Trusted CI will be hosting two events, our annual workshop and our Security Log Analysis tutorial.
Both events are scheduled at the same time, please note that when planning your agenda.
The details for each event are listed below.
Workshop: The Fifth Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sharing experiences, recommendations, and solutions for addressing cybersecurity challenges in research computing.
Monday July 19th @ 8am - 11am Pacific.
- 8:00 am - Welcome and opening remarks
- 8:10 am - The Trusted CI Framework: A Minimum Standard for Cybersecurity Programs
- Presenters: Scott Russell, Ranson Ricks, Craig Jackson, and Emily Adams; Trusted CI / Indiana University’s Center for Applied Cybersecurity Research
- 8:40 am - Google Drive: The Unknown Unknowns
- Presenter: Mark Krenz; Trusted CI / Indiana University’s Center for Applied Cybersecurity Research
- 9:10 am - Experiences Integrating and Operating Custos Security Services
- Presenters: Isuru Ranawaka, Dimuthu Wannipurage, Samitha Liyanage, Yu Ma, Suresh Marru, and Marlon Pierce; Indiana University
- Dannon Baker, Alexandru Mahmoud, Juleen Graham, and Enis Afgan; Johns Hopkins University
- Terry Fleury, and Jim Basney; University of Illinois Urbana Champaign
- 9:40 am - 10 minute Break
- 9:50 am - Drawing parallels and synergies between NSF and NIH cybersecurity projects
- Presenters: Enis Afgan, Alexandru Mahmoud, Dannon Baker, and Michael Schatz; Johns Hopkins University
- Jeremy Goecks; Oregon Health and Sciences University
- 10:20 am - How InCommon is helping its members to meet NIH requirements for federated credentials
- Presenters: Tom Barton; Internet2
- 10:50 am - Wrap up and final thoughts (10 minutes)
More detailed information about the presentations is available on our website.
Tutorial: Security Log Analysis: Real world hands-on methods and techniques to detect attacks.
Monday July 19th @ 8am - 11am Pacific.
A half-day training to tie together various log and data sources and provide a more rounded, coherent picture of a potential security event. It will also present log analysis as a life cycle (collection, event management, analysis, response), that becomes more efficient over time. Interactive demonstrations will cover both automated and manual analysis using multiple log sources, with examples from real security incidents.
Monday July 19th @ 8am - 11am Pacific time