt;&lt;br /&gt;Training: &lt;a href=&quot;https://events.educause.edu/special-topic-events/cybersecurity-and-privacy-professionals-conference/2022/agenda/security-log-analysis&quot;&gt;Security Log Analysis&lt;/a&gt;&lt;br /&gt;Tuesday, May 03 | 8:30AM–12:00PM ET&lt;br /&gt;Presenters: Ishan and Mark&lt;br /&gt;The security log analysis workshop walks participants through the security log analysis life cycle, providing considerations for centralized log collection and log management tools, phases of compromise, and examples from real attacks. We will be analyzing logs from Zeek Network Security Monitor, the Apache web server, two-factor authentication systems, cloud service logs, and others. This workshop also includes a hands-on exercise that will demonstrate techniques to analyze logs to detect security incidents using both the command line and Elastic Stack (aka ELK). The hands-on exercise will provide an overview of investigation techniques to determine security incident logs of some common attacks like SQL injection, filesystem traversal, brute force attacks, command-line injection, and more. Recent security vulnerabilities, such as log4shell, will also be discussed, along with techniques for detection. This will be an interactive session allowing Q&amp;amp;A and will also feature interactive polls to enhance participants&#39; learning experience.&lt;br /&gt;&lt;br /&gt;Training: &lt;a href=&quot;https://events.educause.edu/special-topic-events/cybersecurity-and-privacy-professionals-conference/2022/agenda/security-in-the-shell-or-how-i-learned-to-think-before-forking&quot;&gt;Security in the Shell (or, How I Learned to Think Before Forking)&lt;/a&gt;&lt;br /&gt;Tuesday, May 03 | 1:00PM–4:30PM ET&lt;br /&gt;Presenters: Ishan and Mark&lt;br /&gt;Although it is one of the oldest technologies in IT, the command line and terminal emulators continue to be in wide use for modern IT needs. Although people may think of these technologies as having a solid security footing, there are a number of ways someone can shoot themselves in the foot while using them, and I&#39;m not just talking about running &quot;rm -fr /&quot;. In this workshop, Mark Krenz, the creator of the popular Twitter account climagic, will demonstrate these and guide students through how to practice better command line security, from understanding the metadata that is generated by your favorite editor to knowing how to exploit SSH, knowing how to protect yourself when checking malware, and much more. There is something for everyone in this workshop, and you are sure to come away with a plethora of job-saving tips.&lt;br /&gt;&lt;br /&gt;Breakout session: &lt;a href=&quot;https://events.educause.edu/special-topic-events/cybersecurity-and-privacy-professionals-conference/2022/agenda/security-recommendations-for-science-dmzs-1&quot;&gt;Security Recommendations for Science DMZs&lt;/a&gt;&lt;br /&gt;Wednesday, May 04 | 10:45AM–11:30AM ET&lt;br /&gt;Presenters: Ishan, Kathy, and Mark&lt;br /&gt;A Science DMZ is a special network architecture designed to improve the speed at which large science data transfers can be made. They have become a common solution to the issue of busy academic networks causing slowdowns or failures of large data transfers. A new paper published by Trusted CI on the security of Science DMZs provides an overview of this type of network architecture, summarizing the current best practice cybersecurity risk mitigations as well as providing additional security recommendations. This session is a brief introduction to the Science DMZ concept and presents an overview of the mitigations documented in the paper.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6180538081252298970'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/6180538081252298970'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/03/2022-educause-cppc.html' title='Join Us at EDUCAUSE CPP Conference - Early Registration Ends 3/22'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhopaRuW3UigNynNh5IDRjd5gxGaJRZRPHTHc8qt8O4Yph_rQedH8DPQNHatvtilxhyTLBGtwWsqkzz8WvWR2G8F-WmvdokMKBWhpduxv8Xxm_4xuQxLvT--Jqoc6SxCZORx_4IL-JsYm8NSAAUyq_14hzIkqiUH1210q6AcP6iHb0XLvZlCmCNJVvQ=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-407934609423905261</id><published>2022-03-09T09:28:00.000-05:00</published><updated>2022-03-09T09:28:30.323-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="large facilities"/><category scheme="http://www.blogger.com/atom/ns#" term="major facilities"/><title type='text'>Trusted CI Applauds JASON Report on Facilities Cybersecurity</title><content type='html'>&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;In 2021, the NSF &quot;commissioned a study by the JASON advisory group to assess and make recommendations regarding cybersecurity at NSF’s major facilities.” In December, NSF publicly released the &lt;a href=&quot;https://www.nsf.gov/news/special_reports/jasonreportcybersecurity/index.jsp&quot; target=&quot;_blank&quot;&gt;seven recommendations from the JASON group&lt;/a&gt; and NSF’s response to those recommendations. Given Trusted CI’s role over the past 10 years in providing leadership and guidance to NSF Major Facilities, we welcomed the opportunity to contribute to the JASON group’s study and the dialogue it spurred. The following text consists of each of the JASON group’s recommendations, followed by the response from NSF, and Trusted CI’s response, which is the unique contribution of this document. We provide our responses to help the community understand how Trusted CI can help them as they consider these recommendations and their impact within their own projects.