Tuesday, June 6, 2023

Call for Participation for the 2023 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

 October 24th - 26th ✶ Berkeley, CA

https://trustedci.org/summit/

It is our pleasure to announce that the 2023 NSF Cybersecurity Summit is scheduled to take place the week of October 23rd. Starting with two  full days of trainings and workshops that will be held on Tuesday, October 24th and Wednesday, October 25th. Concluding with a full day of plenary sessions occurring on Thursday, October 26th.

The final program is still evolving, but we will maintain the mission to provide a format designed to increase the NSF community’s understanding of cybersecurity strategies that strengthen trustworthy science: what data, processes, and systems are crucial to the scientific mission, what risks they face, and how to protect them.

About the Summit

Since 2004, the annual NSF Cybersecurity Summit has served as a valuable part of the process of securing the NSF scientific cyberinfrastructure by providing the community a forum for education, sharing experiences, building relationships, and establishing best practices.

The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the processes initiated in 2013: building a trusting, collaborative community and seriously addressing that community’s core cybersecurity challenges.

The Summit seeks proposals for plenary presentations, workshops/trainings, BoFs/project meetings, poster session and student program. 

Proposing Content for the Summit

There are many ways to contribute to the Cybersecurity Summit. We are open to proposals for live plenary presentations, focused workshops/trainings, project meetings and birds of a feather(BoFs). More specific information on each of those is available below. Submissions can be made using this online form https://docs.google.com/forms/d/e/1FAIpQLSc8VJjYj2XmzTxhoeBvQaf2LUCWovOCouMO5XQtdHgBjzOZDA/viewform by June 16, 2023. Responses will be announced by July 14, 2023 to ensure adequate planning time for presenters.

We strongly encourage proposals that address the 2022 Summit themes and challenges such as Framework Adoption, Operational Technology, Preparing for AI, Identity and access management, Compliance challenges and Risk assessment. Additionally, proposals that address topics ranked high by the community are also strongly encouraged/prioritized. These include: 

  1. Human Factors in Cybersecurity
  2. Open Source Software Security
  3. Cloud Security
  4. AI/ML for Security
  5. Trust/Security of AI Tools
  6. Information Asset Management
  7. Supply Chain Attacks
  8. ChatGPT use/banning/enabling for Security
  9. Quantum Computing

Proposing a Plenary Presentation

Please submit brief proposals with a 1-2 page abstract focused on NSF Large Facilities’ unmet cybersecurity challenges, lessons learned, and/or significant successes for presentation during the Summit Plenary Session. Plenary talks are limited to 25 minutes in length including time needed for question and answers if desired. 

Please note that the Summit will offer a ‘hybrid’ model for remote attendees to participate and all plenary talks will be recorded and made available after the event. Proposals should only contain information without sharing restrictions. As a guide, all plenary presentations should be TLP:WHITE “information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.” 

Submission deadline: June 16th, 2023
Proposals can be submitted using this online form: https://docs.google.com/forms/d/e/1FAIpQLSc8VJjYj2XmzTxhoeBvQaf2LUCWovOCouMO5XQtdHgBjzOZDA/viewform
Word limit: 1-2 pages
Notification of acceptance: July 14th, 2023

Proposing a Workshop or Training Session

Continuing this year, the Summit will accept proposals for Workshops and Trainings seeking to build communities of practice related to the NSF CyberInfrastructure. Please submit brief proposals with abstract that includes the intended audience, description of what the workshop or training will cover and expected benefits for attendees. Examples may include table top exercises, focused discussions and activities on techniques and skills in a particular field, and collaborative information sharing among security professionals.

Workshops and Trainings will be scheduled to not overlap with the Plenary sessions. They can be of varying length ranging from one hour to a half day (3.5 hours). Workshops can be limited to a specific audience to provide confidentiality. For workshops that intend to limit participation, proposals should include requirements for attendees. For accepted workshops that have admission requirements, members of Trusted CI along with workshop organizers will review workshop registration requests to ensure they meet attendance requirements. Workshop and training organizers may choose to offer either in-person or a hybrid model to include attendees joining remotely via Zoom. Workshop/training organizers are encouraged to offer hybrid sessions to maximize participation. This includes running the Zoom (e.g., monitoring the chat, unmuting remote participants, etc.). 

