The document provides an update from the director of CACR (Center for Applied Cybersecurity Research). It summarizes the upcoming spring seminar series speakers, thanks those involved in making the seminars possible, and discusses the current cybersecurity landscape including frequent software vulnerabilities and data breaches. It also outlines the director's wishes for better software evaluation tools, more sharing of breach details and intelligence, and increased funding spanning research and operations. Finally, it provides an overview of CACR's vision and role within Indiana University to interweave technical and policy expertise across disciplines to improve cybersecurity.
This document discusses science gateways and the Science Gateways Community Institute (SGCI). It provides definitions of science gateways and describes how they are changing research. It outlines results from a large survey of researchers that found most use specialized resources through gateways and many have played a role in gateway creation. The document discusses challenges in building gateways and how SGCI aims to help through providing expertise, extended developer support, and collaboration opportunities. It provides examples of early projects that received support from SGCI consultants.
The document describes the Science Gateways Community Institute (SGCI), which provides long-term support for building science gateways. It outlines SGCI's services, which include consulting expertise, developer support, a software collaborative, community engagement resources, and workforce development opportunities. SGCI aims to help the scientific community build gateways more effectively through these diverse and hands-on services.
Trustworthy Computational Science: Lessons Learned and Next StepsVon Welch
This document discusses lessons learned and next steps for trustworthy computational science from a 2015 NSF Cybersecurity Summit. It notes that the threat landscape and technologies are constantly changing, while science environments are open and collaborative. Effective cybersecurity programs must minimize costs while not negatively impacting science productivity. Risk assessments should understand critical assets to focus protection. While data may be public, reputation and integrity are important. Resources like the NSF Cybersecurity Center of Excellence can provide assistance to computational science communities.
Facilitating Scientific Collaborations by Delegating Identity ManagementVon Welch
The document summarizes the research of the XSIM Team on facilitating scientific collaborations through delegating identity management. It provides context on how scientific collaborations have evolved from localized to remote and large-scale. It identifies barriers to identity management like historical inertia, risk aversion, and compliance requirements. The document then presents the XSIM VO Identity Model and examples of incremental identity delegation approaches used at facilities like NERSC and XSEDE to reduce costs while maintaining security. It concludes that virtual organizations are essential to science and strategies exist to incrementally increase trust and delegation of identity functions.
Von Welch from the Center for Trustworthy Scientific Cyberinfrastructure discusses cybersecurity for science. The center aims to increase understanding of cybersecurity for the NSF community and advance its implementation. The presentation outlines that cybersecurity has historically focused only on technical aspects but now must support the scientific mission by managing risks. It also discusses trust in science data and ensuring infrastructure does no harm. The center engages with various science projects, provides education and training, and organizes cybersecurity summits to facilitate collaboration.
This document discusses science gateways and the Science Gateways Community Institute (SGCI). It provides definitions of science gateways and describes how they are changing research. It outlines results from a large survey of researchers that found most use specialized resources through gateways and many have played a role in gateway creation. The document discusses challenges in building gateways and how SGCI aims to help through providing expertise, extended developer support, and collaboration opportunities. It provides examples of early projects that received support from SGCI consultants.
The document describes the Science Gateways Community Institute (SGCI), which provides long-term support for building science gateways. It outlines SGCI's services, which include consulting expertise, developer support, a software collaborative, community engagement resources, and workforce development opportunities. SGCI aims to help the scientific community build gateways more effectively through these diverse and hands-on services.
Trustworthy Computational Science: Lessons Learned and Next StepsVon Welch
This document discusses lessons learned and next steps for trustworthy computational science from a 2015 NSF Cybersecurity Summit. It notes that the threat landscape and technologies are constantly changing, while science environments are open and collaborative. Effective cybersecurity programs must minimize costs while not negatively impacting science productivity. Risk assessments should understand critical assets to focus protection. While data may be public, reputation and integrity are important. Resources like the NSF Cybersecurity Center of Excellence can provide assistance to computational science communities.
Facilitating Scientific Collaborations by Delegating Identity ManagementVon Welch
The document summarizes the research of the XSIM Team on facilitating scientific collaborations through delegating identity management. It provides context on how scientific collaborations have evolved from localized to remote and large-scale. It identifies barriers to identity management like historical inertia, risk aversion, and compliance requirements. The document then presents the XSIM VO Identity Model and examples of incremental identity delegation approaches used at facilities like NERSC and XSEDE to reduce costs while maintaining security. It concludes that virtual organizations are essential to science and strategies exist to incrementally increase trust and delegation of identity functions.
Von Welch from the Center for Trustworthy Scientific Cyberinfrastructure discusses cybersecurity for science. The center aims to increase understanding of cybersecurity for the NSF community and advance its implementation. The presentation outlines that cybersecurity has historically focused only on technical aspects but now must support the scientific mission by managing risks. It also discusses trust in science data and ensuring infrastructure does no harm. The center engages with various science projects, provides education and training, and organizes cybersecurity summits to facilitate collaboration.