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;JASON recommendation:&lt;/b&gt; “NSF should maintain its current approach of supporting major facilities to enhance cybersecurity through assessments of risk, and development and implementation of mitigation plans. A prescriptive approach to cybersecurity should be avoided because it would be a poor fit to the diversity of facilities, would inefficiently use resources, and would not evolve quickly enough to keep up with changing threats.”  &lt;b&gt;NSF response: &lt;/b&gt;“NSF intends to maintain its current philosophy of performing oversight of awardee plans that are tailored to the unique natures of the individual major facilities. Through its review processes, NSF will ensure that these plans are consistent with best practices for cybersecurity that are in common between major research facilities and other types of infrastructure.”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response: &lt;/b&gt;Trusted CI will continue helping the NSF community develop and improve their cybersecurity plans which capture and prioritize best practices. Trusted CI will continue training and advising Major Facilities as they mature their cybersecurity programs and develop prioritized, mission-sensitive plans. We are available to support NSF reviews in any way that serves the community. We encourage expansion of NSF’s current approach and the inclusion of Trusted CI in the process of establishing generalized best practices for Major Facilities. We recommend those best practices align closely or equate to the &lt;a href=&quot;https://www.trustedci.org/framework  &quot; target=&quot;_blank&quot;&gt;Trusted CI Framework&lt;/a&gt;. NSF also recently released a new version of the &lt;a href=&quot;https://www.nsf.gov/pubs/2021/nsf21107/nsf21107.pdf &quot; target=&quot;_blank&quot;&gt;Research Infrastructure Guide&lt;/a&gt; (formerly the Major Facilities Guide). Section 6.3 (Guidelines for Cybersecurity of NSF’s Major Facilities) has been significantly updated to align and refer to the Framework.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;2. &lt;b&gt;JASON recommendation: &lt;/b&gt;“An executive position for cybersecurity strategy and coordination for major facilities should be created at NSF. This executive should have authorities that allow them to continually support the balancing of cybersecurity, scientific progress, and cost in the distinct ways that will be appropriate for each facility.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response: &lt;/b&gt;“NSF notes and agrees with the emphasis on such a position on strategy and coordination. NSF will explore different options for initiating the position and plans to create such a position within the next six months.&quot;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response: &lt;/b&gt;We strongly endorse this foundational recommendation and we look forward to collaborating with the new executive to fulfill our aligned missions. In Trusted CI’s experience, cybersecurity frequently proves ineffective or counterproductive when cybersecurity leadership lacks an understanding of the organization’s mission. An executive at NSF with expertise in both cybersecurity and the research mission would bring valuable additional perspective and leadership to NSF.  &lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;3. &lt;b&gt;JASON recommendation: &lt;/b&gt;“Using annual reporting and review processes, NSF should ensure major facilities implement robust cybersecurity programs that remain consistent with current best practice.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response: &lt;/b&gt;“NSF plans to review the elements of a good facility cybersecurity program, currently described in Section 6.3 of the NSF Major Facilities Guide, to ensure that this section is up to date. NSF will add cybersecurity as a required element of annual reports and program plans and conduct any additional specialized reviews based on perceived risk.”&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response:&lt;/b&gt; Trusted CI helps facilities develop cybersecurity programs that help ensure productive, trustworthy science. The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity programs. In March 2021, we released the &lt;a href=&quot;https://doi.org/10.5281/zenodo.4562447 &quot; target=&quot;_blank&quot;&gt;Framework Implementation Guide for Research Cyberinfrastructure Operators&lt;/a&gt;, which contains detailed guidance that can help major facilities implement effective cybersecurity programs and thereby addresses Section 6.3 of the Research Infrastructure Guide. &lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;4. &lt;b&gt;JASON recommendation:&lt;/b&gt; “NSF should develop a procedure for response to major cybersecurity incidents at its major research facilities, encompassing public relations, coordination mechanisms, and a pre-ordained chain of authority for emergency decisions. Each major facility should also have their own response plan that is both specific to its needs and consistent with NSF&#39;s plan.