Submission deadline: June 16th, 2023
Proposals can be submitted using this online form: https://docs.google.com/forms/d/e/1FAIpQLSc8VJjYj2XmzTxhoeBvQaf2LUCWovOCouMO5XQtdHgBjzOZDA/viewform
Word limit: 1-2 pages
Notification of Acceptance: July 14th, 2023

Birds of a Feather and Project Specific Meeting Proposals

New this year we will be offering Summit attendees to propose Birds of a Feather (BoFs) and Project Specific Meetings. 

Birds of a Feather (BoFs): Informal gatherings of like-minded individuals who wish to discuss a certain topic can be 1-2 hours in length. Proposers of BoF sessions should serve as discussion leaders to explore and address challenges for a specific topic. BoF Proposals should be no more than one page in length and include the proposed topic and description, the activity’s intended audience, and its expected benefits.

Project Specific Meetings: The Summit organizers recognize that the summit attracts many people who work remotely on projects with distributed staff (ACCESS, ESNet, OSG, Zeek, Jupyter).  Attending a conference presents an opportunity for people who work collectively on a shared project to meet in person. This year we have a number of meeting rooms available for projects to hold working sessions. To request a meeting room, please provide a name and description of the project, number of expected participants and meeting duration (1-2 hours suggested). Requests will be reviewed and scheduled based on room availability. 

Submission deadline: June 16th, 2023
Proposals can be submitted using this online form: https://docs.google.com/forms/d/e/1FAIpQLSc8VJjYj2XmzTxhoeBvQaf2LUCWovOCouMO5XQtdHgBjzOZDA/viewform
Word Limit: 1-2 page description
Notification of Acceptance: July 14th, 2023

Poster Proposals

Also new this year we will be offering individuals to present posters in an informal setting. This is an opportunity to disseminate your work with Summit attendees, receive helpful insights and engage others who are interested in the same subject or focus of your work.

To propose a poster, please provide your name, poster title along with an abstract. Details on shipping posters will be provided upon acceptance.

Submission deadline: June 16th, 2023
Proposals can be submitted using this online form: https://docs.google.com/forms/d/e/1FAIpQLSc8VJjYj2XmzTxhoeBvQaf2LUCWovOCouMO5XQtdHgBjzOZDA/viewform
Word Limit: 1-2 page description
Notification of Acceptance: July 14th, 2023

Student Program

To support workforce development, the Summit organizers invite several students to attend the Summit in-person. Both undergraduate and graduate students may apply. No specific major or course of study is required, as long as the student is interested in learning and applying cybersecurity innovations to scientific endeavors.

To be considered, students must submit an application form (link below), answering questions about their field of study and interest in cybersecurity. Up to 10 student applicants will receive invitations from the Program Committee to attend the Summit in-person. Attendance includes students’ participation in a poster session.

Travel and hotel accommodations will be provided. Students whose applications are declined are welcome to attend the Summit remotely.

The deadline for applications is Monday, August 28th at 12 am CDT, with notification of acceptance to be sent by Friday September 8th.

Please discuss attendance with your instructors prior to attending.

We cannot select applications to attend in-person from students who live outside the United States.

Student Application to attend the Summit:
https://forms.gle/wxCRYpD94mCbQ4Rb6
Send questions to students@trustedci.org
Submission deadline: Monday, August 28th at 12 am CDT
Notification of Acceptance: Friday, September 8th

Notes for First-Time Presenters

The Summit organizers want to encourage those who have not presented at previous Summits to share their experiences, expertise, and insights with the NSF cybersecurity community. You don’t need to be perfectly polished, you just need to have something to share about your project or facility's experience with information security. Feedback from past Summits show that there is a great deal of interest in “lessons learned” type presentations from projects who’ve faced cybersecurity challenges and had to rethink some things afterwards. We’ve put together a page of tips and ideas for new presenters, including proposal and presentation tips as well as suggested topics. More direct coaching is available upon request.