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
Trust is critical to the process of science. Two decades ago the Internet and World Wide Web fostered a new age in computational science with the emergence of accessible and high performance computing, storage, software, and networking. More recent paradigms, including virtual organizations, federated identity, big data, and global-scale operations continue to evolve the way computing for science is performed.
Advancing technologies, the need to coordinate across organizations and nations, and an evolving threat landscape are sources of ongoing challenges in maintaining the trustworthy nature of computational infrastructure and the science it supports. To address these challenges, a number of projects have focused on improving the cybersecurity and trustworthiness of scientific computing. Recent examples include the Center for Trustworthy Scientific Cyberinfrastructure funded by NSF, the Software Assurance Marketplace funded by DHS, and the Extreme Scale Identity Management for Science project funded by DOE.
This presentation will give a 20 year retrospective together with a vision for the future of cybersecurity for computational science. It will describe the state of trust and cybersecurity for scientific computing, its evolution over the past twenty years, challenges it is facing today, how the exemplar projects are addressing those challenges, and a vision of cybersecurity for research and higher education in general augmenting each other in the future.
Facilitating Scientific Collaborations by Delegating Identity ManagementVon Welch
This document summarizes a presentation on facilitating scientific collaborations through improved identity management. It discusses interviewing various virtual organizations and resource providers to understand challenges with current identity management processes. It proposes sharing identity management responsibilities between labs and virtual organizations to improve scalability, ease collaboration, and reduce duplication. Barriers like risk aversion and compliance requirements are identified, along with potential mitigations like sandboxes and site-virtual organization agreements. A data-centric model for representing identity management sharing is introduced to facilitate communication between scientists, identity management, and cybersecurity teams. The overall goal is to increase open science productivity through better identity management.
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingVon Welch
The document discusses updates from two organizations, XSIM and CTSC. XSIM aims to develop identity management guidance for scientific collaborations based on 15 years of experiments. It has produced two documents available on its website. CTSC works to increase understanding and implementation of cybersecurity for science. It engages with NSF projects through security evaluations and plans. CTSC also produced a cybersecurity program guide for science projects. Both organizations thanked their sponsors and invited attendees to an upcoming cybersecurity summit.
This document summarizes a presentation on identity management models for virtual organizations. It discusses:
1. The growth of scientific collaborations involving large numbers of scientists across institutions which made traditional identity management by individual resource providers difficult.
2. The concept of a "virtual organization" as a key way for large multi-institutional science collaborations. Examples of major virtual organizations are provided.
3. Challenges with identity management in virtual organizations and different approaches that have been tried, including delegating some identity management from resource providers to virtual organizations.
4. A proposed "data-centric" model for understanding identity management in virtual organizations based on the production and consumption of identity data to enable functions like authentication
This document discusses cybersecurity challenges for science. It notes that cybersecurity is important to enable cyberinfrastructure and scientific collaboration while maintaining trust in science. Some challenges discussed are the open nature of scientific software and communities which create large attack surfaces, and the need to manage identity and access for international user communities. The document promotes two initiatives, TrustedCI.org which addresses cybersecurity challenges for the NSF community, and XSIM which develops models for identity management at extreme scales.
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
This document summarizes research on identity management for scientific collaborations. The researchers (1) developed a model to explain variations in identity architectures across virtual organizations and resource providers, and (2) identified factors influencing identity delegation between organizations. Through interviews with 20 collaborations, they found that virtual organizations alter direct trust between users and resources, often delegating identity management tasks to the virtual organization based on trust. Their outputs include publications and guidance on implementing identity management to reduce barriers to collaboration.
The Center for Applied Cybersecurity Research (CACR) at Indiana University was founded in 2003 to conduct interdisciplinary cybersecurity research and provide expertise in risk management, policy, and compliance. CACR has over $16 million in external funding and partnerships with organizations such as CMU, U of Illinois, and U of Wisconsin. It works on key projects like the Cybersecurity for Trustworthy Scientific Cyberinfrastructure to help scientific collaborations and the Software Assurance Marketplace to improve software integrity. CACR also runs education and outreach programs including internships, a seminar series, and an annual cybersecurity summit.
A call to librarians to use their library powers in the community beyond the walls of their institutions as the open data folks need their knowledge!
Title:
Open Sesame: Open Data, Data Liberation and New Opportunities for Libraries
Abstract:
Cities and data producers are quickly embracing Open Data, albeit unevenly. The Data Liberation Initiative (DLI) has been a pioneer in broadening access to data for nearly two decades. This session will examine the relevance of Data Liberation in terms of Open Data and explore how librarians can step up to the plate to make Open Data/Open Government as successful as DLI.