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response: &lt;/b&gt;“NSF has charged a working group to develop a more robust response plan that integrates with both the agency&#39;s overall crisis communications plan and the response plans at the individual major facilities.”&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response: &lt;/b&gt;Through our ongoing engagement activities with NSF Major Facilities and our mission &quot;to lead in the development of an NSF Cybersecurity Ecosystem,&quot; we are uniquely positioned to provide guidance to this working group. During the past decade, we have built our understanding of cybersecurity challenges faced by the Major Facilities by hosting the &lt;a href=&quot;https://www.trustedci.org/previous-events&quot; target=&quot;_blank&quot;&gt;annual Cybersecurity Summit&lt;/a&gt;, establishing and facilitating monthly meetings of the &lt;a href=&quot;https://www.trustedci.org/lfst &quot; target=&quot;_blank&quot;&gt;Large Facilities Security Team&lt;/a&gt;, and conducting 13 direct one-on-one &lt;a href=&quot;https://www.trustedci.org/success-stories &quot; target=&quot;_blank&quot;&gt;engagements with the 10 of the Major Facilities&lt;/a&gt;. We look forward to bringing that experience, along with our ever-increasing understanding of the threat landscape faced by research facilities, to a productive collaboration with the working group and the executive identified in recommendation #2. &lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;5. &lt;b&gt;JASON recommendation: &lt;/b&gt;“NSF and the major facilities must be adequately resourced for their cyberinfrastructure and cybersecurity needs. What is appropriate will depend on each facility&#39;s unique characteristics and specific needs. The cybersecurity budget should be commensurate with perceived risk of an event, which may be unrelated to the cost of constructing or operating the facility.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response:&lt;/b&gt; “NSF will work with each awardee to develop a cybersecurity risk register for each major facility and will then integrate those risk registers in order to determine the highest NSF risks and implement any needed mitigations.”&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response: &lt;/b&gt;We agree with the JASON group’s assertion that Major Facilities must be adequately resourced for their cybersecurity needs. Cybersecurity spending is a necessary focus area in the expanding dialogue among Major Facilities, NSF, and other relevant stakeholders. Adequate resourcing to address unacceptable cybersecurity risk is precisely the subject of the Trusted CI Framework’s Must 11. Cybersecurity risk registers may be a helpful tool assessing whether cybersecurity spending is commensurate with the threats posed by unmitigated risk. However, the need for the allocation of cybersecurity resources is fundamental.  &lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;6. &lt;b&gt;JASON recommendation: &lt;/b&gt;“NSF should refine facility proposal and design review processes to ensure that new major facilities plan cybersecurity as an integral part of the information technology infrastructure. NSF should regularly review the cybersecurity plans and efforts of both new and existing major facilities. Shifts to cloud-based cyberinfrastructure and to a wider range of partners will impact cybersecurity planning and need to be considered at proposal time.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response:&lt;/b&gt; “NSF believes that the cybersecurity review process at the time of awards should be risk-based. NSF will work to ensure that cybersecurity is a specified element and review criterion of each call for proposals in a major facility competition. For a renewal proposal, NSF will include a requirement for submission of a cybersecurity plan. For a new construction award, or a project in the Design Stage, the cybersecurity plan will be required to be integrated with the Project Execution Plan. NSF will assure that appropriate expertise is present on review panels to assess the adequacy of the cybersecurity plan.”&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response:&lt;/b&gt; We support the recommendation to require cybersecurity planning as part of facility proposal and design and would extend that recommendation to include the construction phase as well. For renewal proposals, we recommend expanding the requirement such that facilities must submit evidence of an active cybersecurity program (not just a plan). Trusted CI’s guidance provides facilities with the means to both plan and assess their programs. Prioritized, mission-based cybersecurity planning is central to the Trusted CI Framework, and we have demonstrated experience supporting NSF Major Facilities with cybersecurity strategic planning, through activities like the LFST, regular engagements, the NSF Summit and our &lt;a href=&quot;https://blog.trustedci.org/2022/01/trusted-ci-launches-operation-framework.html&quot; target=&quot;_blank&quot;&gt;2022 Framework cohort&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;7. &lt;b&gt;JASON recommendation:&lt;/b&gt; “NSF should remain aware of national security concerns regarding its facilities and continue to facilitate coordination with appropriate agencies.”