The workshop provides an opportunity for sharing experiences, recommendations, and solutions for addressing cybersecurity challenges in research computing. The full-day (6 hour) workshop provides a forum for information sharing and discussion among a broad range of attendees, including cyberinfrastructure operators, developers, and users.
The workshop is organized according to the following goals:
- Increase awareness of activities and resources that support the research computing community's cybersecurity needs.
- Share information about cybersecurity challenges, opportunities, and solutions among a broad range of participants in the research computing community.
- Identify shared cybersecurity approaches and priorities among workshop participants through interactive discussions.
Submissions
Program content for the workshop is driven by the community. We invite submissions of proposals for a series of 30-minute workshop presentations (a 20 minute presentation followed by 10 minutes of discussion for each topic) in the form of one-page abstracts submitted by email to workshop-cfp@trustedci.org. Submissions should include name, affiliation, and email for the presenter(s) along with the title and short description of the topic to be presented.
Presentations will be selected by the program committee based on technical quality, novelty, and relevance to PEARC20 attendees. Presentation materials will be published at https://trustedci.org/pearc20-workshop for dissemination beyond the workshop attendees. Permission will be requested from all presenters to allow redistribution of slides and allow sharing of photos from the event.
Presentations may be submitted to both this workshop and the NSF Cybersecurity Summit (https://trustedci.org/summit) for broader information sharing to attendees of both events.
Topics of interest for the workshop include but are not limited to:
- cybersecurity program development for NSF projects and facilities
- risk assessment results from NSF projects and facilities
- identity and access management solutions for NSF projects and facilities
- security challenges/experiences/solutions for science gateways
- transition to practice of cybersecurity research
- secure software development practices/experiences for research computing
- developing compliance programs for research on campus
- incident response lessons learned in the research computing community
- new or emerging cybersecurity technologies applicable to research computing
- cybersecurity outreach, education, and training
- cybersecurity workforce development
Important Dates
Submission Deadline: June 1, 2020
Notification of Acceptance: June 15, 2020
Program Committee
Jim Basney (NCSA)
Kathy Benninger (PSC)
Dana Brunson (Internet2)
Barton Miller (UW-Madison)
Sean Peisert (LBNL)
Von Welch (Indiana University)
About the Workshop Series
This is the fourth workshop in the series. The workshop has been held previously at PEARC17, PEARC18, and PEARC19. There were 48 attendees at the workshop last year. Please visit https://trustedci.org/workshops for materials from prior workshops.