Help shape the Summit program by selecting the content you want to learn more about. You can suggest new topics in the comment field. We also want to hear more about your travel plans this year.
Thank you for your time!
https://forms.gle/1aavqtYvvLRuLJCo7
This form will close on Tuesday, May 27th at 5pm Eastern.
To learn more about the Summit, go to: https://trustedci.org/summit
Monday, May 12, 2025
2025 NSF Cybersecurity Summit Topics and Travel Plans
Friday, May 9, 2025
2025 Trusted CI Student Program Cohort Announced
The Trusted CI Student Program provides undergraduate and graduate students with hands-on experience, mentorship, and opportunities to learn how to build a secure and resilient digital future. Our program allows them to connect with the nation’s leading cybersecurity experts and equips them with the skills and knowledge necessary to succeed in the increasingly critical field of cybersecurity.
We are pleased to announce the 2025 Trusted CI Student Program cohort. Over the next six months, our students will learn about essential cybersecurity topics from Trusted CI experts. They will attend bi-monthly webinars from May to October, covering cybersecurity topics, soft skills, and career prep. This year’s cohort includes graduate students with interests in financial security, risk assessment, governance policy, and high performance computing. Read more about their backgrounds and what they hope that they will learn during their time with Trusted CI:
Saquoia Cox is a graduate student studying cybersecurity with a background in Accounting and Business Administration. She currently works as a Senior Accounting Analyst at The Walt Disney Company and serves as a peer mentor supporting students across various disciplines. Saquoia is passionate about the intersection of cybersecurity, finance, and digital ethics. She aims to help organizations safeguard both their data and financial integrity.
Kofoworola Idowu is a graduate student in cybersecurity at Yeshiva University, passionate about protecting digital assets and staying ahead of emerging threats. With a strong foundation in systems administration, risk assessment, and vulnerability management, she is excited to bring her skills and enthusiasm to the Trusted CI Student Program and contribute to its vibrant community. When she is not diving into the world of threat analysis and security protocols, you can find her trying out new hobbies or dancing. She is looking forward to collaborating, learning, and growing with like-minded individuals.
Trina Locklear is a doctoral student in the Computer Science department at The University of Alabama. She is also a member of the Lumbee Tribe of North Carolina. Her research interests include software security in high performance computing. She is a former GAANN fellow and intern at Lawrence Livermore National Laboratory. She loves to bake and southern pound cake is her speciality.
Konstantin Metz is a graduate student in cybersecurity at the University of Central Florida, where he is pursuing an M.S. in cybersecurity and privacy as a CyberCorps Scholarship for Service recipient. His academic research centers on human-computer interaction, with a focus on dark patterns and digital accessibility for individuals with vision impairments. He holds a Bachelor of Science in information technology with a minor in cybersecurity and strategic communications within public relations from Nova Southeastern University. Metz has held technical and analytical roles in both the U.S. government and private sector, concentrating on incident response, cloud security, and systems administration. A bilingual speaker of German and English, he is a prospective Ph.D. student, whose research interests include governance, risk and compliance, cybersecurity policy and law, and the implementation of cloud infrastructure. In his free time, he enjoys exploring emerging technologies in health care, supporting his communities, cooking, and traveling.
Friday, May 2, 2025
Trusted CI Webinar: Conducting Responsible Human-Centered AI Research, Monday May 19th @ 10am Central
Clemson University's Bart Knijnenburg is presenting the talk, Conducting Responsible Human-Centered AI Research, on Monday May 19th at 10am, Central time.
Please register here.
In this talk, I present findings from a series of investigations into human-centered AI research studies: our team systematically reviewed AI-related studies published at the ACM SigCHI conference, we interviewed researchers who conducted human-subjects studies with LLMs, and we conducted a scenario-based study to unpack study participants' opinions about AI-based research.
We find that (1) many papers lack important details about basic study parameters, (2) researchers often fail to disclose the use of LLMs to research participants, and (3) participants are sensitive to study parameters like anonymization, data retention and consent, but are unaware of the threats of third-party data sharing and of data leakage through model training. I will discuss these findings, and more, during the talk.
