SlideShare a Scribd company logo
PRESENTED BY: Florence Hudson, Senior Vice President & Chief Innovation Officer, Internet2
Cybersecurity Research Transition to Practice (TTP) Acceleration
PEARC17: Practice and Experience in Advanced Research Computing.
Workshop on Trustworthy Scientific Cyberinfrastructure.
July 13, 2017
Internet of Things (IoT):
 IoT Sandbox
 Smart Campuses and Cities
 Smart Grid Testbed
E2E Trust & Security (E2ET&S):
 TIPPSS for IoT – Trust, Identity, Privacy, Protection, Safety, Security
 NSF EAGER Cybersecurity Transition to Practice (TTP) Acceleration
 SDP (Software Defined Perimeter), Network Segmentation for IoT
Distributed Big Data & Analytics (DBDA):
 Health & Life Sciences / Genomics
 Smart Campuses and Cities
 NSF Big Data Hub Collaboration
End-to-End Trust & Security was one of the top three focal areas
identified in a May 2015 Internet2 member innovation survey.
Scientific Impact
• Increase awareness of cybersecurity
research & capabilities
• Accelerate cybersecurity TTP in the
near- to mid-term to make
cyberspace safer
• Identify cybersecurity needs to
inform future NSF solicitations
Solution
• Identify & assess NSF
cybersecurity research inventory
• Interview researchers & practitioners
for TTP needs and best practices
• Leverage Internet2 community to
enable “matchmaking”
• Deploy webinars, portal, in-person
events for researcher/IT matchmaking
at Internet2 Global Summit, TechEx,
and regional workshops
• Identify cybersecurity needs/gaps
Challenge
• Accelerate Transition To Practice
(TTP) of NSF-funded later-stage
cybersecurity research into Research
& Education environments
Broader Impact
• Enable partnership for NSF TTP
with other Federal agency
programs to accelerate &
streamline TTP pipeline
• Enable more diverse R&E pipeline
partnering with Society of Women
Engineers and others
Award Number: 1650445
Internet2
PI: Florence Hudson, SVP/Chief Innovation Officer
Team: Emily Nichols, Giselle Trent, Bruce Maas
NSF EArly-concept Grant for Exploratory Research (EAGER):
Cybersecurity Transition To Practice (TTP) Acceleration
Cybersecurity
Research Assets:
• NDN
• CILogon 2.0
• CipherLocker
• …
3
Cybersecurity Researchers
• Key needs for TTP identified: Funding from NSF and others, early user feedback
• User feedback from pilot deployments critical to accelerate TTP
• Opportunity for acceleration of the TTP process at multiple steps
• Researchers like opportunity to leverage NSF TTP, DHS TTP, I-CORPS, multiple agency support
• NSF TTP dollars sometimes perceived as small & cumbersome to capture, prefer working with VCs
• TTP not a priority for some researchers – looking to solve complex problems, not start a business
Practitioners for Pilot Deployments
• Practitioners need to know operational requirements for pilot use of TTP assets
• All size universities and regional networks interested in potential to test out / pilot cyber research early
• Smaller universities requested to participate in TTP suggesting they have simpler approval processes
• Some universities unwilling to deploy unproven, non-production tested cybersecurity code
Agencies
• Interested in cross-agency collaboration opportunities for NSF and DHS to accelerate cyber TTP
SME Interview insights regarding TTP acceleration
Cybersecurity TTP Acceleration Project Plan
Start Date August 2016
- Ongoing research asset inventory
and outreach
- Ongoing interviews with SMEs
- Matchmaking showcases &
workshops with researchers and
practitioners
 Kickoff Workshop Sept 2016 - TechEx
 Webinar Nov 2016
 Workshop April 2017 – Global Summit
 Monthly webinars June-October 2017
 Workshops planned:
 October 11, 2017 at IUPUI with CTSC
 October 18, 2017 at TechEx with
CENIC in San Francisco
 Spring 2018 in NY/NJ area with
NYSERNET and SUNY et al
• Engage more researchers and practitioners, plus students to enable the cybersecurity pipeline
• Execute more matchmaking events – webinars, workshops, showcases
• Encourage matchmaking to result in pilots and more research feedback
• Gain insight from practitioners and researchers regarding unmet cybersecurity needs and gaps
• Consider additional TTP webinars, materials and workshops for researchers to enable matchmaking success
– Knowing when you are ready to transition to an applied research environment for user input
– MOU for pilot engagements, clarifying value proposition, user handbook, operational requirements, user
support
• Potentially provide an on-line matchmaking tool (perhaps the Vanderbilt/NSF SaTC virtual organization (VO))
for matchmaking and cybersecurity research awareness between cybersecurity researchers and campus,
HPC & regional network IT organizations
Cybersecurity TTP matchmaking next steps
Join us in EAGER Cybersecurity TTP Acceleration
Researchers: Do you have a Cybersecurity Research Asset ready to present for
potential pilot opportunities in research & education?
Practitioners: Are you interested in…?
• Learning about the latest NSF funded cybersecurity research
• Providing input on the research, potentially piloting it
• Providing input on what new cybersecurity research is needed
Participate in cybersecurity TTP webinars and workshops:
– Monthly Internet2 hosted Webinars – July 28, August 11, September 22, October 13
– Workshop co-hosted with CTSC at IUPUI, October 11, 2017, in Indianapolis, IN
– Workshop at Internet2 TechEx, October 18, 2017, co-hosted with CENIC in San
Francisco http://bit.ly/2rvpuY3
To join the EAGER Cybersecurity TTP program – email CINO@Internet2.edu
Questions & Answers…
Thank You
fhudson@Internet2.edu
@FloInternet2

