Tuesday, June 18, 2019

Trusted CI at the 2019 annual Great Plains Networks All-Hands Meeting May 21-23

Ishan Abhinit conducting log analysis exercise at GPN AHM 2019
Following on the successful workshops Trusted CI staff provided at the 2017 Great Plains Network All-Hands Meeting, The Trusted CI staff was invited back to the event in 2019 by GPN staff. Five members of the Trusted CI staff presented a series of three workshops from May 21st - 23rd at the 2019 Great Plains Networks All-Hands Meeting. The workshops covered log analysis, risk management for regulated data, and developing information security programs for research projects and facilities.

Building a NIST Risk Management Framework for HIPAA and FISMA Compliance - Wednesday, May 22 (Anurag Shankar & Ryan Kiser)
Anurag Shankar and Ryan Kiser led a workshop to prepare attendees to effectively leverage NIST’s risk management guidelines as a tool to address the increasingly heavy demands of regulated data on research workflows. They provided an overview of the requirements for handling different types of regulated data such as PHI and CUI as well as a unified risk-based methodology for adhering to these requirements.

Security Log Analysis - Wednesday, May 22 (Mark Krenz & Ishan Abhinit)
Mark Krenz and Ishan Abhinit presented a half day workshop on Security Log Analysis including a 45 minute exercise developed by fellow Trusted CI colleague Kay Avila. The hands on exercise involved performing analysis on an Apache web server log file to find attacks at 6 levels of difficulty. The workshop also covered important aspects of collecting, organizing and analyzing log files as well as provided specific techniques for finding different types of attacks. Real time polling was utilized as a method of helping enguage with attendees as well as gaining insight into community practices.

A Practical Cybersecurity Framework for Open Science Projects and Facilities- Thursday, May 23 (Bob Cowles)
Bob conducted a workshop to give attendees a foundation in what it means to have a basic, competent cybersecurity program for open science projects. In addition to lively discussion from the participants, the four pillars of the Trusted CI Framework were presented along with the sixteen “musts” that compose the core framework requirements. Participants were provided with the tools for building a cybersecurity program and encouraged to use a set of rational, evidence-based controls as a component of their program.
Left to right: Bob, Anurag, Ishan, Michael, Mark, Ryan

Attending the conference also allowed Trusted CI staff to meeting and provide less formalized cybersecurity discussion and consultation during social events at the conference. While visiting Kansas City, the Trusted CI team also had the opportunity to meet with Michael Grobe, who is a member of the distributed computing community and co-developer of Lynx, one of the first popular web browsers.

The materials presented by Trusted CI at the conference as well as others can be found on the Trusted CI website.

Wednesday, June 12, 2019

Many opportunities to meet with Trusted CI at PEARC19

There are numerous opportunities to interact with members of Trusted CI at PEARC19, July 28th - August 1st, in Chicago. PEARC19, "will explore the current practice and experience in advanced research computing including modeling, simulation, and data-intensive computing."

We will update our PEARC19 page as more scheduling info involving Trusted CI becomes available. The full schedule has been posted on PEARC's site.

Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure

Tuesday July 30th at 11am - 5pm in the New Orleans room

Our workshop provides an opportunity for sharing experiences, recommendations, and available resources for addressing cybersecurity challenges in research computing. Presentations by Trusted CI staff and community members will cover a broad range of cybersecurity topics, including science gateways, transition to practice, cybersecurity program development, workforce development, and community engagement (e.g., via the Trusted CI Fellows program). Space is still available for lightning talks. Please contact jbasney@illinois.edu if you are interested in presenting at the workshop.

Panel: Community Engagement at Scale: NSF Centers of Expertise panel

Tuesday July 30th at 1:30pm - 3pm in the Regency AB room

This panel brings together the leaders of centers of expertise serving the CI and NSF communities to present what they wish everyone knew about their respective area and to explore the challenges and lessons learned with the cross-cutting topic of community engagement at scale. Panelists include:
  • Ruth Marinshaw — Moderator (Stanford University)
  • Daniel Crawford (MoISSI)
  • Ewa Deelman (CI CoE Pilot)
  • Jennifer Schopf (EPOC)
  • Von Welch (ResearchSOC, Trusted CI)
  • Nancy Wilkins-Diehr (SGCI)
  • Frank Wuerthwein (OSG)

Technical Papers

Our technical paper, “Trusted CI Experiences in Cybersecurity and Service to Open Science,” will be published in the proceedings. To read the pre-print copy, click here.

Trusted CI's paper will be presented on Wednesday July 31st at 11am - 12:30pm in the Water Tower room.

Another paper presentation that may be of interest is “Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences.” This paper describes the experiences of the Scientific Workflow Integrity Project in protecting data integrity.

SWIP's paper will be presented on Tuesday July 30th at 3:30 - 5pm in the Crystal C room.