Additional Call for Participation (CFP) Guidance

The Summit organizers wish to encourage and support participation from throughout the wider NSF community. To further that mission, we’ve provided some information (below) to aid in the preparation of CFP responses. Please don’t hesitate to direct questions to CFP@trustedci.org.

What to Present

The CFP presents an opportunity for the community to make progress on shared challenges identified in prior summits. The organizers especially appreciate proposals that drive this home; however, not every presentation or activity has to be centered around just that topic. Please submit any idea that you think may be relevant to our audience but note that proposals that address community challenges from prior years will be given higher preference. 

We strongly encourage proposals that address the 2022 Summit findings and topics identified of high interest as outlined above.

How to Build a CFP Response

The proposal you submit will be used in two ways: to tell the organizers about what you plan to present and to be included in the summit findings as a sort of after-action report. It should include:

  1. Session Format: Plenary (Lecture, Panel, Open Format) or workshop
  2. An executive summary/abstract (short description of the topic and content).
  3. Who the presenter(s) is/are.
  4. Either an abstract of the topic or a narrative you’d like to share with the community. (For activities that are not plenary sessions, this may be replaced with a description of the planned activity and the activity’s intended audience.)
  5. Contact information (preferably email) for the presenter(s) in case the organizers have any questions. This can be in a separate note in the email body instead of the proposal itself if presenter(s) don’t wish it to be published.
  6. Expected length of the session/activity. All plenary sessions will be limited to 25 minutes, Workshops and Trainings can range from one to 3.5 hours. BoFs and Project specific meetings are suggested to run 1-2 hours.
  7. Intended audience and expected benefits of the proposal

Our community has expressed in the past that many find it helpful if they can download a copy of a presentation’s slides. Therefore we will require all presenters to submit their slides in advance of the summit. 

The easiest way to get help/feedback from the organizing committee prior to submitting your final proposal is to create a Google Doc containing your proposal and sending an edit link to CFP@trustedci.org

Tips for Presenting

There are many different presentation formats that can work well depending on the topic. Consider the following:

  1. Lecture format: The presenter(s) talk to the audience and show slides to support their dialogue, then do a short Q&A session at the end of the presentation.
  2. Panel format: 3-5 persons answer questions offered by a moderator on a specific topic or set of topics, then do a short Q&A with the audience. This tends to work out best when the panel contains people with very different backgrounds or viewpoints, and the moderator is good at keeping folks to the topic and time constraints.
  3. Open Forum format: 2-3 persons answer questions offered by the audience. Works best if there is an extra person gathering questions and presenting them, and if the speakers can keep things succinct so that the presentation keeps moving and many questions get answered.
  4. Hands-on format(workshops/trainings): The presenter(s) walk the audience through a demo or tutorial as the audience follows along on their computers (or on paper, if the topic supports it).  If you are doing a training that will have many hands-on activities, consider having more than one presenter, or a presenter plus a helper or two who can go around the room and help participants who get stuck, allowing the group as a whole to move on.

Monday, May 8, 2023

Trusted CI Webinar: Senior Citizens Striking Back at Scammers, May 22nd @11am EST

Anita Nikolich is presenting the talk, Senior Citizens Striking Back at Scammers, May 22nd at 11am (Eastern).

Please register here.

Thousands of people fall for online scams every year. Anyone can be scammed, but older adults in the US are the most targeted population in the world. By far. Those over age 60 lost over $3 Billion last year—and that’s just the ones who reported it. One of the fastest growing scams aimed at seniors is romance scams, especially those involving cryptocurrency, which is largely impossible for US law enforcement to prosecute. Websites and education programs to inform seniors about scams exist, but they’re not interactive and engaging and often treat seniors like they are clueless. Our project – Deception Awareness and Resilience Training (DART) is building a fun, spy themed mobile video game for senior citizens that will be released this summer. This talk will give some background on how the latest scams work, especially ones based around cryptocurrency, and show you how we’ve assembled a multidisciplinary team, including a professional game development company, to arm seniors to defend themselves against scammers!