&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;NSF response:&lt;/b&gt; “NSF will conduct an assessment of national security concerns that may be associated with its major research facilities.”&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Trusted CI response:&lt;/b&gt; Several members of the Trusted CI team have experience working at the intersection of cybersecurity and national security, and we are happy to be a resource to facilities in this area.  Trusted CI has a long and successful history providing tailored, actionable guidance and expertise to NSF Major Facilities. The JASON working group’s recommendations are a strong endorsement of NSF’s direction, Trusted CI’s contribution, and if followed, represent a step forward in ensuring the security of our nation’s science. Collaborating with NSF and Major Facilities to enable trustworthy science is central to Trusted CI’s mission.&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/407934609423905261'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/407934609423905261'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/03/trusted-ci-applauds-jason-report-on.html' title='Trusted CI Applauds JASON Report on Facilities Cybersecurity'/><author><name>Kelli Shute</name><uri>http://www.blogger.com/profile/08611415753623346274</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1366120641872169523</id><published>2022-02-22T09:54:00.000-05:00</published><updated>2022-02-22T09:54:10.568-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Trusted CI"/><title type='text'>Trusted CI Announces The 2022 Fellows</title><content type='html'>&lt;p&gt;Trusted CI, the NSF Cybersecurity Center of Excellence, is excited to  announce the Trusted CI Open Science Cybersecurity Fellows. Eight  individuals with professional interests in cybersecurity have been  selected from a nationally competitive pool.&amp;nbsp; During the year of their  Fellowship, they will receive recognition and cybersecurity professional  development including training and travel funding to  cybersecurity-related events.&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;The 2022 Trusted CI Open Science Cybersecurity Fellows are:&lt;/h3&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiU0O-Audivs5nGe-J-dd_06i5Hi7uzXiX-oLqTspNtMk5q9va6zNPzOejuW-FNwrRX3waWHeo74ewoounzHKr4mY34kz6PPjWz6THqszu48CxY_xEzxBOBvssDL9NGlzYSx3mDIvBcPNJ6KJWc-BQhsVgHQy5oSIAYcsplq4PmjqcHzlpPPUgP7BRc=s6144&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;6144&quot; data-original-width=&quot;4088&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiU0O-Audivs5nGe-J-dd_06i5Hi7uzXiX-oLqTspNtMk5q9va6zNPzOejuW-FNwrRX3waWHeo74ewoounzHKr4mY34kz6PPjWz6THqszu48CxY_xEzxBOBvssDL9NGlzYSx3mDIvBcPNJ6KJWc-BQhsVgHQy5oSIAYcsplq4PmjqcHzlpPPUgP7BRc=w133-h200&quot; title=&quot;Brian Roland&quot; width=&quot;133&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;b&gt;Brian Roland&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Data Management Specialist at Northwestern University&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Brian  Roland provides Data Management support and consultation for  researchers at Northwestern University. He supports researchers across a  broad spectrum of research disciplines with data workflow design and  leveraging the appropriate data storage and data transfer solutions to  meet their research goals and both federal and institutional compliance  needs. In addition to providing data workflow support, Brian enjoys  working with his colleagues on building out institutional lines of  service that help optimize the data flows involved with researchers&#39;  analysis and data management plans.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhqGV1L980NhZtyFpTYSiv6XnD2JQ8aV3Z5L42Wr7MCQa2Poamb4C6cLABuiLsS7jr5vczBH6MjR7n1EOmzvTXzAE5vWWnRDfifcwDY3hly6oYtlG9BkSxDADlpvW3xzYJKJSWSXOP5uHWpYvWl7w5EriXlM9qYEfGRwSkBVWCxPaF-85HAmqjjAuSV=s1540&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1540&quot; data-original-width=&quot;1540&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhqGV1L980NhZtyFpTYSiv6XnD2JQ8aV3Z5L42Wr7MCQa2Poamb4C6cLABuiLsS7jr5vczBH6MjR7n1EOmzvTXzAE5vWWnRDfifcwDY3hly6oYtlG9BkSxDADlpvW3xzYJKJSWSXOP5uHWpYvWl7w5EriXlM9qYEfGRwSkBVWCxPaF-85HAmqjjAuSV=w177-h200&quot; width=&quot;177&quot; /&gt;&lt;/a&gt;&lt;/span&gt;Charles McElroy&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Assistant Professor at Cleveland State University&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Professor  Charles McElroy earned his PhD from Case Western Reserve University,  (Cleveland, OH) in Information Systems in 2017. There he studied how  diverse scientific teams used sophisticated cyberinfrastructure to  formulate complex arguments. Upon graduation, Professor McElroy won a  national competition sponsored by the Office of the Director for  National Intelligence to conduct research in data science at the Center  for Data-Driven Discovery (CD3) at the California Institute of  Technology (Pasadena, CA). At the conclusion of his IC PostDoc  experience, Professor McElroy won a Fulbright Fellowship to Oxford  University (2019), where he focused on issues related to Cyber-Security.  