Speakers:
- Wendy Watkins, Data Librarian, Carleton University
- Ernie Boyko, Adjunct Data Librarian, Carleton University
- Tracey P. Lauriault, Post Doctoral Fellow, Carleton University (tlauriau@gmail.com)
- Margaret Haines, University Librarian, Carleton University
The document provides an overview of how to access AEDC data collections. It discusses the publicly available reports and resources on the AEDC website, including national reports, community profiles and school profiles. It also describes how unpublished or "bespoke" AEDC data can be accessed through submitting a request, including macrodata, microdata and data linkage files. Requests for unpublished data require approval and may have associated fees depending on the type of data and level of customization required.
Mapping Library Technology to Community Needs WebinarALATechSource
The document summarizes key findings from a national survey on digital inclusion and public library technology and community needs. It finds that most public libraries offer broadband internet access through wireless connectivity, with many wanting to increase speeds. Libraries also widely offer technology training, education, employment, and other programs. The summary outlines tools available for advocacy and management, including interactive mapping tools to show library services in community contexts at national and state levels. It provides examples of city and rural library speed test results and discusses upcoming improvements to mapping tools.
Rural Info Tech Alliance: Growing and Keeping IT TalentAnn Treacy
The Rural Information Technology Alliance (RITA) is a consortium of four community colleges funded by a $18 million Department of Labor grant to develop IT training programs to meet the needs of rural communities. RITA aims to increase enrollment in its programs through innovative curriculum, support services, and partnerships with local employers. It has ambitious goals to serve over 1,000 students, help over 600 complete credentials, and place over 600 in jobs or with increased wages by the end of the grant period in 2017.
This document discusses the vision and strategic priorities of consolidating information systems at a university under a single entity called "One I.S.". It identifies challenges such as multiple disjointed systems and a lack of coordination. The strategic priorities are outlined as creating a single administration system, unified teaching and learning ecosystem, and unified research computing. The document discusses how centralizing services can help realize economies of scale, reduce costs, and mitigate risks. It provides comparisons to other universities and outlines changes to organizational structure, planning processes, and projects to work towards the "One I.S." vision.
This report summarizes the findings of a needs assessment conducted by the IT Resource Sharing Group regarding operational and reporting needs for student data at the University of Washington. The assessment found that while Schools share many common information needs, they also have unique needs. It also found a lack of awareness about existing central systems and a proliferation of "shadow systems" developed by individual units. The report concludes there is high frustration over access to and analysis of student data. It recommends acknowledging decentralized systems and creating processes to support secure and productive development across the university.
Priority-Based Approaches to Accessible Procurement, Planning, and Implementa...Nate Evans
Learn how MSU is taking priority-based approaches to procurement, planning, and web accessibility policy implementation across the institution.
http://www.csun.edu/cod/conference/2017/sessions/index.php/public/presentations/view/323
This document provides information about graduate programs in data science and cybersecurity at the University of Denver. It discusses why Colorado and Denver are good locations, highlights of the University of Denver including new facilities and rankings, and details of the programs such as curriculum, career outcomes, costs, and application requirements. Student profiles and ambassador contacts are also included to learn more from current students.
UCT eResearch is about IT-enabled research discovery at the University of Cape Town. This slide show was presented to IT faculty managers and technical staff to demonstrate how UCT eResearch can assist faculties at the university to raise eResearch capacity.
Information security fasit-cait-20150129_v04kevin_donovan
Christian Hamer, Chief Information Security Officer at Harvard, provided an overview of information security at the university. He discussed the threats facing higher education from advanced attackers seeking valuable data. Harvard faces specific risks due to its high-value research data and reputation. The university's strategy is to make the community aware of risks, better protect the network and data, and improve readiness to respond to threats. Key initiatives include launching an awareness campaign, reviewing security tools and policies, and establishing protocols for incident response. Hamer urged the community to be aware of best practices for classifying and handling data securely, applying updates, using strong passwords, and reporting suspicious activity to enhance the university's security.
The document provides an overview of an event on emerging trends in data science given by Dr. Joanne Luciano. It discusses the data science workflow and various processes involved. Some key trends highlighted include increased use of AI and machine learning in data management and reporting, growth of natural language processing, advances in deep learning, emphasis on data privacy and ethics. The document also promotes the new minor in data science offered at University of the Virgin Islands, covering required courses and examples of course sequences for different disciplines.
The document discusses the University of Wisconsin's efforts to implement learning analytics across the university system. It provides three key points:
1. UW is taking a big, systemic approach to learning analytics by establishing open standards, integrating analytic tools, and bringing different communities together.
2. Their approach includes establishing frameworks for data capture/storage, analytics, interventions, and privacy/ethics, as well as working groups around open technologies and research.
3. UW is focusing on scaling best practices through design teams, pilots in areas like early warning systems and mobile learning, and investing in data governance, quality, and technical infrastructure to support learning analytics.
This document discusses the development of a National Progression Award (NPA) in Digital Passport in Scotland. It aims to address national and international concerns about digital literacy and deliver 21st century skills. The qualification includes units on Network Literacy, Information Literacy, and Social Media Literacy at SCQF levels 4-6. It is being designed from the ground up to be nationally recognized and provide a hierarchical structure for skills development. A pilot process will involve volunteer centers to commence delivery and provide feedback before revising the award.
