Successfully reported this slideshow.
Your SlideShare is downloading. ×

Cybersecurity for Conservation

Advertisement

More Related Content

Advertisement

Cybersecurity for Conservation

  1. 1. Cybersecurity for Conservation
  2. 2. Center for Trustworthy Cyberinfrastructure The NSF Cybersecurity Center of Excellence
  3. 3. CTSC Activities More information at trustedci.org Tailored Public Resources Outreach Community Events Engagements Training
  4. 4. CTSC-IBEIS Engagement
  5. 5. CTSC-IBEIS Prototype
  6. 6. Access Control Policy Examples Subject (Role) Resource Action Organization Member Media Asset CR Data Curator Annotations CRUD Organization Administrator Organization Policy CRUD Platform Administrator Organization CRUD
  7. 7. More info on CTSC engagements
  8. 8. Risk Self-Evaluation
  9. 9. Guide to Developing Cybersecurity Programs
  10. 10. Guide to Developing Cybersecurity Programs
  11. 11. Example Risks and Mitigations
  12. 12. Additional Resources
  13. 13. We thank the National Science Foundation (grant 1547272) for supporting our work. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NSF.

×