Thursday, February 27, 2020

PEARC20: Trusted CI Call For Proposals at the 4th Workshop on Trustworthy Scientific Cyberinfrastructure

Trusted CI has opened a call for proposals for its fourth Workshop on Trustworthy Scientific Cyberinfrastructure at PEARC20.

The workshop provides an opportunity for sharing experiences, recommendations, and solutions for addressing cybersecurity challenges in research computing. The full-day (6 hour) workshop provides a forum for information sharing and discussion among a broad range of attendees, including cyberinfrastructure operators, developers, and users.

The workshop is organized according to the following goals:
  • Increase awareness of activities and resources that support the research computing community's cybersecurity needs.
  • Share information about cybersecurity challenges, opportunities, and solutions among a broad range of participants in the research computing community.
  • Identify shared cybersecurity approaches and priorities among workshop participants through interactive discussions.
Implementing cybersecurity for open science across the diversity of scientific research projects presents a significant challenge. There is no one-size-fits-all approach to cybersecurity for open science that the research community can adopt. Even NSF Major Facilities, the largest of the NSF projects, struggle to develop effective cybersecurity programs. To address this challenge, practical approaches are needed to manage risks while providing both flexibility for project-specific adaptations and access to the necessary knowledge and human resources for implementation. This workshop brings community members together to further develop a cybersecurity ecosystem, formed of people, practical knowledge, processes, and cyberinfrastructure, that enables research projects to both manage cybersecurity risks and produce trustworthy science.

Submissions


Program content for the workshop is driven by the community. We invite submissions of proposals for a series of 30-minute workshop presentations (a 20 minute presentation followed by 10 minutes of discussion for each topic) in the form of one-page abstracts submitted by email to workshop-cfp@trustedci.org. Submissions should include name, affiliation, and email for the presenter(s) along with the title and short description of the topic to be presented.

Presentations will be selected by the program committee based on technical quality, novelty, and relevance to PEARC20 attendees. Presentation materials will be published at https://trustedci.org/pearc20-workshop for dissemination beyond the workshop attendees. Permission will be requested from all presenters to allow redistribution of slides and allow sharing of photos from the event.

Presentations may be submitted to both this workshop and the NSF Cybersecurity Summit (https://trustedci.org/summit) for broader information sharing to attendees of both events.

Topics of interest for the workshop include but are not limited to:
  • cybersecurity program development for NSF projects and facilities
  • risk assessment results from NSF projects and facilities
  • identity and access management solutions for NSF projects and facilities
  • security challenges/experiences/solutions for science gateways
  • transition to practice of cybersecurity research
  • secure software development practices/experiences for research computing
  • developing compliance programs for research on campus
  • incident response lessons learned in the research computing community
  • new or emerging cybersecurity technologies applicable to research computing
  • cybersecurity outreach, education, and training
  • cybersecurity workforce development

Important Dates


Submission Deadline: June 1, 2020
Notification of Acceptance: June 15, 2020

Program Committee


Jim Basney (NCSA)
Kathy Benninger (PSC)
Dana Brunson (Internet2)
Barton Miller (UW-Madison)
Sean Peisert (LBNL)
Von Welch (Indiana University)

About the Workshop Series


This is the fourth workshop in the series. The workshop has been held previously at PEARC17, PEARC18, and PEARC19. There were 48 attendees at the workshop last year. Please visit https://trustedci.org/workshops for materials from prior workshops.