The document discusses the goals and strategic plan of the Information Resources and Technology department at Stanford. The department aims to (1) become a leader in using innovative IT in biomedicine, (2) integrate IT, informatics, and knowledge management to support research and education, and (3) implement IRT collaboratively through a strategic plan. Some key initiatives include developing a clinical informatics center, implementing a secure wireless network, and establishing the library as a knowledge management center.
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
Trust is critical to the process of science. Two decades ago the Internet and World Wide Web fostered a new age in computational science with the emergence of accessible and high performance computing, storage, software, and networking. More recent paradigms, including virtual organizations, federated identity, big data, and global-scale operations continue to evolve the way computing for science is performed.
Advancing technologies, the need to coordinate across organizations and nations, and an evolving threat landscape are sources of ongoing challenges in maintaining the trustworthy nature of computational infrastructure and the science it supports. To address these challenges, a number of projects have focused on improving the cybersecurity and trustworthiness of scientific computing. Recent examples include the Center for Trustworthy Scientific Cyberinfrastructure funded by NSF, the Software Assurance Marketplace funded by DHS, and the Extreme Scale Identity Management for Science project funded by DOE.
This presentation will give a 20 year retrospective together with a vision for the future of cybersecurity for computational science. It will describe the state of trust and cybersecurity for scientific computing, its evolution over the past twenty years, challenges it is facing today, how the exemplar projects are addressing those challenges, and a vision of cybersecurity for research and higher education in general augmenting each other in the future.
Facilitating Scientific Collaborations by Delegating Identity ManagementVon Welch
This document summarizes a presentation on facilitating scientific collaborations through improved identity management. It discusses interviewing various virtual organizations and resource providers to understand challenges with current identity management processes. It proposes sharing identity management responsibilities between labs and virtual organizations to improve scalability, ease collaboration, and reduce duplication. Barriers like risk aversion and compliance requirements are identified, along with potential mitigations like sandboxes and site-virtual organization agreements. A data-centric model for representing identity management sharing is introduced to facilitate communication between scientists, identity management, and cybersecurity teams. The overall goal is to increase open science productivity through better identity management.
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingVon Welch
The document discusses updates from two organizations, XSIM and CTSC. XSIM aims to develop identity management guidance for scientific collaborations based on 15 years of experiments. It has produced two documents available on its website. CTSC works to increase understanding and implementation of cybersecurity for science. It engages with NSF projects through security evaluations and plans. CTSC also produced a cybersecurity program guide for science projects. Both organizations thanked their sponsors and invited attendees to an upcoming cybersecurity summit.
This document summarizes a presentation on identity management models for virtual organizations. It discusses:
1. The growth of scientific collaborations involving large numbers of scientists across institutions which made traditional identity management by individual resource providers difficult.
2. The concept of a "virtual organization" as a key way for large multi-institutional science collaborations. Examples of major virtual organizations are provided.
3. Challenges with identity management in virtual organizations and different approaches that have been tried, including delegating some identity management from resource providers to virtual organizations.
4. A proposed "data-centric" model for understanding identity management in virtual organizations based on the production and consumption of identity data to enable functions like authentication
This document discusses cybersecurity challenges for science. It notes that cybersecurity is important to enable cyberinfrastructure and scientific collaboration while maintaining trust in science. Some challenges discussed are the open nature of scientific software and communities which create large attack surfaces, and the need to manage identity and access for international user communities. The document promotes two initiatives, TrustedCI.org which addresses cybersecurity challenges for the NSF community, and XSIM which develops models for identity management at extreme scales.
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
This document summarizes research on identity management for scientific collaborations. The researchers (1) developed a model to explain variations in identity architectures across virtual organizations and resource providers, and (2) identified factors influencing identity delegation between organizations. Through interviews with 20 collaborations, they found that virtual organizations alter direct trust between users and resources, often delegating identity management tasks to the virtual organization based on trust. Their outputs include publications and guidance on implementing identity management to reduce barriers to collaboration.
The Center for Applied Cybersecurity Research (CACR) at Indiana University was founded in 2003 to conduct interdisciplinary cybersecurity research and provide expertise in risk management, policy, and compliance. CACR has over $16 million in external funding and partnerships with organizations such as CMU, U of Illinois, and U of Wisconsin. It works on key projects like the Cybersecurity for Trustworthy Scientific Cyberinfrastructure to help scientific collaborations and the Software Assurance Marketplace to improve software integrity. CACR also runs education and outreach programs including internships, a seminar series, and an annual cybersecurity summit.
A call to librarians to use their library powers in the community beyond the walls of their institutions as the open data folks need their knowledge!
Title:
Open Sesame: Open Data, Data Liberation and New Opportunities for Libraries
Abstract:
Cities and data producers are quickly embracing Open Data, albeit unevenly. The Data Liberation Initiative (DLI) has been a pioneer in broadening access to data for nearly two decades. This session will examine the relevance of Data Liberation in terms of Open Data and explore how librarians can step up to the plate to make Open Data/Open Government as successful as DLI.