Speaker Bio:

Anita Nikolich is a Research Scientist and the Director of Research and Technology Innovation at the University of Illinois's School of Information Sciences and Director of Research at Inca Digital, a digital asset analytics company. She is Co-PI of the NSF-funded FABRIC Midscale Research Infrastructure, Co-PI of an NSF-funded Convergence Accelerator project, Deception Awareness and Resilience Training (DART) and PI on a DARPA funded SBIR, Mapping the Impact of Digital Financial Assets (MIDFA).

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Wednesday, April 19, 2023

Registration Open for ’23 NSF Research Infrastructure Workshop

Trusted CI invites cybersecurity staff from NSF Major Facilities and NSF Mid-Scale Facilities to join us at the 2023 NSF Research Infrastructure Workshop, hosted by NSF’s Large Facilities Office (LFO). The Research Infrastructure Workshop (RIW) is a collaborative forum for all the NSF research infrastructure projects.

The workshop is a hybrid format and will be held Tuesday through Friday, June 27th - 30th at the Washington Marriott at Metro Center. 

Registration is currently open.

There will be many opportunities to join discussions on cyberinfrastructure and cybersecurity. A few highlights include:

  • A dedicated Cybersecurity track on Day 2, which will cover the Trusted CI Framework, operational cybersecurity with ResearchSOC, and Regulated Research Community of Practice (RRCoP). Also, Robert Beverly (NSF) will provide introductory remarks for the Cybersecurity track.
  • Trusted CI Director, Jim Basney, and Roland Roberts presenting, “Overview of Cybersecurity at Research Infrastructure: Balancing the Need to Be Secure and Also Open,” during the plenary session on Day 3.
  • Tony Beasley (NRAO) presenting "Lessons from the 2022 Ransomware Attack on ALMA" during the plenary session on Day 3.
  • Partner project CI Compass are presenting, “Overview of CI Compass and the Relevance of AI in Cyberinfrastructure,” during the plenary session on Day 1.
  • And, a dedicated Cyberinfrastructure track on Day 1 covering "Models of Data Governance" and "Expanding use of AI in Research Infrastructure applications."

The drafted agenda is available (pdf) on RIW’s event site. The event includes a poster session, welcome reception, and a tour of the National Air and Space Museum.

Join Trusted CI's announcements mailing list for information about upcoming events. 

Wednesday, April 12, 2023

Trusted CI Webinar: Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure, April 24th @11am EST

PSC's Derek Simmel is presenting the talk, Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure, April 24th at 11am (Eastern).

Please register here.

On September 1, 2022, the U.S. National Science Foundation (NSF) ACCESS Cyberinfrastructure started production operations, ushering in a new era following two decades of cooperative cyberinfrastructure partnerships among several leading centers for High Performance Computing (HPC) at U.S. universities and research institutions under the NSF TeraGrid and XSEDE projects. The NSF ACCESS Cyberinfrastucture is composed of five funded projects, including an ACCESS Coordination Office and four tracks representing (1) resource allocations, (2) user support and training, (3) operations, including cybersecurity, data management and networking, and (4) monitoring and measurement services. ACCESS Resource Provider (RP) sites include several NSF-funded HPC systems deployed at U.S. universities and research facilities nationwide, on which computing time and storage are allocated on a peer-reviewed basis managed through the ACCESS project.

In this webinar, we will describe the functions and activities of the ACCESS Cybersecurity Operations Group, and summarize the progress, challenges, and lessons learned in its first year. Topics will include authentication and identity management (AIM), cybersecurity communications and readiness, policy development, and future directions.

Speaker Bio:

Derek Simmel's career in Cybersecurity and HPC spans over four decades. Derek joined the technical staff of the CERT Coordination Center at Carnegie Mellon University's Software Engineering Institute in 1995. He brought his experience to the Pittsburgh Supercomputing Center (PSC) in 2001. Derek is currently a co-PI for the U.S. National Science Foundation (NSF) ACCESS COre National Ecosystem for CyberinfrasTructure (CONECT) project, and leads Cybersecurity Operations for ACCESS. He also provides infrastructure design, cybersecurity and scientific workflow support for PSC's NSF-funded Bridges-2 system, and PSC's NIH-funded Brain Image Library, HuBMAP, and ANTON projects. Since 2011, Derek has chaired The Americas Grid Policy Management Authority (TAGPMA), one of three PMAs that comprise the Interoperable Global Trust Foundation (IGTF). He has served on the Technical Steering Committee for the Linux Foundation OpenHPC project since 2016, and on the Governing Board for OpenHPC since 2019.

