Friday, May 13, 2022

Tuesday, May 10, 2022

Trusted CI Webinar: Ransomware: Threats & Mitigations, May 23rd @11am EST

REN-ISAC's Kim Millford and Krysten Stevens will be presenting the talk, Ransomware: Threats & Mitigations, on Monday May 23rd at 11am (Eastern).

Please register here.

The education industry has unceremoniously emerged as the second most common target for ransomware. It continues to evolve in how it is used as a fund-raiser for criminal organizations and how the technology works, to keep its victims guessing as to defense and eradication. Institutions face the difficult challenge of preserving academic freedom, easy access to information, and open collaboration while defending from threat actors who exploit these same characteristics. This presentation will focus on the current threats and provide guidance on protecting against ransomware attacks.

Speaker Bios:

Kim Milford serves as Executive Director of the Research & Education Networks Information Sharing & Analysis Center (REN-ISAC), a higher education and research network cyber-threat information sharing alliance. As Executive Director, Ms. Milford works with her team in service to, and in coordination with, global research and education institutions, partners, and sponsors to provide timely cybersecurity news reports, alerts and advisories, and analysis of cybersecurity threats and mitigation solutions.  

Since 2007, Ms. Milford has served in several roles leading strategic IT initiatives at Indiana University. As Chief Privacy Officer, she coordinated privacy-related efforts, chaired the Committee of Data Stewards, and directed the work of the University Information Policy Office and the university’s IT incident response team. Prior to joining Indiana University, Ms. Milford worked as Information Security Officer at the University of Rochester. As Information Security Manager at University of Wisconsin-Madison from 1998 - 2005, she assisted in establishing the university's information security department and co-led in the development of an annual security conference. Ms. Milford provides cybersecurity expertise and presentations at national and regional conferences as well as seminars and consortia. She has taught courses on Internet security and authored/co-authored many articles on the subject. Ms. Milford has a B.S. in Accounting from Saint Louis University in St. Louis, Missouri and a J.D. from John Marshall Law School in Chicago, Illinois. 

Krysten Stevens joined REN-ISAC as Director of Technical Operations in 2020. She has a background in IT security analysis and cyber threat intelligence from Purdue University, where she used her leadership and expertise to train other security analysts, create security awareness programs, and develop threat intelligence strategies on an organizational level. Krysten graduated from Purdue University Global with an MS Cybersecurity Management in 2020, and she holds CISSP and GCTI certifications. When not at work, Krysten enjoys spending time with her husband, two children, five cats, and two golden retrievers (who refuse to retrieve).

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Thursday, May 5, 2022

Call for Trusted CI Framework Cohort Participation

 

The Framework Cohort is a six month, group engagement aimed at facilitating adoption and implementation of the Trusted CI Framework among NSF Major Facilities. During the engagement, members of the cohort will work closely with Trusted CI to adopt the Trusted CI  Framework at their facility, emerging with a validated assessment of their cybersecurity program and a strategic plan detailing their path to fully implement each Framework Must.Cohort members will participate in six monthly workshops (each three hours) and spend no more than eight hours each month outside of the workshops on cohort assignments. The second cohort will meet from July to December 2022.

 Since January 2022, Trusted CI has been working with six Major Facilities in the inaugural Framework cohort: GAGE, LIGO, NOIRLab, NRAO, NSO and OOI. As this inaugural Framework cohort approaches completion in June 2022, Trusted CI is looking for Major Facilities that are interested in participating in the upcoming second cohort.

 NSF Major Facilities interested in participating in the Framework cohort should respond to the call by completing the form at the bottom of this page: https://www.trustedci.org/trusted-ci-framework-cohort-participation

If you have any questions, please contact us at info@trustedci.org.


2022 NSF Summit Student Program-Call For Application

Every year, Trusted CI organizes and hosts the NSF Cybersecurity Summit to bring together leaders in NSF cybersecurity and cyberinfrastructure. To support workforce development, the Summit organizers invite several students to attend the Summit at no cost every year. Both undergraduate and graduate students may apply, no specific major or course of study is required, as long as the student is interested in learning and applying cybersecurity innovations to scientific endeavors.

