Thursday, September 4, 2025
Secure Your Hotel Room for the NSF Cybersecurity Summit Before September 19
Tuesday, September 2, 2025
Trusted CI Celebrates Sixth Cohort Graduation & Opens Call for 2026 Engagement
Trusted CI’s sixth Framework Cohort, “Foxtrot”, successfully completed the six-month program of training and workshop engagement focused on learning and applying the Trusted CI Framework. The Cohort members entered the engagement with a commitment to adopting the Framework at their organizations. They then worked closely with Trusted CI to gather facility information and create validated self-assessments of their cybersecurity programs based on the Framework. Each organization also emerged with a draft Cybersecurity Program Strategic Plan (CPSP) identifying priorities and directions for further refining their cybersecurity programs. Foxtrot cohort included the following research-oriented organizations:
ALMA | DERConnect | UC Davis | US ATLAS | ZEUS
"Participating in the Trusted CI Cohort was an excellent experience and brought significant value to our team. As a research group working at the intersection of the power grid and renewable energy, cybersecurity is critical for both our daily operations and the broader transition to smarter, more connected technologies. The cohort facilitators provided expert guidance and a practical framework that helped us clarify our cybersecurity risks, baseline controls, stakeholder responsibilities, and more. Through their collaborative and thorough approach, we developed an actionable, strategic plan and gained a holistic understanding of our security posture. With this training, we feel empowered and better prepared to implement a robust cybersecurity program, strengthening both our research and industry collaborations."
- Keaton Chia, R&D Engineer and Project Manager, DERConnect
2026 Framework Cohort Call for Participation Open
Trusted CI has a few spots left for the 2026 Framework Cohort engagement (starting January 2026). To learn more or to submit the interest form for your organization, visit trustedci.org/framework/cohort-participation.
Engagement with RISC
Concurrent with leading Foxtrot, Trusted CI continued quarterly engagement with graduates of the five previous Framework cohorts through the Research Infrastructure Security Community (RISC). Trusted CI established RISC as a community of practice to provide a forum for cohort graduates to expand their cybersecurity knowledge, share experiences, and build relationships within the NSF research cyberinfrastructure community.
For more information, please contact us at framework@trustedci.org.
Monday, August 18, 2025
Registration now open: 2025 NSF Cybersecurity Summit – October 20–23 in Boulder, CO
We’re excited to announce that registration is now open for the 2025 NSF Cybersecurity Summit, taking place October 20–23, 2025, at the UCAR Center Green Campus and NSF NCAR in Boulder, Colorado.
This annual Summit brings together cybersecurity practitioners, technical leaders, and risk managers from the NSF Major Facilities and Cyberinfrastructure community. Attendees will also include key stakeholders and thought leaders from across the scientific and cybersecurity landscapes.
🔹 Explore
the 2025 Program
Check out this year’s engaging sessions and speakers.
🔹
Register to Attend
Please complete your registration by October 6, 2025.
🔹 Plan
Your Stay
Trusted CI has secured hotel accommodations for Summit attendees.
If you
have any questions, please don’t hesitate to reach out. Please send an email to
summit@trustedci.org
We look forward to seeing you in Boulder this October!
Sunday, August 10, 2025
Trusted CI Webinar: Securing Medical Imaging AI Models Against Adversarial Attacks, Monday August 25th @ 10am Central
Please register here.
Speaker Bio:
Shandong Wu, PhD, is a Professor in Radiology, Biomedical Informatics, Bioengineering, and Intelligent Systems at the University of Pittsburgh. Dr. Wu leads the Intelligent Computing for Clinical Imaging (ICCI) lab, and he is the founding director of the Pittsburgh Center for AI Innovation in Medical Imaging. Dr. Wu’s work focuses on developing trustworthy medical imaging AI for clinical/translational applications. Dr. Wu's lab received multiple research awards such as the RSNA Trainee Research Award twice in 2017 and 2019, the 2021 AANS Natus Resident/Fellow Award for Traumatic Brain Injury, the 2025 SPIE Imaging Informatics Best Paper Award, etc. Dr. Wu’s research is supported by NIH, NSF, multiple research foundations, Amazon AWS, Nvidia, and many institutional funding sources. Dr. Wu has published > 190 journal papers and conference papers/abstracts in both the computing and clinical fields. His research has been featured in hundreds of scientific news reports and media outlets in the world.
---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Thursday, July 31, 2025
Trusted CI visits IceCube
![]() | |
Trusted CI staff member Megha Moncy holding one of the many hard drives shipped back from the South Pole containing neutrino research data |
In June 2025, members of the Trusted CI team took the opportunity to tour the IceCube Neutrino Detector data center and development facility at the University of Wisconsin - Madison. The team learned about the custom designed sensors and equipment that make up the 1 cubic kilometer detector buried under 1.5 km of ice at the South Pole.