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Tuesday, March 21, 2023

SAVE THE DATE: Announcing the 2023 NSF Cybersecurity Summit, Oct 24-26, 2023 in Berkeley, CA

Please mark your calendars for the 2023 NSF Cybersecurity Summit  planned for 3 full days, October 24-26 at the Lawrence Berkeley National Laboratory, in Berkeley, CA.

Trusted CI is welcoming other groups to schedule events the week of October 23rd around the Summit that may be of interest to our community. For planning purposes you may want to reserve the full week to attend these meetings. More details will be shared as planning progresses.


Stay tuned for more information by following the Trusted CI Blog or our Announcement email list for more updates.


On behalf of Trusted CI


Monday, March 13, 2023

Announcing the 2023 Trusted CI Open Science Cybersecurity Fellows

Trusted CI, the NSF Cybersecurity Center of Excellence, is excited to announce the Trusted CI Open Science Cybersecurity Fellows. Seven individuals with professional interests in cybersecurity have been selected from a nationally competitive pool. During the year of their Fellowship, they will receive recognition and cybersecurity professional development including training and travel funding to cybersecurity related events.

The 2023 Trusted CI Open Science Cybersecurity Fellows are:

Ramazan S. Aygun

Director of Center for Research Computing at Kennesaw State University

Ramazan S. Aygun is the Director of Center for Research Computing at Kennesaw State University and Associate Professor of Computer Science with joint appointment at the School of Data Science and Analytics.  He has published more than 130 refereed international journal papers, conference papers and book chapters in various aspects of data science including big data computing, machine learning, multimedia forensics, data mining, data modeling, data communications, data compression, data presentation, data retrieval, data indexing, data querying, and data fusion. His most recent work includes trustworthy machine learning and developing fair and explainable machine learning models by studying possible bias in the datasets. He is recently leading NSF funded project titled “CC* Data Storage: High Volume Data Storage Infrastructure for Scientific Research and Education at Kennesaw State University Shared as Open Science Data Federation Data Origin.” Dr. Aygun served as a program co-chair of IEEE International Symposium on Multimedia in 2012 and 2018. He has also served on the organization and program committees of more than 60 conferences and workshops. He is also serving as an Associate Editor of IEEE Transactions on Multimedia. He is a co-author of the book titled Data Analytics for Protein Crystallization.


Phuong Cao

Research Scientist at the Cybersecurity Division at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign 

Phuong Cao is a Research Scientist at the Cybersecurity Division at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign. His research mission is to secure cyberinfrastructure, in particular high performance scientific computing, e.g., Blue Waters supercomputer. He has a broad interest in security, with a multidisciplinary focus on Internet-scale measurements of operational systems, deep measurement driven analytics using probabilistic graphical models, ML/AI-driven honeypot for early attack response, and machine assisted proofs of federated authentication protocols. Prior to joining NCSA, he has had hands-on experience in the network security industry, including reverse engineering of polymorphic computer viruses, responding to globally distributed denial of service attacks (Akamai’s CDN, LinkedIn), securing the Watson Health Cloud (IBM z Systems), and formal verification of smart contracts and OAuth protocols (Microsoft).


Nick Harrison

Information Security Officer for the North Carolina Community College System

Nick Harrison is an Information Security Officer for the North Carolina Community College System, where he helps staff and faculty provide secure technical solutions for the next generation of the nation's workforce. Prior to joining the Community College system, Nick was the Director of Advanced Cyberinfrastructure Services at the Renaissance Computing Institute. He has over twenty years of IT experience in higher education and enjoys learning about cloud and virtualization technologies.

 

Lori Sussman

Assistant Professor of Technology and Cybersecurity at the University of Southern Maine.