Speakers:
- Wendy Watkins, Data Librarian, Carleton University
- Ernie Boyko, Adjunct Data Librarian, Carleton University
- Tracey P. Lauriault, Post Doctoral Fellow, Carleton University (tlauriau@gmail.com)
- Margaret Haines, University Librarian, Carleton University
The document provides an overview of how to access AEDC data collections. It discusses the publicly available reports and resources on the AEDC website, including national reports, community profiles and school profiles. It also describes how unpublished or "bespoke" AEDC data can be accessed through submitting a request, including macrodata, microdata and data linkage files. Requests for unpublished data require approval and may have associated fees depending on the type of data and level of customization required.
Mapping Library Technology to Community Needs WebinarALATechSource
The document summarizes key findings from a national survey on digital inclusion and public library technology and community needs. It finds that most public libraries offer broadband internet access through wireless connectivity, with many wanting to increase speeds. Libraries also widely offer technology training, education, employment, and other programs. The summary outlines tools available for advocacy and management, including interactive mapping tools to show library services in community contexts at national and state levels. It provides examples of city and rural library speed test results and discusses upcoming improvements to mapping tools.
Rural Info Tech Alliance: Growing and Keeping IT TalentAnn Treacy
The Rural Information Technology Alliance (RITA) is a consortium of four community colleges funded by a $18 million Department of Labor grant to develop IT training programs to meet the needs of rural communities. RITA aims to increase enrollment in its programs through innovative curriculum, support services, and partnerships with local employers. It has ambitious goals to serve over 1,000 students, help over 600 complete credentials, and place over 600 in jobs or with increased wages by the end of the grant period in 2017.
This document discusses the vision and strategic priorities of consolidating information systems at a university under a single entity called "One I.S.". It identifies challenges such as multiple disjointed systems and a lack of coordination. The strategic priorities are outlined as creating a single administration system, unified teaching and learning ecosystem, and unified research computing. The document discusses how centralizing services can help realize economies of scale, reduce costs, and mitigate risks. It provides comparisons to other universities and outlines changes to organizational structure, planning processes, and projects to work towards the "One I.S." vision.
This report summarizes the findings of a needs assessment conducted by the IT Resource Sharing Group regarding operational and reporting needs for student data at the University of Washington. The assessment found that while Schools share many common information needs, they also have unique needs. It also found a lack of awareness about existing central systems and a proliferation of "shadow systems" developed by individual units. The report concludes there is high frustration over access to and analysis of student data. It recommends acknowledging decentralized systems and creating processes to support secure and productive development across the university.
Priority-Based Approaches to Accessible Procurement, Planning, and Implementa...Nate Evans
Learn how MSU is taking priority-based approaches to procurement, planning, and web accessibility policy implementation across the institution.
http://www.csun.edu/cod/conference/2017/sessions/index.php/public/presentations/view/323
This document provides information about graduate programs in data science and cybersecurity at the University of Denver. It discusses why Colorado and Denver are good locations, highlights of the University of Denver including new facilities and rankings, and details of the programs such as curriculum, career outcomes, costs, and application requirements. Student profiles and ambassador contacts are also included to learn more from current students.
UCT eResearch is about IT-enabled research discovery at the University of Cape Town. This slide show was presented to IT faculty managers and technical staff to demonstrate how UCT eResearch can assist faculties at the university to raise eResearch capacity.
Information security fasit-cait-20150129_v04kevin_donovan
Christian Hamer, Chief Information Security Officer at Harvard, provided an overview of information security at the university. He discussed the threats facing higher education from advanced attackers seeking valuable data. Harvard faces specific risks due to its high-value research data and reputation. The university's strategy is to make the community aware of risks, better protect the network and data, and improve readiness to respond to threats. Key initiatives include launching an awareness campaign, reviewing security tools and policies, and establishing protocols for incident response. Hamer urged the community to be aware of best practices for classifying and handling data securely, applying updates, using strong passwords, and reporting suspicious activity to enhance the university's security.
The document provides an overview of an event on emerging trends in data science given by Dr. Joanne Luciano. It discusses the data science workflow and various processes involved. Some key trends highlighted include increased use of AI and machine learning in data management and reporting, growth of natural language processing, advances in deep learning, emphasis on data privacy and ethics. The document also promotes the new minor in data science offered at University of the Virgin Islands, covering required courses and examples of course sequences for different disciplines.
The document discusses the University of Wisconsin's efforts to implement learning analytics across the university system. It provides three key points:
1. UW is taking a big, systemic approach to learning analytics by establishing open standards, integrating analytic tools, and bringing different communities together.
2. Their approach includes establishing frameworks for data capture/storage, analytics, interventions, and privacy/ethics, as well as working groups around open technologies and research.