Professor McElroy is currently a new Assistant Professor in Information  Systems at Cleveland State University. His interests include data  science, AI, machine learning, and how these tools can be applied to  cybersecurity issues.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhJlhkskB28r_BaWUyGRACHWPTCEHhGIuGo6dReCdO2Lo0mdltAQyMh8N7nacEe_OXJ4ciPu9-N27koM5w_n8RJ9V9SrVfhqxAot4c2Q5oudPp7Zs4YinrowZ8PSye_48z-pbrA3XL9QkJjNz55xHNkY2DVs67zW1iFTq3dXRmAx9I26Qpu10MM-teb=s1797&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1797&quot; data-original-width=&quot;1348&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhJlhkskB28r_BaWUyGRACHWPTCEHhGIuGo6dReCdO2Lo0mdltAQyMh8N7nacEe_OXJ4ciPu9-N27koM5w_n8RJ9V9SrVfhqxAot4c2Q5oudPp7Zs4YinrowZ8PSye_48z-pbrA3XL9QkJjNz55xHNkY2DVs67zW1iFTq3dXRmAx9I26Qpu10MM-teb=w150-h200&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Garhan Attebury&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Lead System Administrator at the University of Nebraska-Lincoln&lt;/i&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Garhan Attebury is the lead system administrator within the Holland  Computing Center at the University of Nebraska. His efforts and  interests cover a wide spectrum of research computing areas from local  HPC needs to global computing with involvement in the WLCG and other  distributed platforms. He additionally acts as the networking and  security liaison for HCC and has a strong interest in architecting  solutions that balance enabling research with meeting security and  privacy needs.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgX5w-Aseueyf1d_ZblTfo5iNUxMgnUpe90FPWWlMp_jD4exeJ-yElU0fDFY5r2FFjVnAPuM9ycVKV7yh8pyrFum0qorMsjHFqCubLO2Cyi0F2h5sRXQasbphmw9Ct-leBemMgGndAHfszn57NseUyGBJuH8alNJolRKbvUKRdotg4sLforGgzjJfOt=s1235&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1235&quot; data-original-width=&quot;926&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgX5w-Aseueyf1d_ZblTfo5iNUxMgnUpe90FPWWlMp_jD4exeJ-yElU0fDFY5r2FFjVnAPuM9ycVKV7yh8pyrFum0qorMsjHFqCubLO2Cyi0F2h5sRXQasbphmw9Ct-leBemMgGndAHfszn57NseUyGBJuH8alNJolRKbvUKRdotg4sLforGgzjJfOt=w150-h200&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;Hannah Hiles&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Research Project Manager and Product Owner at RENCI&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Hannah  Hiles is a research project manager and product owner at the  Renaissance Computing Institute (RENCI). She received her MS in Library  and Information Science from UNC Greensboro; her studies focused on  academic and digital libraries and served as a touchstone for instilling  curiosity about the intersection of people and information. Her  research is centered around UI/UX development, mindful community  engagement, and iterative design of best practices to support  researchers and their research communities in accomplishing shared  goals.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjynW2bOJHb5etYxvmQGPlZZT_Q8tOXjZ17vmsgqnWWLzVUnf5DJ63G3bkAFbWJcpA90TtrlohZDtvzL4x8UE26aBObYh4HxNwX0trUDn9Nvxphp1lg6X4IJvFHyPInQZmjns_k7gFn6oiqGdpEvaEDYitTx3s6xoV3Z6LRhf7ohpE5laU2BL0B_IMT=s628&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;535&quot; data-original-width=&quot;628&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjynW2bOJHb5etYxvmQGPlZZT_Q8tOXjZ17vmsgqnWWLzVUnf5DJ63G3bkAFbWJcpA90TtrlohZDtvzL4x8UE26aBObYh4HxNwX0trUDn9Nvxphp1lg6X4IJvFHyPInQZmjns_k7gFn6oiqGdpEvaEDYitTx3s6xoV3Z6LRhf7ohpE5laU2BL0B_IMT=w153-h151&quot; width=&quot;153&quot; /&gt;&lt;/a&gt;&lt;/span&gt; &lt;b&gt;Joseph White-Swift&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Systems Engineer for HPC/CI in the Office of Information Technology at The University of Texas at Dallas&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Joey  is a systems engineer at the University of Texas at Dallas focusing on  CI and Networking. Wearing his CI hat, he primarily serves economists  from around the Federal Reserve Bank System in a partnership to admin  and supports their Big-Tex Cluster. Wearing his networking hat, he  provides networking support and services for the university CI  infrastructure and the university science DMZ, which includes both the  Texas Research and education CyberInfrastructure Services (TRECIS) and  the Global Environment network Innovations (GENI) projects. Wearing his  researcher hat, he works with, supports, and conducts research as a  member of the Open Networking Advanced Research (OpNeAR) Lab and has  also served as a reviewer for the INDIS Workshop since 2020. Joey has  been a member of the IEEE since 2016 and is an Eagle Scout.