AI4GOOD Workshop

Monday July 29th at 8:30am - 5pm in the Horner room

Trusted CI's Florence Hudson will be presenting in the AI4GOOD workshop on a panel about privacy, policies, security, and ethics regarding Artificial Intelligence. This workshop will provide a full-day of awareness, advocacy and hands-on training in basic skills needed by those who wish to employ or support artificial intelligence (AI) for accelerated research outcomes in a variety of domains. Biomedical advances, economic empowerment strategies, agricultural innovation and quality of life improvements for citizens in underserved regions will be emphasized.

Poster Reception

Tuesday July 30th at 6:30pm - 8:30pm in the Crystal Foyer and Water Tower rooms

Trusted CI is presenting a poster on our mission, how it can help your project, and the advances it is making in cybersecurity and resources for cybersecurity professionals.

The Exhibitors Hall

Trusted CI is a sponsor of PEARC19, and will have a table at the PEARC19 Exhibitors Hall. Meet members of our team and find out how we can provide cybersecurity support to your NSF project.

Monday, June 10, 2019

CCoE Webinar June 24th at 11am ET: The Trusted CI Framework: Toward Practical, Comprehensive Cybersecurity Programs

Trusted CI's Craig Jackson and Bob Cowles are presenting the talk "The Trusted CI Framework: Toward Practical, Comprehensive Cybersecurity Programs" on Monday June 24th at 11am (Eastern).

Please register here. Check spam/junk folder for registration confirmation email.
In this presentation, we will present the motivations behind and structure for the Trusted CI Framework and related implementation guidance for research. We’ll field questions, as well as discuss opportunities for the community to get be involved.
The Framework team members are Craig Jackson, Bob Cowles, Kay Avila, Scott Russell, Von Welch, and Jim Basney.
Speaker bios:

Craig Jackson is Program Director at the Indiana University Center for Applied Cybersecurity Research (CACR), where his research interests include information security program development and governance, cybersecurity assessments, legal and regulatory regimes' impact on information security and cyber resilience, evidence-based security, and innovative defenses. He leads CACR's collaborative work with the defense community and an interdisciplinary assessment and guidance tem for the NSF Cybersecurity Center of Excellence. He is a co-author of Security from First Principles: A Practical Guide to the Information Security Practice Principles. Craig is a graduate of the IU Maurer School of Law, IU School of Education, and Washington University in St. Louis. In addition to his litigation experience, Craig's research, design, project management, and psychology background includes work at the IU Center for Research on Learning and Technology and the Washington University in St. Louis School of Medicine.

Robert (Bob) Cowles is principal in BrightLite Information Security performing cybersecurity assessments and consulting in research and education about information security and identity management. He served as CISO at SLAC National Accelerator Laboratory (1997-2012); participated in security policy development for LHC Computing Grid (2001-2008); and was an instructor at University of Hong Kong in information security (2000-2003). His CACR contributions include research for the XSIM project and the NSF Cybersecurity Center of Excellence.

Presentations are recorded and include time for questions with the audience.

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Von Welch & Susan Sons to present at ESnet's CI Brownbag talk on Friday June 14 @2pm ET

Von Welch and Susan Sons will be presenting, "NSF Resources for Research Cybersecurity: Trusted CI and ResearchSOC," on Friday June 14th at 2pm ET. This presentation is part of ESnet's series of CI Brownbag talks.
Cybersecurity for research has a number of particular challenges including unusual instruments, high-performance infrastructure, and global collaboratioins. This talk will cover two NSF-funded community resources for cybersecurity for research: Trusted CI, the NSF Cybersecurity Center of Excellence, and ResearchSOC, a security operations center designed for research infrastructure. The presenters, Von Welch, Director of Trusted CI, and Susan Sons, Deputy Director of the ResearchSOC, will give an overview of cybersecurity challenges for research and then cover the offerings of Trusted CI and the ResearchSOC.
The meeting will be held in Zoom:

One tap mobile
+16699006833,,804696793# US (San Jose)
+16465588656,,804696793# US (New York)

Dial by your location
        +1 669 900 6833 US (San Jose)
        +1 646 558 8656 US (New York)
Meeting ID: 804 696 793
Find your local number: https://zoom.us/u/aboUJCvWEZ

Join by SIP

Join by H.323 (US West) (US East) (China) (India) (EMEA) (Australia) (Hong Kong) (Brazil) (Canada)
Meeting ID: 804 696 793

The talk will be recorded and posted to ESnet's GDrive archive when it is available.

Friday, June 7, 2019

Trusted CI Participates in ResearchSOC’s EDUCAUSE SPC Workshop

This blog post is cross-posted from the ResearchSOC blog. The ResearchSOC is a peer project of Trusted CI’s focused on providing operational cybersecurity services to the NSF community. It recently hosted a workshop at the 2019 EDUCAUSE Security Professionals Conference to which Trusted CI contributed.