3. UW is focusing on scaling best practices through design teams, pilots in areas like early warning systems and mobile learning, and investing in data governance, quality, and technical infrastructure to support learning analytics.
This document discusses the development of a National Progression Award (NPA) in Digital Passport in Scotland. It aims to address national and international concerns about digital literacy and deliver 21st century skills. The qualification includes units on Network Literacy, Information Literacy, and Social Media Literacy at SCQF levels 4-6. It is being designed from the ground up to be nationally recognized and provide a hierarchical structure for skills development. A pilot process will involve volunteer centers to commence delivery and provide feedback before revising the award.
The document discusses the goals and strategic plan of the Information Resources and Technology department at Stanford. The department aims to (1) become a leader in using innovative IT in biomedicine, (2) integrate IT, informatics, and knowledge management to support research and education, and (3) implement IRT collaboratively through a strategic plan. Some key initiatives include developing a clinical informatics center, implementing a secure wireless network, and establishing the library as a knowledge management center.
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
DHS Cybersecurity Analyst details the US Department of Homeland Security Services for all businesses to build cyber resilience at the Technology Association of Louisville's CyberSecurity Summit on June 14, 2019.
This document summarizes the key points from a presentation on open science. It discusses how COVID-19 accelerated open science practices. Major policies now require publicly accessible research outputs and data from federal funders. Implementing open science requires investment in data curation and standards to ensure interoperability and reuse. Case studies show engaging stakeholders and assessing current practices are important initial steps for institutions. Commercialization of research infrastructure and data poses risks if not addressed. Standards and best practices are needed to realize open science's potential and avoid chaos.
Introducing the National Digital Stewardship AgendaMicah Altman
The National Digital Stewardship Agenda identifies the highest-impact opportunities to advance the state of the art; the state of practice; and the state of collaboration within the next 3-5 years.
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
This document discusses the Cybersecurity Transition to Practice (TTP) Acceleration Program funded by an NSF EAGER grant. It describes three innovation working groups launched by Internet2's Collaborative Innovation Community to address topics like the Internet of Things, end-to-end trust and security, and distributed big data and analytics. The program aims to accelerate the transition of NSF-funded cybersecurity research into practical use through matchmaking researchers with practitioners for pilot deployments, webinars, and workshops. Over 385 participants from 165 institutions are now involved in collaborating on use cases.
How you and your gateway can benefit from the services of the Science Gateway...Katherine Lawrence
January 2017 webinar of the Science Gateways Community Institute. Recording and additional details available at http://sciencegateways.org/upcoming-events/webinars/#previous
2. Welcome
2015
Spring
Seminar
Series
• 02/05/2015
Cornell
University's
Rafael
Pass
• 02/19/2015
Penn
State's
Christopher
French
• 03/05/2015
Northeastern
University's
Engin
Kirda
• 04/02/2015
Duke's
Aswin
Machanavajjhala,
PhD
• 04/16/2015
Indiana
University's
ScoR
Shakelford
Latest:
hRp://www.cacr.iu.edu/events/674
January
22,
2015
CACR
Director's
Report
3. Thank
yous
• Marjorie
Young
• Marion
Conaty
• Dara
Eckart
• Sarah
Portwood
• And
everyone
else
who
make
these
talks
possible
January
22,
2015
CACR
Director's
Report
4. Thank
you
to
Fred
H.
Cate
Founding
CACR
Director
2003-‐2014
Now
a
CACR
Senior
Policy
Fellow
January
22,
2015
CACR
Director's
Report
5. CACR
Administration
and
Staff
• David
Delaney
Deputy
Director
• Dara
Eckart
Administrave
Director
Associate
Directors:
• Bill
BarneR
• Mark
Bruhn
• ScoR
Orr
• Leslee
Cooper
• Randy
Heiland
• Craig
Jackson
• Ryan
Kiser
• Mark
Krenz
• Sarah
Portwood
• Susan
Sons
• Marjorie
Young
Plus
many
fellows
and
students…
January
22,
2015
CACR
Director's
Report
7. Software
Foundation
• Heartbleed,
ShellShock,
NTP…
• Foundaonal
socware
of
the
Internet
isn’t
as
solid
as
we
would
like.
January
22,
2015
CACR
Director's
Report
8. Breaches,
breaches,
breaches…
• Target,
Home
Depot,
etc.
• Cybercrime
is
geeng
more
organized,
aiming
higher
and
geeng
beRer.
• Our
different
networks
are
integrated.
January
22,
2015
CACR
Director's
Report
9. We’re
not
changing
behavior
• Password
“123456”
reigns
supreme
in
2014
…
Again!
• Caveat
–
this
is
from
“leaked
passwords”
• Why
not?
• Are
people
not
directly
effected?
• Consequences
too
distant?
January
22,
2015
CACR
Director's
Report
11. Cybersecurity
as
Risk
Management
Growing
need
by
cybersecurity
professionals
to
understand
cybersecurity’s
role
in
supporng
the
mission
of
the
organizaon
by
managing
risk.
