Tuesday, June 10, 2025

Now Open - 2025 NSF Cybersecurity Summit Call for Participation

 

It is our pleasure to announce that the 2025 NSF Cybersecurity Summit (Oct 20-23, Boulder) Call for Participation is now open! The Summit Program Committee seeks proposals for:

  • Plenary presentations and Panel talks
  • Workshops and Trainings
  • Birds of a Feather (BoFs) and Project meetings
  • Poster session
  • TLP:RED talks 

We welcome your proposals relevant to a broad range of topics related to the operational cybersecurity of NSF cyberinfrastructure and programs.  However, we encourage proposals that address topics highly ranked by the NSF CI Community. These include: 

  • HPC security
  • AI in cybersecurity:  Practical use in operational security and/or  balancing automation and oversight
  • Network security and defense
  • Regulatory compliance
  • Staying on top of emerging threats (how-to guide)
  • Pros and cons of federal, academic, and private research funding
  • Digital forensics and incident response (case studies)
  • Zero-trust architecture implementation
  • Security of research IOT
  • Adjusting your cybersecurity program during cuts

More detail and guidance on submitting proposals can be found here:
https://www.trustedci.org/2025-cfp

The deadline for plenary, workshop, training, BoF, and project meeting submissions is Monday June 30th

Poster session submissions are due September 5th. TLP: RED submissions are due October 10th. 

Thank you on behalf of the Program and Organizing Committees. We look forward to receiving your proposals and hope to see you in October in Boulder!

Monday, June 9, 2025

Trusted CI Webinar: Towards Practical Confidential High-Performance Computing, Monday June 23rd @ 10am Central

Indiana University's Chenghong Wang is presenting the talk, Towards Practical Confidential High-Performance Computing, on Monday June 23rd at 10am, Central time.

Please register here.

The democratization of high-performance computing (HPC)—driven by a paradigm shift toward cloud-based solutions—has unlocked unprecedented scalability in data sharing, interdisciplinary collaboration, and large-scale analytics. Yet, despite these advancements, the lack of strong privacy protection mechanisms, particularly for sensitive or regulated data, remains a significant barrier preventing critical domains from fully leveraging cloud HPC. In this webinar, I will present our group’s research toward enabling a practical confidential HPC paradigm—one that empowers HPC providers to securely process sensitive workloads with provable security and privacy guarantees.
 
My talk will be structured around three key pillars that underpin our approach: practical data-in-use security, data governance and compliance, and usability. First, I will introduce our vision for a next-generation trusted execution environment (TEE) architecture tailored for HPC—designed to deliver HPC-grade efficiency for large-scale, parallel workloads, while upholding strict data-in-use security guarantees. Second, I will discuss how we leverage formal methods to validate compliance with complex governance and data-sharing policies—ensuring that even dynamic, multi-party workloads can remain policy-aligned. Finally, I will share our ongoing work in developing new usability frameworks and programming abstractions designed to make confidential computing accessible to domain scientists—lowering the barrier for adoption without requiring expertise in cryptography or secure systems.

Speaker Bio: 


Chenghong Wang
is an Assistant Professor in the Luddy School of Informatics, Computing, and Engineering at Indiana University Bloomington. He is a core faculty member of the Security and Privacy in Informatics, Computing, and Engineering (SPICE) group and affiliated with the NSF Center for Distributed Confidential Computing (CDCC). His research focuses on building full-stack solutions for privacy-preserving data sharing and analytics (PPDSA), bridging theory, systems, and architectural design. His work spans trusted execution environments, differential privacy, applied cryptography, and secure data systems. Dr. Wang's research has been published in premier venues across systems, security, and AI, including SIGMOD, VLDB, USENIX Security, MICRO, NeurIPS, IJCAI, ICCV, and EMNLP. Beyond his core focus, he actively collaborates across disciplines, contributing to projects in AI, machine learning, hardware systems, healthcare, and biomedicine. He received his Ph.D. in Computer Science from Duke University, where he was advised by Prof. Ashwin Machanavajjhala and Prof. Kartik Nayak.

---

Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."