Speaker Bio:
Dr. Bart Knijnenburg is an Associate Professor in Human-Centered Computing at Clemson University where he co-directs the Humans And Technology Lab (HATLab). His research explores the societal, social, and psychological aspects of human interaction with intelligent systems. His research has been funded by the NSF (including a CAREER award), the Department of Defense, the Department of Education, the Department of Justice, and corporate gifts.---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Tuesday, April 29, 2025
Trusted CI Member Spotlight: Rick Wagner
Rick Wagner is the Chief Technology Officer of the San Diego Supercomputer Center (SDSC), a facility based at UC San Diego.
Rick has been interested in many topics, including astrophysics, high performance computing, and cybersecurity. But, over time, he’s learned that he’s got one real passion: understanding how researchers use technology to achieve their research goals. He’s been a part of Trusted CI since 2021, when he served as a Trusted CI Fellow. We recently talked with Rick to learn more about his professional journey and work with Trusted CI’s programs.
IntroHow do you become the chief technology officer for a supercomputer center? Rick laughs and replies, “You do that by studying astrophysics and being very, very good with computers." He started by attending San Diego Mesa Community College, where he discovered an initial interest in physics. At UC San Diego, as an undergraduate, he worked with a professor who became his research advisor. From there, Rick became interested in studying turbulence in outer space. "That meant I had to do a lot of data analysis and parallel computing,” Rick explains, “I enjoyed working with the computers and those two things dovetailed.”
At the crossroads of cybersecurity and computer science
While in graduate school at UC San Diego, Rick started to work in the high performance computing clusters at SDSC. Eventually, he worked his way up and became the High Performance Computing System Manager. More and more, Rick was working closely with SDSC security engineers. While he enjoyed these interactions, he noticed that there was sometimes tension between his colleagues and the cybersecurity staff. Rick found that by bringing the security engineers into the systems management process, things got smoother, particularly by asking the security team to help manage the system configuration through the same DevOps process as the systems group.
After graduating, Rick also worked with the University of Chicago, as part of Globus, a research data management platform that connects over 150,000 users. In his new role, he helped groups develop portals. At one point, while working on building services for a federal agency, Rick saw cybersecurity professionals and research staff struggle to communicate once again. Suddenly, he had a realization. Both groups shared a common goal but viewed the project through two different lenses. “Somebody needed to be the mediator between those two groups,” Rick explains, “And that project really was what cemented my activity to be like, I know how to do this. I know how to align the cybersecurity and research needs, and communicate that in a way both groups can understand.” Rick saw a gap and realized he had the necessary skills to bridge the cybersecurity and research community.
Getting involved with Trusted CI
While at Globus, Rick started to hear about Trusted CI. Globus relied on CILogon, a service run by Jim Basney, and there were many overlaps between the communities (e.g., Trusted CI reviewed the Globus software stack).
After returning to work at UCSD, in 2020, his supervisor suggested Rick apply to the Trusted CI Fellows Program. Rick joined the 2021 cohort and quickly saw the value of working with a small, dedicated group. Rick notes that, because it was COVID times, the group grew very tight-knit and frequently met over ZOOM to talk about common interests and lessons learned. “The idea,” Rick observes, “is that [fellows] can reach out and talk to each other….[the fellowship] is a way to approach building groups of people to promote a goal, in this case, research cybersecurity.”
At the time, Rick was working on a NIH project that he brought with him from UChicago back to UCSD. As Rick worked through his project, he discovered the Trusted CI Framework, a comprehensive cybersecurity resource with templates and tools that helps organizations establish and refine their programs. “It gave me a way to communicate what the project I was working on was doing,” Rick recalls, “Where we were trying to fit around the expectations of security compliance from the federal agency.” Most importantly, Rick said, “the Trusted CI Framework enabled me to say, here is our path. It's achieving our goals, it's enabling security.”
Finding a place in a research community of experts
After Rick started participating as a Fellow, he continued to volunteer and work with the Trusted CI community. Between 2023 and 2024, he was a NSF Cybersecurity Summit Program Committee member. In that role, Rick helped to shape the NSF Cyber Security Summit’s program helping to select keynote speakers, review community proposals and make suggestions on the program flow.
He continues to be involved in the Trusted CI Fellows Program as a moderator of the yearly panel at the Summit. Rick also organizes workshops at the Summit. In one regular session, he collaborates with Mark Krenz on a combined tutorial and workshop about approaching security for Jupyter Notebooks. Rick fondly remembers the very first workshop, held at the Summit in San Diego in 2019. “The attendees were able to give us feedback,” he recalls, “Like, Hey, I'm a security engineer and users are asking for me to deploy this, and I don't understand how it works. And I'm like, oh, you're right. I could see how that's a challenge.”