Students may either self-nominate or be nominated by a mentor or teacher.

To be considered, students must submit a one-page letter (800-word maximum) describing their interest in and any relevant experience with cybersecurity, emphasizing the benefit to the student and/or community of their attendance at the Summit.

This letter must include the student's name, contact information, the institution of higher education of attendance, and their current expected year of graduation. A resume may be submitted in substitution for the requested information.

Up to fifteen successful student applicants will receive invitations to attend the Summit at no cost.

All applications will be reviewed by the Program Committee and students will be selected. The Program Committee will select students with an interest in advancing diversity and inclusiveness in the program.

The deadline for applications is August 1, 2022, with notification of acceptance to be sent by August 10, 2022.

Please discuss attendance with your instructors prior to attending.

 APPLY TO ATTEND SUMMIT (FORM)


For more information on the event itself, please visit: https://www.trustedci.org/2022-cybersecurity-summit

 Tips for Applying:

 The most successful applicants will...

  • Be prepared to actively engage and participate with the programming.
  • Make it known that they are interested in complex cybersecurity needs around and new, efficient, effective ways to protect information assets while supporting science, even if they are new to the subject matter - let the program committee know why you are interested in this subject matter ; and
  • Relay at least 1-3 personal goals they would strive to meet while at the summit.

Highlighting these interests in the application will allow the review committee to understand why the student feels he or she will be best suited to attend the conference.

Send questions to students@trustedci.org

Monday, April 18, 2022

NSF Announces CICI Program Solicitation

NSF’s Office of Advanced Cyberinfrastructure recently announced solicitation 22-581 in the Cybersecurity Innovation for Cyberinfrastructure program. Proposals, due June 27, are solicited in three areas:

  • Usable and Collaborative Security for Science (UCSS)
  • Reference Scientific Security Datasets (RSSD)
  • Transition to Cyberinfrastructure Resilience (TCR)

NSF is hosting a webinar covering the objectives of the CICI program on April 27th at 2 PM Eastern. During the 90-minute webinar, Program Director Robert Beverly will discuss the program and answer questions. The presentation portion of the webinar will be recorded and posted on the CICI program website. Please register to attend.

As a reminder, you can find resources for including Trusted CI in your proposal on our website.

Tuesday, April 12, 2022

Trusted CI webinar: Updates from the Trusted CI Framework Cohort, April 25th @11am EST

Trusted CI's Scott Russell will be presenting the talk, Updates from the Trusted CI Framework Cohort, on Monday April 25th at 11am (Eastern).

Please register here.

The Trusted CI Framework is a minimum standard for cybersecurity programs. In response to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity. In order to encourage adoption of the Trusted CI Framework, we have created a program called the Framework Cohort, where representatives from multiple NSF Major Facilities and other "Key Projects" participate in a group engagement with Trusted CI focused on adoption and implementation of the Framework.

This webinar will provide updates from the inaugural cohort, currently in progress, and discuss the opportunity to participate in future cohorts.

More information about the Framework can be found at https://www.trustedci.org/framework

Speaker Bio

Scott Russell is a Senior Policy Analyst at the Indiana University Center for Applied Cybersecurity Research. Scott was previously the Postdoctoral Fellow in Information Security Law & Policy. Scott’s work thus far has emphasized private sector cybersecurity best practices, data aggregation and the First and Fourth Amendments, and cybercrime in international law. Scott studied Computer Science and History at the University of Virginia and received his J.D. from the Indiana University, Maurer School of Law.

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Wednesday, April 6, 2022

SAVE THE DATE: Announcing the 2022 NSF Cybersecurity Summit, Oct 18-20 in Bloomington, Indiana

Please mark your calendars for the 2022 NSF Cybersecurity Summit planned for October 18-20 at the Monroe Convention Center, Bloomington, Indiana, near the Indiana University Campus.

Plenary sessions are scheduled to take place October 19th and 20th, while training and workshops will take place on the 18th.


Stay tuned for more information by following the Trusted CI Blog or our Announcement email list for more updates.


On behalf of Trusted CI