Lori Sussman, Ed.D., is an Assistant Professor of Technology and Cybersecurity at the University of Southern Maine. She was part of the fourth class at the United States Military Academy to admit women and is a West Point graduate. Lori retired from the U.S. Army as a highly decorated colonel. Her military leadership experiences include 15th Regimental Signal Brigade Commander, 2nd Infantry Division Battalion Commander/CIO/G-6, Presidential Communications Officer, Joint Staff J-6 Executive Officer, and Assistant to the Army Chief of the Staff, as well as numerous demanding tactical assignments. Upon leaving service, Dr. Sussman worked in large and small companies, notably Cisco Systems and Hewlett Packard Enterprise (HPE). She is also an entrepreneur, having created several consulting businesses. In these varied roles, Dr. Sussman has managed a spectrum of highly complex organizations engaged in developing, integrating, deploying, and sustaining state-of-the-art technology and security solutions for clients. The Epsilon Pi Tau Technology Honor Society Awarded Dr. Sussman with the Warner Minilecture Award in 2020 and 2021 for her research about Cybersecurity Ambassadors. These individual awards followed recognition by the National Cyberwatch Center as the 2021 Most Innovative Cybersecurity Education Initiative. In 2021, Governor Mills named Dr. Sussman one of eleven veteran aides-de-camp. Her research areas include cybersecurity education, cybersecurity training and awareness, gender equity in technology and cybersecurity, and technology and cybersecurity leadership.


Dr. Gary Rogers

HPC Systems Administrator for the National Institute for Computational Sciences (NCIS) at the University of Tennessee

Dr. Gary Rogers earned his PhD in Computer Science from the University of Tennessee, while starting his career at the National Institute for Computational Sciences. He has over 18 years of HPC experience, many of those as an HPC administrator on some of the fastest supercomputers in the world. He played a key role in the national cyberinfrastructure projects, XSEDE and XSEDE 2.0, as the manager of the System and Operations Support group. He also participated in the XSEDE 2.0 Cybersecurity group, as well as the XSEDE Development Coordination Council. His current interests include developing and deploying secure compute platforms on which sensitive data can be analyzed, while reducing the barrier of entry for researchers to access and use such a platform. He holds an MS in Computer Science from the University of Tennessee, as well as a BS in Computer Science from the University of the South (Sewanee).  




David White

Parks, Recreation, and Tourism Management research professor at Clemson University

David White is a Parks, Recreation, and Tourism Management research professor at Clemson University. He is a Geographic Information Systems (GIS) expert with over twenty-five years in mapping, analytics, and spatial data collection. His most recent work uses mobility data to study visitation behavior in parks and protected areas. Additionally, his research has included several projects developing enterprise data and information systems requiring spatial data visualization and analytics. He holds a Ph.D. in Marine Science from the University of South Carolina.



Andrew Ferbert

Platform Services manager at the San Diego Supercomputer Center (SDSC) at UC San Diego (UCSD).

Andrew Ferbert is the Platform Services manager at the San Diego Supercomputer Center (SDSC) at UC San Diego (UCSD). Andrew’s primary responsibility is supporting SDSC and UCSD researchers through managed systems, operational support, and production systems integration. Throughout his career at SDSC, Andrew has never shied away from challenges and has worked in a variety of roles including desktop support, datacenter physical security, systems administration within HIPAA and FISMA projects, and working on projects with various branches of the United States Armed Force.

Trusted CI Webinar: The Internet2 Routing Integrity Initiative, March 27th @11am EST

Steve Wallace is presenting the talk, The Internet2 Routing Integrity Initiative, March 27th at 11am (Eastern).

Please register here.

The Internet2 Routing Integrity Initiative aims to improve the research and education (R&E) community’s adoption of best practices that strengthen the resilience and reliability of data movement across the R&E network ecosystem to support our shared missions. Routing integrity is an end-to-end challenge that requires the participation of the entire Internet2-networked community and beyond. This presentation will cover the pillars of the Routing Integrity Program and review resources you can use better to understand your organization's adoption of these practices:
  • Measurement and Reporting
  • Education
  • Global Coordination
  • Outreach and Advocacy
  • Adoption of Best Practices

Speaker Bio:

As Internet2’s Director of Routing Integrity, Steve Wallace promotes the adoption and improvement of routing security and integrity throughout the Internet2 community. He has been an active community member for over 24 years, having started as the engineer responsible for the team that built Abilene, Internet2's first network.

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."