“Securing and Supporting Research Projects: Facilitation Design Patterns” workshop

Posted on May 24, 2019 by toddston

In case you missed the above workshop at EDUCAUSE SPC (and you may well have missed it—the workshop filled up early, had a long wait list, and was almost standing room only), the slides from “Securing and Supporting Research Projects: Facilitation Design Patterns” are now available.

Presented by Michael Corn (CISO, UCSD) and Cyd Burrows-Schilling (Research Facilitator, UCSD), the workshop helped prepare security professionals to support sponsored research projects. It provided an overview of how research operates within Universities; taught facilitation skills for working with faculty; and provided guidance on how to develop a project specific security plan that meets the requirements of NSD, DoD, and other sponsoring organizations.

We were honored to have Professor Tanya Berger-Wolf from the University of Illinois at Chicago join us in person. The session with Professor Berger-Wolf was a highlight of the workshop, and helped attendees understand how cybersecurity professionals can work with researchers and learn to navigate the gap between the traditional top-down approach to security and the practicalities of everyday research lab infrastructures.

And she is doing some really cool research.

Claire Mizumoto, Director of Research IT Services at UCSD joined us remotely and gave a thought-provoking presentation on the hurdles researchers face in obtaining funding, preparing grants, and meeting the aggressive time demands of obtaining tenure.

Florence D. Hudson, who is Founder and CEO at FDHint, LLC and Special Adviser to our friends at Trusted CI, the NSF Cybersecurity Center of Excellence, gave an overview of three extremely useful tools: the NSF Cybersecurity Planning Guide, the Software Engineering Guide, and the Information Security Practice Principles. If you’re charged with providing cybersecurity for research projects of any size, these are pretty much required reading.

Vlad Grigorescu, Security Engineer at ESnet, led a deep dive into ScienceDMZ, which is an excellent network design pattern for data-intensive research projects.
We’re grateful to all our guests for their participation and incredibly useful information. If you need more information on any of the topics presented, contact us at rsoc@iu.edu.

The workshop was organized by the ResearchSOC project (researchsoc.iu.edu – NSF award 1840034).

  • Slide deck available here
  • Cyber Ambassadors case scripts available here
  • Intake Interview preparation example available here

Couldn’t make the workshop or hungry for more? No problem. Mark your calendar now for December 4-6, when we’ll present a full three-day workshop on the above topic. This hands-on workshop will be held on the University of California, San Diego campus. Details to follow.

The Research Security Operations Center (ResearchSOC) is a collaborative security response center that addresses the unique cybersecurity concerns of the research community. ResearchSOC helps make scientific computing resilient to cyberattacks and capable of supporting trustworthy, productive research. For more information on the ResearchSOC, visit our website or email rsoc@iu.edu.

Tuesday, May 28, 2019

2019 NSF Cybersecurity Summit Student CFP is open

We are happy to announce the 2019 NSF Cybersecurity Summit Student call for participation is open! We have decided to announce it early to give professors more time to submit nominations and for students to apply. Undergraduate and graduate students may apply, no specific major or course of study required, as long as the student is interested in learning and applying cybersecurity innovations to scientific endeavors.

Selected students will be given invitations to attend the Summit and the opportunity for reimbursement of travel expenses.

To read more about who is eligible and how to apply, see our page here: https://trustedci.org/summit2019/students

The Summit is Oct 15-17 in San Diego, CA.
To learn more about the Summit: https://trustedci.org/2019-nsf-cybersecurity-summit/
If you have questions about the Summit, contact us at info@trustedci.org

Von Welch presenting a talk at NCSA, Thursday May 30th

Update: The talk has been posted to YouTube. The slides have been archived.

Von Welch will be presenting the talk, "Cybersecurity to Enable Science: Hindsight & Vision from the NSF Cybersecurity Center of Excellence," at the National Center for Supercomputing Applications on Thursday, May 30th at 10am Central.

Read the full event details here. We are streaming the presentation online if you are not able to attend in person.
How can cybersecurity play an enabling role in scientific research? This talk describes the first five years of experience from NSF Cybersecurity Center of Excellence, its vision for the next five, and its take on how cybersecurity supports scientific integrity, reproducibility, and productivity.
Speaker Bio: Von Welch has been enabling scientific research through cybersecurity for over twenty years. He serves as the Director and PI for the NSF Cybersecurity Center of Excellence (Trusted CI) and for the recently announced NSF-funded Research Security Operations Center (ResearchSOC). At Indiana University he is the Director of the Center for Applied Cybersecurity Research (CACR) and an Associate Director for the IU Pervasive Technology Institute.

Join Trusted CI's announcements mailing list for information about upcoming events.