Rick relishes every opportunity to gather user feedback. He loves learning more about how people work with technology and how to make the process even smoother. Every day, he’s motivated by helping people feel like they’re enjoying their interactions with software and computers. Rick has found a group of similarly excited researchers, software engineers, and cybersecurity experts at Trusted CI. Rick appreciates how Trusted CI offers webinars, tools, and resources like the Trusted CI Framework. “I think it's one of the better places to turn,” says Rick, “to stay abreast of what's going on with research cybersecurity, particularly the NSF landscape.”
Are you interested in keeping track of what’s new with Trusted CI? Sign up for our announcements listserv (announce+subscribe@trustedci.org) for regular updates on upcoming webinars and tools.
Friday, March 14, 2025
Trusted CI Webinar: The Operational Technology Procurement Vendor Matrix, Monday March 31st @10am Central
Please register here.
In this webinar, we will walk through what security issues impact OT, the role of procurement in mitigating security risks, our reasoning and process for developing the Matrix, and a walk through on how to use the Matrix at your organization. Questions and shared experiences with OT are encouraged.
TARGET AUDIENCE:
Organizational leadership, procurement department, IT, cybersecurity
The Matrix can be found at https://trustedci.org/ot-matrix
Speaker Bio:
Chief Security Analyst Mark Krenz is focused on cybersecurity operations, research, and education. He has more than two decades of experience in system, network administration, programming, and system security and has spent the last decade focused on cybersecurity. He also serves as the CISO of Trusted CI.---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Wednesday, March 12, 2025
Trusted CI 2024 Summit Report Now Available
Last October, Trusted CI convened the 2024 NSF Cybersecurity Summit. This yearly event provides a forum for National Science Foundation (NSF) scientists, researchers, cybersecurity, and cyberinfrastructure (CI) professionals and stakeholders to share effective technical practices and brainstorm solutions to everyday challenges facing cybersecurity environment professionals. When the community comes together for the Summit, they collectively learn from each other.
The 2024 Summit was held in person in Pittsburgh, PA, at Carnegie Mellon University. Over 250 individuals attended, including representatives of 44 NSF projects. Lorrie Faith Cranor, the Director and Bosch Distinguished Professor in Security and Privacy Technologies at the Cylab Security and Privacy Institute, delivered the keynote lecture and gave suggestions on how to develop the best cybersecurity practices for users.
During the four days of the Summit, attendees could choose from various workshops, training sessions, and seminars. These included topics such as:
- How to adopt the Trusted CI Framework
- How to apply Generative AI for cybersecurity defense
- How to manage cybersecurity and ransomware risks
Monday, March 10, 2025
Trusted CI and the Research Infrastructure Security Community Respond to NSF’s Draft Research Infrastructure Guide
Trusted CI, in collaboration with the Research Infrastructure Security Community (RISC), submitted comments to the U.S. National Science Foundation (NSF) regarding Section 5.3 of NSF’s 2025 draft Research Infrastructure Guide (RIG). These comments offer the community’s perspective on the NSF’s proposed new guidance for Major Facilities and Mid-Scales on building their cybersecurity programs.
RISC is a community of practice built by Trusted CI for NSF-funded cybersecurity professionals. RISC is composed of graduates from the Trusted CI Framework Cohort Program, who continue to gather as a community to expand their cybersecurity knowledge, share experiences, and build relationships.
For more information, please contact us at info@trustedci.org.
Monday, February 10, 2025
Trusted CI Webinar: Trusted Volunteer Edge-Cloud Computing for Scientific Workflows, Monday February 24th @10am Central
Please register here.
Speaker Bio:
Prasad Calyam is a Curators’ Distinguished Professor and the Greg L. Gilliom Professor of Cybersecurity in the Department of Electrical Engineering and Computer Science at University of Missouri-Columbia, and Director of the Center for Cyber Education, Research and Infrastructure (Mizzou CERI). His research and development areas of interest include: Cloud Computing, Machine Learning, Artificial Intelligence, Cyber Security, and Advanced Cyberinfrastructure. He has published over 235 peer-reviewed papers in various conference and journal venues. As the Principal Investigator, he has successfully led teams of graduate, undergraduate and postdoctoral fellows in Federal, State, University and Industry sponsored R&D projects sponsored by National Science Foundation, Department of Energy, National Security Agency and others. His basic research and software on multi-domain network measurement and monitoring has been commercialized as ‘Narada Metrics’.---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Thursday, January 30, 2025
Trusted CI: Relaunching and Expanding the Student Program
“My mentor (Carolyn Ellis) is really one of a kind; she is among those few individuals who sees the potential in me and, at the same time, believes so much in me that this belief drives me to work harder, and strive for excellence. I am so fortunate enough to have her as my guide and mentor on my path.”