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhz-Ig4v1SHloNJKyNovkcQv1WlV5n-LNKTh6DD081iE86injmYe1TeznUImIzsPDjMHlq4RO8tzbVrbKdpHepPs48seWYsIzNsEEFH5d-nYD9xLQgBIelqCTW5bq2AbE1hucnvjJx_1im3PGsCqUf_EOYd9sBG6nB_yY1AdXh684ixya1luoLW5ybO=s2250&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2250&quot; data-original-width=&quot;1500&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhz-Ig4v1SHloNJKyNovkcQv1WlV5n-LNKTh6DD081iE86injmYe1TeznUImIzsPDjMHlq4RO8tzbVrbKdpHepPs48seWYsIzNsEEFH5d-nYD9xLQgBIelqCTW5bq2AbE1hucnvjJx_1im3PGsCqUf_EOYd9sBG6nB_yY1AdXh684ixya1luoLW5ybO=w133-h200&quot; width=&quot;133&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Melissa Cragin&lt;/b&gt;&lt;br /&gt;&lt;i&gt;Chief Strategist for Data Initiatives in the Research data Services at SDSC/UCSD&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Melissa  Cragin is Chief Strategist for Data Initiatives in the Research Data  Services division at the San Diego Supercomputer Center (SDSC), at the  University of California San Diego (UCSD).Prior to joining SDSC, Melissa  was the Executive Director of the Midwest Big Data Hub, based at the  National Center for Supercomputing Applications (NCSA) at the University  of Illinois at Urbana-Champaign (UIUC). Previously, Melissa served for  several years in the Office of the Assistant Director, Directorate of  Biological Sciences at the National Science Foundation (NSF), where she  guided the development of data policy and accelerated community  engagement on research data management and public access. At SDSC,  Melissa works on projects to improve data access and use, and foster the  development of the national data infrastructure ecosystem and related  policy. Melissa has a PhD in information science from the iSchool at  Illinois (UIUC), and a MLIS degree from Rutgers University.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEijkZN5pq3-Evl4dRKFCP7gR0yJdBunDyyzrxCgHIhnlq0R6gh_u-LjToW0urkRQRHaSPrORr2hfD7jp6hr_W80qVHOUJIiL3STtE6vDB5XbsLWBUXmBVxWsM0MwgF_CuuFMemVlYv4YhP69_43fSYyjsKA3aaCLV7RqQMJghQNSEN93hZvwr0uV4QZ=s1709&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1709&quot; data-original-width=&quot;1267&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEijkZN5pq3-Evl4dRKFCP7gR0yJdBunDyyzrxCgHIhnlq0R6gh_u-LjToW0urkRQRHaSPrORr2hfD7jp6hr_W80qVHOUJIiL3STtE6vDB5XbsLWBUXmBVxWsM0MwgF_CuuFMemVlYv4YhP69_43fSYyjsKA3aaCLV7RqQMJghQNSEN93hZvwr0uV4QZ=w148-h200&quot; width=&quot;148&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;b&gt;Stephen Streng&lt;/b&gt; &lt;br /&gt;&lt;i&gt;Research Development Strategist with the Strategic Projects and  Research Collaborative (SPARC) at the University of Minnesota&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Stephen  Streng is a Research Development Strategist with the Strategic Projects  and Research Collaborative (SPARC) at the University of Minnesota  (UMN). In this role, he helps interdisciplinary and multi-institutional  teams and the UMN system achieve significant impact by providing  competitive intelligence, strategic planning, proposal development, and  project design consultation. Stephen has been involved in cybersecurity  since 2015 when in a previous role at the UMN Food Protection and  Defense Institute (FPDI), he initiated FPDI’s cybersecurity research  program by organizing and facilitating the first Food Industry  Cybersecurity Summit. In 2019, FPDI published his white paper,  Adulterating More Than Food: The Cyber Risk to Food Processing and  ManufacturingMore Than Food: The Cyber Risk to Food Processing and  Manufacturing, which examined the cyber risks to industrial control  systems in food processing and manufacturing industries. Stephen is a  former Department of Homeland Security Analytic Exchange Program (AEP)  participant as a member of the Protecting Sensitive Data and  Intellectual Property topic team, and he currently serves on the UMN  Highly Restricted Data Steering Committee. Stephen continues to consult for FPDI and has an ongoing interest  in operational technology cybersecurity.&amp;nbsp;&amp;nbsp; participant as a member of  the Protecting Sensitive Data and Intellectual Property topic team, and  he currently serves on the UMN Highly Restricted DataSteering Committee.  Stephen continues to consult for FPDI and has an ongoing interest in  operational technology cybersecurity.&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiH4LDB7uMEjKZGezNFXZW--IKAHu457TQDiAlGG2pDduoTzDB72_t3Hk5rcnkEEssELMo285uaXd4LceYhCWQ96j0TnZHtt-faEKCgWiHrVLJGI1xSuRkN8sZuBqpkPXz_HrgumjDzz0cFxYwnY-mJ7CGdVAamt91NYqe9f6_2cmy4-tgHX9Cxhy06=s4224&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4224&quot; data-original-width=&quot;2816&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiH4LDB7uMEjKZGezNFXZW--IKAHu457TQDiAlGG2pDduoTzDB72_t3Hk5rcnkEEssELMo285uaXd4LceYhCWQ96j0TnZHtt-faEKCgWiHrVLJGI1xSuRkN8sZuBqpkPXz_HrgumjDzz0cFxYwnY-mJ7CGdVAamt91NYqe9f6_2cmy4-tgHX9Cxhy06=w133-h200&quot; width=&quot;133&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;Unal Tatar&lt;/b&gt; &lt;br /&gt;&lt;i&gt;Assistant Professor at SUNY at Albany&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Dr.  