January
22,
2015
CACR
Director's
Report
12. Transition
to
Practice
• Widening
gap
between
sophiscaon
of
cybersecurity
research
and
what
is
applied.
• Programs
in
NSF,
DHS,
etc.
focusing
on
geeng
research
into
pracce.
January
22,
2015
CACR
Director's
Report
13. We’re
still
waiting
for
the
big
one…
January
22,
2015
CACR
Director's
Report
14. MY
WISH
LIST
January
22,
2015
CACR
Director's
Report
15. Learn
from
our
mistakes
• Breach
reporng
is
nice,
but
knowing
what
actually
went
wrong
is
much
beRer.
• Think
Naonal
Transportaon
Safety
Board
reports
–
not
fast,
but
detailed.
• Mandiant
APT1
is
a
good
example.
• More
sharing
of
intelligence,
mistakes
in
the
community
–
too
closed
right
now.
January
22,
2015
CACR
Director's
Report
16. Better
Software/ConTiguration
Checking
Tools
• Economics
are
against
cybersecurity
• Race
to
develop,
deploy,
reconfigure,
sell
trumps
cybersecurity
in
most
cases.
• Need
immediate
feedback
-‐
tools
to
check
socware
and
configuraon
of
systems.
• Easy,
integrated,
real
me
and
clear.
January
22,
2015
CACR
Director's
Report
17. More
funding
spanning
research
and
operations
• We
need
to
bring
together
those
wrestling
with
real-‐world
problems
and
those
with
innovave
research
ideas.
• Span
from
brainstorming
workshops,
through
experimentaon,
prototypes,
and
deployment.
• Culture
change
needed
to
create
this
sort
of
collaboraon.
January
22,
2015
CACR
Director's
Report
19. About
CACR
• Part
of
Pervasive
Technology
Instute
• p.iu.edu
• Supported
by
VPIT,
NSF,
DHS,
DOE.
• Partnership
with
University
Informaon
Technology
Services,
School
of
Informacs
and
Compung,
Maurer
School
of
Law,
Kelly
School
of
Business.
January
22,
2015
CACR
Director's
Report
20. CACR
VISION
• Interweave
technical
and
policy
experse.
• Draw
on
Indiana
University’s
wide
range
of
scholarly
experse
in
computer
science,
informacs,
accounng
and
informaon
systems,
criminal
jusce,
law,
organizaonal
behavior,
public
policy,
and
other
disciplines.
• Bridge
with
Indiana
University’s
extensive
praccal
experience
in
cybersecurity
of
its
operaonal
units.
January
22,
2015
CACR
Director's
Report
21. CACR
And
IU
• CACR
exists
to
serve
the
Naon,
State
and
IU.
• Per
our
vision,
we
aim
to
improve
cybersecurity
at
IU
and
IU
through
cybersecurity.
• Talk
to
us
about
coordinaon
of
cybersecurity
acvies,
or
collaboraon
on
cybersecurity
policy,
operaonal,
or
applied
research.
January
22,
2015
CACR
Director's
Report
22. Cybersecurity
@
Indiana
University
Impressive!
• CACR
• REN-‐ISAC
• SOIC
-‐-‐
Master’s
Degree
in
Cybersecurity
• University
Informaon
Security
Office
• University
Informaon
Policy
Office
• Many
researchers
and
praconers
in
other
schools
and
offices.
January
22,
2015
CACR
Director's
Report
24. Trustworthy
Science
Maintaining
the
trust
of
sciensts
and
the
public
in
the
CI,
data
and
science
is
crical.
Challenge
is
understanding
increasing
threats
to
computaonal
science,
cultural
and
requirements
of
individual
domains,
large
distribute
science
communies,
unique
assets
such
as
instruments,
data,
etc.
January
22,
2015
CACR
Director's
Report
25. Science
pushes
IT
hard!
January
22,
2015
CACR
Director's
Report
HPC
HTC
Science
Gateways
Big
Data
Distributed
Everything
Bleeding-‐edge
Networks
26. TrustedCI.org:
Center
for
Trustworthy
ScientiTic
Cyberinfrastructure
Providing
leadership
and
addressing
cybersecurity
challenges
for
the
NSF
community.
January
22,
2015
CACR
Director's
Report
27. CTSC
Accomplishments
• Engaged
with
over
a
dozen
NSF
projects
-‐
5
large
facilies.
• Organized
NSF
Cybersecurity
Summits
for
Large
Facilies
and
CI
• Training,
best
pracces
• Developed
Cybersecurity
Program
Guide
for
NSF
CI
• Authoring
cybersecurity
chapter
for
NSF
Large
Facilies
Manual
January
22,
2015
CACR
Director's
Report
28. We
rely
increasingly
on
our
socware
stacks
–
both
the
ones
we
write
and
others.
Open
nature
leads
to
large
aRack
surfaces.
Socware
integrity
is
crical.