“The 2024 NSF Cybersecurity Summit was a big, unforgettable platform for me as a Cybercorp Scholar, where I presented my poster, "Defending Electoral Integrity in the Age of Cyber Warfare," which gave me the chance to share my research on how digital disinformation, botnets, and deepfakes are impacting elections.”
“The event is unlike any other in the industry! It brings together industry professionals, faculty, and students from across the globe to learn, network, and collaborate on current and emerging cybersecurity issues. It gives students an unparalleled opportunity to learn and grow while showcasing some of their own work. I am honored to have been selected to present and cannot wait for next year!”
“I had the opportunity to meet some incredibly interesting individuals. Overall, I would highly recommend this experience to other students in the future, as it was beneficial both professionally and educationally, and I took away a lot from it.”
“The CTF session provided a hands-on experience that challenged my problem-solving skills. It was refreshing to participate in a group project, as collaboration helped me gain new insights that I wouldn’t have achieved working solo.”
“The talks and panel discussions were not only engaging but also thought-provoking, covering topics ranging from emerging threats to innovative protection strategies. As someone still exploring career paths in cybersecurity, I found the presentations particularly enlightening.”
- Providing Foundational Knowledge: Selected students will gain practical insights into cybersecurity through workshops, mentorship, and participation in the annual NSF Cybersecurity Summit.
- Fostering Community: By actively recruiting students from a wide range of backgrounds, the program aims to create a supportive environment that values a variety of perspectives.
- Empowering Advocacy: Students will serve as cybersecurity ambassadors in their communities, equipping their peers with knowledge and connecting them with Trusted CI for more complex challenges.
- Building Long-Term Connections: Participants will join a growing network of Trusted CI alumni, opening doors to mentorship, networking, and career opportunities in the cybersecurity field.
While the program currently welcomes five students annually, our goal is to expand participation to 15 students in future cycles as resources allow. This growth ensures more students benefit from Trusted CI’s expertise.
We recognize the value of long-term connections, which is why past participants will now retain access to valuable program resources and opportunities to attend the Trusted CI Summit. This fosters an ongoing learning community and professional network.
Students will gain deeper insights through tailored workshops and dedicated one-on-one mentorship sessions. These sessions will be led by Trusted CI staff and esteemed industry experts, ensuring a well-rounded educational experience.
To provide a holistic evaluation of applicants, the revised application process will require a personal statement, a professional biosketch, and letters of support. This approach ensures we select students who are not only qualified but also deeply passionate about cybersecurity.
- Attend workshops on cybersecurity fundamentals, career development, and emerging trends.
- Network with top professionals and researchers at the NSF Cybersecurity Summit, an annual conference dedicated to advancing cybersecurity in research and education. This event provides a unique opportunity to learn from experts, engage in discussions on emerging cybersecurity challenges, and build valuable connections within the field.
- Work closely with mentors who will guide their growth and help them navigate the cybersecurity landscape.
- Share their experiences through blog posts, presentations, and outreach activities, inspiring others to explore careers in cybersecurity.
Monday, January 6, 2025
From Silos to Community: The Rapid Rise of RRCoP to Support Regulated Research
The research landscape is evolving rapidly and adding complexity with new cybersecurity compliance requirements. Researchers and research support departments now face a growing list of cybersecurity and compliance tasks that extend beyond individual projects, elevating these obligations to the institutional level. Built on principles of openness and collaboration, research institutions must navigate requests for compliance attestations on data handling, processing, sharing, and storage—areas often outside researchers’ expertise. Without robust training programs or a stable regulatory landscape, individuals are frequently left scrambling for current information. Individuals often also lack local colleagues to consult, making them feel isolated and uncertain. This fragmented approach, seen across individuals, departments, institutions, and the national level, inspired the formal creation of the Regulated Research Community of Practice (RRCoP) in 2021 after individuals led a series of workshops focusing on commonalities of challenges facing institutions supporting regulated research.