Unal Tatar is an assistant professor at the College of Emergency  Preparedness, Homeland Security, and Cybersecurity at the University at  Albany. Dr. Tatar served as the head of the National Computer Emergency  Response Team of Turkey and as an academic advisor at the NATO Center of  Excellence Defense Against Terrorism. Dr. Tatar has three main lines of  research: the economics of cybersecurity and risk management, critical  infrastructure protection and national security, and cybersecurity  capacity building and workforce development. Dr. Tatar’s research has  been funded by NSF, DOD, NSA, ONR, AFRL, NATO, and several foundations.  Dr. Tatar holds a BS in Computer Science, an MS in Cryptography, and a  Ph.D. in Engineering Management and Systems Engineering.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The  Fellows will receive training consisting of a Virtual Institute,  providing 20 hours of basic cybersecurity training over six months. The  training will be delivered by Trusted CI staff and invited speakers. The  Virtual Institute will be presented as a weekly series via Zoom and  recorded to be publicly available for later online viewing. Travel  support is budgeted (during their first year only) to cover fellows’  attendance at the NSF Cybersecurity Summit, PEARC, and one professional  development opportunity agreed to with Trusted CI. The Fellows will be  added to an email list to discuss any challenges they encounter that  will receive prioritized attention from Trusted CI staff. Trusted CI  will recognize the Fellows on its website and social media. Fellowships  are funded for one year, after which the Trusted CI Fellows will be  encouraged to continue participating in Trusted CI activities in the  years following their fellowship year. After their training in the  Virtual Institute, Fellows, with assistance from the Trusted CI team,  are expected to help their science community with cybersecurity and make  them aware of Trusted CI for complex needs. By the end of the year,  they will be expected to present or write a short white paper on the  cybersecurity needs of their community and some initial steps they will  take (or have taken) to address these needs. After the Fellowship year  Trusted CI will continue to recognize the cohort of Fellows and give  them prioritized attention. Over the years, this growing cohort of  Fellows will broaden and diversify Trusted CI’s impact.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;About the Trusted CI Fellows Program&lt;/h3&gt;&lt;p&gt;Trusted  CI serves the scientific community as the NSF Cybersecurity Center of  Excellence, providing leadership in and assistance in cybersecurity in  the support of research. In 2019, Trusted CI establish an Open Science  Cybersecurity Fellows program. This program establishes and support a  network of Fellows with diversity in both geography and scientific  discipline. These fellows will have access to training and other  resources to foster their professional development in cybersecurity. In  exchange, they will champion cybersecurity for science in their  scientific and geographic communities and communicate challenges and  successful practices to Trusted CI.&lt;/p&gt;&lt;p&gt;Fellows come from a variety  of career stages. They demonstrate a passion for their area, the ability  to communicate ideas effectively, and a real interest in the role of  cybersecurity in research. Fellows are empowered to talk about  cybersecurity to a wider audience, network with others who share a  passion for cybersecurity for open science and learn key skills that  benefit them and their collaborators.&lt;/p&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1366120641872169523'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1366120641872169523'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/02/2022-fellows.html' title='Trusted CI Announces The 2022 Fellows'/><author><name>Diana Borecky</name><uri>http://www.blogger.com/profile/17185786916706861353</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEiU0O-Audivs5nGe-J-dd_06i5Hi7uzXiX-oLqTspNtMk5q9va6zNPzOejuW-FNwrRX3waWHeo74ewoounzHKr4mY34kz6PPjWz6THqszu48CxY_xEzxBOBvssDL9NGlzYSx3mDIvBcPNJ6KJWc-BQhsVgHQy5oSIAYcsplq4PmjqcHzlpPPUgP7BRc=s72-w133-h200-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-7077496605849243532.post-1146751105630315294</id><published>2022-02-14T14:48:00.010-05:00</published><updated>2022-02-21T11:41:12.971-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="annual challenge"/><category scheme="http://www.blogger.com/atom/ns#" term="software assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="webinar"/><title type='text'>Trusted CI Webinar: The Results of the Trusted CI Annual Challenge on Software, Mon Feb. 28 @ 1pm Eastern</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgMYZ0Rgz3Myi_dfBP-lhLUVVIOn3Gd9prUKjG48bMgkb4wLnZhEg_ClBGragDLe8WfoiO-1F_daIO168IAK3JJzabsFFItdTArGsODrMaFyfGIF8T08g-q8bylN5R8AghVXQv7BgTRRvPL6dnr_qWhoo8rcV_jC03OFhL5SlTmcGVB52FyCaMMmdzv=s1280&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;389&quot; data-original-width=&quot;1280&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgMYZ0Rgz3Myi_dfBP-lhLUVVIOn3Gd9prUKjG48bMgkb4wLnZhEg_ClBGragDLe8WfoiO-1F_daIO168IAK3JJzabsFFItdTArGsODrMaFyfGIF8T08g-q8bylN5R8AghVXQv7BgTRRvPL6dnr_qWhoo8rcV_jC03OFhL5SlTmcGVB52FyCaMMmdzv=s320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Members of Trusted CI are presenting the Results of the Trusted CI Annual Challenge on Software, on Monday February 28th at 1pm (Eastern). &lt;b&gt;Note the time is later than previous webinars&lt;/b&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;Please &lt;a href=&quot;https://iu.zoom.us/webinar/register/WN_WeNAyT7ET7SAqeuLvXNHAQ&quot;&gt;register here&lt;/a&gt;.   &lt;br /&gt;&lt;/p&gt;&lt;blockquote&gt;This webinar presents the results of Trusted CI&#39;s 2021 examination of the state of software assurance in scientific computing, and also gives an overview of the contents of its recently released Guide to Securing Scientific Software (GS3), aimed at helping developers of software used in scientific computing improve the security of that software.&lt;br /&gt;&lt;br /&gt;See our blog post announcing the report: &lt;br /&gt;&lt;a href=&quot;https://blog.trustedci.org/2021/12/publication-of-trusted-ci-guide-to.html&quot;&gt;https://blog.trustedci.org/2021/12/publication-of-trusted-ci-guide-to.html&lt;/a&gt; &lt;br /&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Speaker Bios&lt;/b&gt;:&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Dr. Elisa Heymann Pignolo&lt;/u&gt; is a Senior Scientist on the  NSF Cybersecurity Center of Excellence at the University of Wisconsin,  and an Associate Professor at the Autonomous University of Barcelona.  She was in charge of the Grid/Cloud security group at the UAB, and  participated in two major Grid European Projects: EGI‐InSPIRE and  European Middleware Initiative (EMI). Heymann&#39;s research interests  include security and resource management for Grid and Cloud  environments. Her research is supported by the NSF, Spanish government,  the European Commission, and NATO.&lt;/span&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Prof. Barton Miller&lt;/u&gt; is the Vilas Distinguished Achievement Professor and Amar &amp;amp; Belinder Sohi Professor in computer science at the University of Wisconsin-Madison. Prof. Miller founded the field of fuzz random testing, which is foundational to computer security and software testing. In addition, he founded (with his then-student Prof. Jeffrey Hollingsworth) the field of dynamic binary instrumentation, which is a widely used, critical technology for cyberforensics. Prof. Miller advises the Department of Defense on computer security issues though his position at the Institute for Defense Analysis and was on the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee and the US Secret Service Electronic Crimes Task Force (Chicago Area). He is currently an advisor to the Wisconsin Security Research Council. Prof. Miller is a fellow of the ACM.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Dr. Sean Peisert&lt;/u&gt; leads applied research and development in computer security at the Berkeley Lab and UC Davis. He is also chief cybersecurity strategist for CENIC; co-lead of Trusted CI, the NSF Cybersecurity Center of Excellence; editor-in-chief of IEEE Security &amp;amp; Privacy; a member of the Distinguished Expert Review Panel for the NSA Annual Best Scientific Cybersecurity Paper Competition; a member of the DARPA Information Science and Technology (ISAT) Study Group; an ACSA Senior Fellow; past chair of the IEEE Technical Committee on Security &amp;amp; Privacy&#39; and is a steering committee member and past general chair of the IEEE Symposium on Security and Privacy (&quot;Oakland&quot;). &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;---&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Join Trusted CI&#39;s &lt;a href=&quot;https://list.iu.edu/sympa/subscribe/ctsc-announce-l&quot;&gt;announcements mailing list&lt;/a&gt; for information about upcoming events. To submit topics or requests to present, see our &lt;a href=&quot;https://trustedci.org/webinars-cfp&quot;&gt;call for presentations&lt;/a&gt;. Archived presentations are &lt;a href=&quot;https://trustedci.org/webinars&quot;&gt;available on our site&lt;/a&gt; under &quot;Past Events.&quot;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1146751105630315294'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7077496605849243532/posts/default/1146751105630315294'/><link rel='alternate' type='text/html' href='https://blog.trustedci.org/2022/02/2021-software-annual-challenge.html' title='Trusted CI Webinar: The Results of the Trusted CI Annual Challenge on Software, Mon Feb. 28 @ 1pm Eastern'/><author><name>Jeannette Dopheide</name><uri>http://www.blogger.com/profile/02059568699810157771</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgMYZ0Rgz3Myi_dfBP-lhLUVVIOn3Gd9prUKjG48bMgkb4wLnZhEg_ClBGragDLe8WfoiO-1F_daIO168IAK3JJzabsFFItdTArGsODrMaFyfGIF8T08g-q8bylN5R8AghVXQv7BgTRRvPL6dnr_qWhoo8rcV_jC03OFhL5SlTmcGVB52FyCaMMmdzv=s72-c" height="72" width="72"/></entry></feed>