Recently NCSA produced a short video about Trusted CI, titled "NCSA's Partnership with Trusted CI helps secure over $7 Billion worth of Science." Click below to see the video. Read the corresponding news story here.
Showing posts with label NCSA. Show all posts
Showing posts with label NCSA. Show all posts
Thursday, June 21, 2018
NCSA video and news story about Trusted CI
The Trusted CI team is made of a partnership with Indiana University, the National Center for Supercomputing Applications (NCSA) at the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center.
Recently NCSA produced a short video about Trusted CI, titled "NCSA's Partnership with Trusted CI helps secure over $7 Billion worth of Science." Click below to see the video. Read the corresponding news story here.
Recently NCSA produced a short video about Trusted CI, titled "NCSA's Partnership with Trusted CI helps secure over $7 Billion worth of Science." Click below to see the video. Read the corresponding news story here.
Monday, June 11, 2018
CCoE Webinar June 25th at 11am ET: Security Program at LSST

The concept behind the Large Synoptic Survey Telescope (LSST) is simple: conduct a digital image-based survey over an enormous area of the sky and build an extensive astronomical catalogue over the course of ten years. LSST’s astronomical data is the ultimate deliverable to its users. This unique scientific computing environment presents many cyber security challenges. LSST has in place a cyber security program to facilitate its scientific mission: to protect its data access requirements and rights. We will discuss the beginnings of LSST’s cyber security program, adoption and experience with its risk management framework, existing and planned security operations at LSST sites, including the observatory site in Chile and the National Center for Supercomputing Operations (NCSA).Presentations are recorded and include time for questions with the audience.
This talk is presented by Alex Withers. Alex is a Senior Cybersecurity Engineer at the National Center for Supercomputing Applications (NCSA). He is the Information Security Officer for the Large Synoptic Survey Telescope (LSST). He is also a PI and co-PI for a number of NSF-funded cybersecurity projects.
Join Trusted CI's announcements mailing list for information about upcoming events. To submit topics or requests to present, see our call for presentations. Archived presentations are available on our site under "Past Events."
Wednesday, May 28, 2014
CTSC Creates Tutorial Series on Cybersecurity
The National Center for Supercomputing Applications (NCSA) security team has produced “Building a Cybersecurity Program”—a 19-part online video tutorial series—as part of the Center for Trustworthy Scientific Cyberinfrastructure’s (CTSC) continuing
effort to improve the cybersecurity of NSF-funded computational science
and engineering projects. CTSC is a collaborative effort bringing
together expertise in cybersecurity from multiple internationally
recognized institutions, including NCSA, Indiana University, the
University of Wisconsin-Madison, the University of Wisconsin-Milwaukee,
and the Pittsburgh Supercomputing Center (PSC).
Science and engineering increasingly rely on
computing, digital data and interoperability for the success of their
education, collaboration and research efforts. Collaboration across
countries and between disciplines is characterized by its open nature,
use of unique instruments, large and complex data sets, and rich
ecosystems. Appropriate cybersecurity measures for scientific
cyberinfrastructure (CI) can therefore look very different from those of
commercial CI. Just evaluating and choosing technologies for identity
management, authentication, authorization, and auditing are major
challenges.
CTSC feels that cybersecurity should not
dictate how science is done; rather, it should support and enable the
workflows and technology choices made by science teams.
“CTSC grew from the understanding that these
teams want to focus on their research endeavors and collaborate across
campus and the across the country without having to worry about what
might hinder them doing so freely and openly,” says Randy Butler, Deputy
Director for CTSC, leader of CTSC Education, Outreach and Training,
NCSA Director of the Cybersecurity Directorate and Chief Security
Officer. To address that need, NCSA’s security team put together this
series of video tutorials, giving an overview of what cybersecurity
looks like for a scientific CI project and how to build it in. “We have
outlined a specific process, carefully tailored to the science
community’s needs. The new videos make that process easy to understand
and enact,” continues Butler.
“Many research projects don’t have the
dedicated information security expertise, time or resources to develop a
comprehensive information security program,” adds James Marsteller, PSC
Information Security Officer and member of the CTSC team. Marsteller
was one of the authors who developed the class materials that served as
the starting point for the video production process. “Researchers and
the general public can be assured these training resources were
developed by information security professionals who understand the needs
of the scientific CI community’s unique needs.”
Patrick Duda, Research Programmer for NCSA
Cybersecurity and producer of these CTSC video tutorials, says the team
is now looking to expand this original “how to get started” idea into a
full blown, one-stop resource for all things cybersecurity series, “It’s
looking at the community that we are working with and saying ‘what is
it that a lot of people are struggling with right now and focusing on
those particular topics over time.”
Duda imagines that, from here, the team will
begin to focus on writing and producing tutorials delving deeper into
passwords and password management as well as identity management. They
hope to have five new videos posted this summer.
Keep up on project happenings by following the CTSC blog and continue to be on the look out for new videos posted to the project’s online video tutorial space
Labels:
cybersecurity programs,
NCSA
Subscribe to:
Posts (Atom)