Because the detector produces about 1TB per day of data, and satellite communication to the South Pole is limited, it's still far more efficient to ship hard drives back to the lab after a season of data collection at the detector is finished. However, because the data is so valuable, they write the data to at least two separate arrays of hard drives and ship them on separate logistical channels in case of catastrophe during shipment.
![]() |
Steve Barnet (right), giving a tour of the IceCube development facility. |
The IceCube sensors, which are called "digital optical modules", are about the size of a basketball but surprisingly weigh more than a bowling ball. Most of the weight is owed to the thick glass in each sensor pod that shields the sensitive electronics and photomultipliers from the 1 to 2 kilometers of ice that sit above them. The unique sensors were designed and built by several institutions within the international IceCube Collaboration to withstand the extreme environment of Antarctica.
![]() |
Trusted CI staff member Mark Krenz holding one of the digital optical modules. |
Neutrinos are a fundamental particle generated by the universe's most extreme events such as supernovae and black holes. They travel in straight lines from their origin through the universe, passing through ordinary matter. As neutrinos pass through the Earth from all directions, including through the core of the planet, neutrinos whose path takes them through the south pole IceCube detector pass through the large cubic kilometer of ice making up the array. Most of them pass right through the detector without any interaction, but occasionally they hit an atom in the ice and generate secondary charged particles which travel through the ice faster than light travels through ice. This produces Cherenkov radiation, which creates a blue flash of light. This blue light phenomenon of Cherenkov radiation is what the photomultipliers actually detect.
![]() |
IceCube's testing and development array of sensors. |
The facility also has a test array of sensors that are not encased in glass and stacked closely together that allow IceCube staff to run tests and diagnostics on the electronics before performing the same operations on the production sensor array. This reduces the chance of an incident that damages the entire array, "which would be bad", according to Steve (he likes understatement). Availability is a crucial security requirement for the IceCube array, and one of the threats against the sensors continuing to function is the extreme cold damaging the electronics inside. If the array loses electricity, it would only be a matter of a day or so before large parts of the array would become unrecoverable. Thus, it is important that a generator powering the array in Antarctica run continuously uninterrupted over the lifetime of the experiment. Trusted CI benefits from visiting the IceCube facility by seeing the equipment and better understanding the processes used to program, deploy, and protect the equipment from a variety of security threats.
Monday, July 14, 2025
Trusted CI Webinar: TIPPSS to improve Trust, Identity, Privacy, Protection, Safety and Security for Cyberphysical Systems, Monday July 28th @ 10am Central
Please register here.
Speaker Bio:
Florence Hudson is Executive Director of the Northeast Big Data Innovation Hub at Columbia University, leading over $10M in projects funded by the National Science Foundation, National Institutes of Health, and Department of Transportation. She is also Founder & CEO of FDHint, LLC, a global advanced technology consulting firm. A former IBM Vice President and Chief Technology Officer, Internet2 Senior Vice President & Chief Innovation Officer, Special Advisor for the NSF Cybersecurity Center of Excellence, and aerospace engineer at the NASA Jet Propulsion Lab and Grumman Aerospace Corporation, she is an Editor in Chief and Author for Springer, Elsevier, Wiley, IEEE, and other publications. She leads the development of global IEEE/UL standards to increase Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for connected healthcare data and devices and cyberphysical systems, and is Vice Chair of the IEEE Engineering Medicine & Biology Society Standards Committee. She earned her Mechanical and Aerospace Engineering degree from Princeton University, and executive education certificates from Harvard Business School and Columbia University.
![]() |
IEEE Emerging Technology Award |
---
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Thursday, July 10, 2025
Applications are now open for the 2025 Trusted CI Fellowship!
We’re excited to announce that applications are now open for the 2025 Trusted CI Fellowship. This is your chance to receive expert training, work closely with Trusted CI members, and further empower the NSF community to secure its own research.
Click here to learn more about the Fellows program and to view our past Fellows
Click here to apply for the program
The application deadline is Thursday, July 31, 2025
Trusted CI’s past Fellows have been an amazing success with 35 Fellows from various fields, including:
Research Technologies
Astrophysics
Criminal Justice
Network and Combinatorial Optimization
and Computer Engineering
Fellowship Benefits:
- Participation in Virtual Cybersecurity Institute Training Workshops
- Receive funding to attend the 2025 NSF Cybersecurity Summit
- Access to Trusted CI staff and other Cybersecurity professionals
Participation in the Fellows program will occur from October 2025 to April 2026.