A
joint
effort:
Morgridge
Instute
for
Research
(lead)
University
of
Illinois
Urbana
Champaign
University
of
Wisconsin
–
Madison
Indiana
University
Funded
by
DHS
January
22,
2015
CACR
Director's
Report
Miron Livny, MIR
Jim Basney, UIUC
Bart Miller, UW
Von Welch, IU
https://continuousassurance.org/
29. A
Framework
for
Software
Assurance
January
22,
2015
CACR
Director's
Report
Results
Package
Package
Package
Tool
Tool
Tool
Pla'orm
Pla'orm
Pla'orm
Current:
396
&
bring
your
own
Current:
8
Perform
Assessment
Result
Viewer
Result
Viewer
Result
Viewer
Current:
2
Current:
700+
Cores
View
Results
Parse
Results
Parsed
Results
Current:
9
30. IU’s
Role
in
SWAMP
• CACR:
Cybersecurity
• RT/
High
Throughput
Compung
(w/Global
Research
NOC):
User
Support
and
Monitoring
January
22,
2015
CACR
Director's
Report
31. XSIM:
Extreme
Scale
Identity
Management
for
Science
Tradional
compung
with
users
all
managed
by
data
center.
January
22,
2015
CACR
Director's
Report
Image
credit:
Ian
Bird/CERN
Image credit: Lawrence Livermore
National Laboratory (via Wikipedia)
Modern
science
has
large
mulL-‐site
collaboraLons.
32. Science
collaboratory
identity
management
• Based
on
interviews
with
18
sites
and
projects.
• Simple
model
for
describing
collaboratory
IdM.
January
22,
2015
CACR
Director's
Report
• IdenLfied
factors
that
inhibit
and
encourage
delegaLon
from
compuLng
center
to
collaboraLon.
33. IU
NSA
CertiTication
• Indiana
University
designated
as
a
Naonal
Center
of
Academic
Excellence
in
Informaon
Assurance/Cybersecurity
through
academic
year
2021.
• Many
thanks
to
ScoR
Orr,
Drew
Simshaw,
and
all
the
faculty
and
staff
who
gather
needed
informaon.
January
22,
2015
CACR
Director's
Report
34. Indiana
National
Guard
• Parcipate
in
community-‐building
cyber
discussions
with
the
Indiana
Naonal
Guard
• Facilitate
tour
of
ING
cyber
training
facilies
at
Muscatatuck
by
senior
homeland
security
officials
• Contribute
to
IU
leRer
of
support
for
ING’s
efforts
to
expand
its
cyber
force.
January
22,
2015
CACR
Director's
Report
35. Consultation
to
NSA
on
Cyber
• In
the
wake
of
Edward
Snowden’s
disclosures,
organized
a
day-‐long
discussion
between
faculty
and
senior
NSA
officials
at
NSA
headquarters
in
Fort
Meade,
Maryland.
• Guidance
on
privacy,
whistleblowing,
transparency,
secrecy,
and
related
topics.
• Maurer
School
of
Law
Prof.
and
CACR
Senior
Fellow
David
Fidler’s
appointment
as
Scholar
in
Residence
of
the
President’s
Privacy
and
Civil
Liberes
Oversight
Board
(Jan-‐Aug
2015).
January
22,
2015
CACR
Director's
Report
36. DOD
Minerva
Proposal
Coordinated
the
development
of
a
muldisciplinary
cyber
research
proposal
through
the
defense
department’s
MINERVA
social
science
research
iniave.
Seven
faculty
from
six
IU
disciplines
(law,
journalism,
psychology,
policy,
linguiscs,
internaonal
affairs)
joined
the
effort
to
propose
a
study
of
societal
trust
and
stability.
January
22,
2015
CACR
Director's
Report
37. CACR
Strategic
Plan
• Strategic
Planning
acvies
Oct’14-‐March’15
• Expect
to…
Refresh
the
fellows
program
Establish
strong
connecons
with
more
schools
and
other
IU
campuses
Define
opportunies
to
provide
experse
to
the
community;
etc.
Refine
and
focus
Security
MaRers
• Thoughts?
Input?
We’re
happy
to
chat.
January
22,
2015
CACR
Director's
Report
38. 2014
CACR
Cybersecurity
Summit
• June
2014
Summit
in
Indianapolis
• Featured
two
senior
Homeland
Security
officials
responsible
for
cyber
operaons
and
R&D.
News
about
2015
CACR
Cybersecurity
Summit
coming
soon!
January
22,
2015
CACR
Director's
Report
39. Cyber
Faculty
Discussion
• Feb.
25
• Extending
from
the
MINERVA
collaboraon.
• Professors
Shannon
Marn
and
Tony
Fargo
are
featured
speakers
in
a
faculty
discussion
of
their
cyber
research
interests
and
establishing
collaborave
research
teams
at
IU.
January
22nd,
2015
CACR
Director's
Report
40. Thank
you
cacr.iu.edu
January
22,
2015
CACR
Director's
Report