RRCoP brings together a rapidly growing network of professionals addressing the unique challenges of cybersecurity and compliance in academic research. Led by Trusted CI Co-PI Carolyn Ellis, Director of Research Cybersecurity and Compliance at Arizona State University, RRCoP fosters connections and builds expertise across institutions. Ellis co-founded the community while managing Purdue University’s research Controlled Unclassified Information (CUI) program, where she experienced firsthand the tensions between implementing complex compliance programs and maintaining the openness of academic research. “Today, RRCoP is more than a collection of resources or formal training,” Ellis explains. “We’ve built a community where professionals can learn from one another, collaborate, and tackle big challenges. This community is redefining how institutions support research subject to regulations.”
RRCoP has also developed a wealth of resources, including a recorded monthly webinar series held on the second Wednesday of each month, co-located training seminars at conferences, mentoring opportunities, and an annual hands-on workshop designed to address the most pressing challenges in regulated research. In 2022, RRCoP facilitated a full-day workshop at the EDUCAUSE Cybersecurity Privacy Professionals Conference, where attendees collaboratively wrote responses to 43 controls in a System Security Plan. The 2023 workshop brought higher education professionals together with certified assessors for a cost-effective day of dialogue. All RRCoP resources are offered at no cost to the community and are accessible on their comprehensive website at regulatedresearch.org. Most recently, two leaders of the RRCoP community, Ellis and Erik Deumens, have collaborated on an article about the pressing need for compliance requirements in research in Communications of the ACM. Review the highlights of RRCoP’s 2024.
Trusted CI has expanded its mission to support regulated research by building on the expertise and resources developed by RRCoP. Trusted CI is able to sustain the valuable services RRCoP offers; Trusted CI’s team members will provide additional expertise, access to its extensive community, and established processes. Moving forward, RRCoP aims to use this collective voice to elevate the unique challenges faced by higher education to decision-makers. Additionally, extending Trusted CI’s established resources into the higher education community, which is supported by RRCoP, will strengthen both groups. Together, the Trusted CI and RRCoP communities will continue to grow by sharing services, expertise, and relationships, creating a stronger foundation for supporting regulated research across institutions.
The December 2024 RRCoP webinar featured a presentation titled Trusted CI & RRCoP’s Next Five Years, presented by Sean Peisert, Trusted CI Director and PI, Scott Russell, Trusted CI Deputy Director and Framework Lead, Carolyn Ellis, Trusted CI Co-PI and Regulated Research Lead.
Trusted CI Webinar: A Unified Monitoring Approach to Enhancing the Security and Resiliency of Hazard Workflows, Monday January 27th @12pm Central
Please register here.
Speaker Bios:
Sudarsun Kannan is an Assistant Professor in the Computer Science Department at Rutgers University. His research focuses on operating system design and its intersection with computer architecture, distributed systems, and high-performance computing (HPC) systems. His work has been published in top venues such as ASPLOS, OSDI, and FAST, and he has received best paper awards at SOSP and ASPLOS, along with the Google Research Scholar award. He co-chaired the HotStorage'22 workshop and serves as an Associate Editor for ACM Transactions on Storage. Before joining Rutgers, he was a postdoctoral research associate at Wisconsin-Madison and graduated with an M.S. and Ph.D. from Georgia Tech.
Ramakrishnan (Ram) Durairajan is an Associate Professor in the School of Computer and Data Sciences, and co-directs the Oregon Networking Research Group (ONRG) at the University of Oregon. Ram earned his Ph.D. and M.S. degrees in Computer Sciences from the University of Wisconsin - Madison and his B.Tech. in Information Technology from the College of Engineering, Guindy (CEG), Anna University. He has published over 50 peer-reviewed papers in various conferences, journals, and workshops. His research has been recognized with several awards including the NSF CAREER award, NSF CRII award, Ripple faculty fellowship, UO faculty research award, best paper awards from ACM CoNEXT and ACM SIGCOMM GAIA, and has been covered in several fora (NYTimes, MIT Technology Review, Popular Science, Boston Globe, Gizmodo, Mashable, among others). Recently, his research on Internet topology has been named as "One of the 100 Greatest Innovations," has been cited in FCC's Spectrum Frontiers 2d Report and Order, and has won a number of awards including the "Best of What's New" (in security category) by the Popular Science Magazine.
---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."