Monday, April 18, 2022

NSF Announces CICI Program Solicitation

NSF’s Office of Advanced Cyberinfrastructure recently announced solicitation 22-581 in the Cybersecurity Innovation for Cyberinfrastructure program. Proposals, due June 27, are solicited in three areas:

  • Usable and Collaborative Security for Science (UCSS)
  • Reference Scientific Security Datasets (RSSD)
  • Transition to Cyberinfrastructure Resilience (TCR)

NSF is hosting a webinar covering the objectives of the CICI program on April 27th at 2 PM Eastern. During the 90-minute webinar, Program Director Robert Beverly will discuss the program and answer questions. The presentation portion of the webinar will be recorded and posted on the CICI program website. Please register to attend.

As a reminder, you can find resources for including Trusted CI in your proposal on our website.

Tuesday, April 12, 2022

Trusted CI webinar: Updates from the Trusted CI Framework Cohort, April 25th @11am EST

Trusted CI's Scott Russell will be presenting the talk, Updates from the Trusted CI Framework Cohort, on Monday April 25th at 11am (Eastern).

Please register here.

The Trusted CI Framework is a minimum standard for cybersecurity programs. In response to cybersecurity guidance focused narrowly on cybersecurity controls, the Trusted CI Framework provides a more holistic and mission-focused standard for managing cybersecurity. In order to encourage adoption of the Trusted CI Framework, we have created a program called the Framework Cohort, where representatives from multiple NSF Major Facilities and other "Key Projects" participate in a group engagement with Trusted CI focused on adoption and implementation of the Framework.

This webinar will provide updates from the inaugural cohort, currently in progress, and discuss the opportunity to participate in future cohorts.

More information about the Framework can be found at https://www.trustedci.org/framework

Speaker Bio

Scott Russell is a Senior Policy Analyst at the Indiana University Center for Applied Cybersecurity Research. Scott was previously the Postdoctoral Fellow in Information Security Law & Policy. Scott’s work thus far has emphasized private sector cybersecurity best practices, data aggregation and the First and Fourth Amendments, and cybercrime in international law. Scott studied Computer Science and History at the University of Virginia and received his J.D. from the Indiana University, Maurer School of Law.

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."

Wednesday, April 6, 2022

SAVE THE DATE: Announcing the 2022 NSF Cybersecurity Summit, Oct 18-20 in Bloomington, Indiana

Please mark your calendars for the 2022 NSF Cybersecurity Summit planned for October 18-20 at the Monroe Convention Center, Bloomington, Indiana, near the Indiana University Campus.

Plenary sessions are scheduled to take place October 19th and 20th, while training and workshops will take place on the 18th.


Stay tuned for more information by following the Trusted CI Blog or our Announcement email list for more updates.


On behalf of Trusted CI


Monday, April 4, 2022

Trusted CI Fellows urge researchers to protect their data

Each year, Trusted CI selects a small number of community members to become Trusted CI Fellows. They make connections in the research cybersecurity community and receive training, knowledge, and skills from Trusted CI, which they can then take back into their local communities to advance the state of cybersecurity for research and serve as an ongoing Trusted CI liaison. Trusted CI also asks Fellows to produce a report to capture and share what they’ve learned and how it applies to their domain.

Trusted CI Fellows Deb McCaffrey and Michael Kyle have examined the security needs of higher education researchers in recently published reports. Having augmented their security knowledge from Trusted CI webinars and workshops, they advise researchers to take a systemic approach to protecting their data. 

In her Trusted CI report, Deb McCaffrey, a research computing facilitator at the University of Michigan, explores the security needs of basic and clinical research. She concludes that researchers need a better understanding of their security environments to protect their data.

Michael Kyle is a scientific applications consultant for the University of Delaware. In his Trusted CI report, he describes how researchers can manage their risks with the proper classification and protection of digital research data.

Trusted CI thanks Deb and Michael for these contributions and will highlight these and future Fellows reports in the Fellows section of the Trusted CI website.