More Related Content

What's hot

Comcast Technology Fund - US Ignite Application Summit 2013
Comcast Technology Fund - US Ignite Application Summit 2013Comcast Technology Fund - US Ignite Application Summit 2013
Comcast Technology Fund - US Ignite Application Summit 2013
US-Ignite
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
amiable_indian
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
Maribel García Arenas
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Alex Pinto
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Alex Pinto
 
James A. Marsteller
James A. MarstellerJames A. Marsteller
James A. Marsteller
prensacespi
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
Infocyte
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Mark Scanlon
 
20171003 lancaster data conversations Chue-Hong
20171003 lancaster data conversations Chue-Hong20171003 lancaster data conversations Chue-Hong
20171003 lancaster data conversations Chue-Hong
Lancaster University Library
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
H4Diadmin
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
London School of Cyber Security
 

What's hot (14)

Comcast Technology Fund - US Ignite Application Summit 2013
Comcast Technology Fund - US Ignite Application Summit 2013Comcast Technology Fund - US Ignite Application Summit 2013
Comcast Technology Fund - US Ignite Application Summit 2013
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
 
James A. Marsteller
James A. MarstellerJames A. Marsteller
James A. Marsteller
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
 
20171003 lancaster data conversations Chue-Hong
20171003 lancaster data conversations Chue-Hong20171003 lancaster data conversations Chue-Hong
20171003 lancaster data conversations Chue-Hong
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 

Similar to PEARC17: Workshop on Trustworthy Scientific Cyberinfrastructure. Cybersecurity Research Transition to Practice Acceleration. Florence Hudson @Internet2

The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
Leandro Ciuffo
 
Sgci xsede-gateways-07-08-16
Sgci xsede-gateways-07-08-16Sgci xsede-gateways-07-08-16
Sgci xsede-gateways-07-08-16
Nancy Wilkins-Diehr
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
Mahdi_Fahmideh
 
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
Sandra Gesing
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...
Jerry Sheehan
 
Scientific Software Challenges and Community Responses
Scientific Software Challenges and Community ResponsesScientific Software Challenges and Community Responses
Scientific Software Challenges and Community Responses
Daniel S. Katz
 
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabusSocial Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Jakub Ruzicka
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
Neil Chue Hong
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research Platform
Jerry Sheehan
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentation
maytaldahan
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project Delivery
Mark Constable
 
A Method to Select e-Infrastructure Components to Sustain
A Method to Select e-Infrastructure Components to SustainA Method to Select e-Infrastructure Components to Sustain
A Method to Select e-Infrastructure Components to Sustain
Daniel S. Katz
 
Data-X-Sparse-v2
Data-X-Sparse-v2Data-X-Sparse-v2
Data-X-Sparse-v2
Ikhlaq Sidhu
 
Data-X-v3.1
Data-X-v3.1Data-X-v3.1
Data-X-v3.1
Ikhlaq Sidhu
 
Research IT at the University of Bristol
Research IT at the University of BristolResearch IT at the University of Bristol
Research IT at the University of Bristol
Simon Price
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & Operationalization
Colorado Internet Society (CO ISOC)
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
CREST
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of Zurich
Mind the Byte
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin
 

Similar to PEARC17: Workshop on Trustworthy Scientific Cyberinfrastructure. Cybersecurity Research Transition to Practice Acceleration. Florence Hudson @Internet2 (20)

The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
 
Sgci xsede-gateways-07-08-16
Sgci xsede-gateways-07-08-16Sgci xsede-gateways-07-08-16
Sgci xsede-gateways-07-08-16
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
 
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
SGCI - Science Gateways - Technology-Enhanced Research Under Consideration of...
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...
 
Scientific Software Challenges and Community Responses
Scientific Software Challenges and Community ResponsesScientific Software Challenges and Community Responses
Scientific Software Challenges and Community Responses
 
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabusSocial Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research Platform
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentation
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project Delivery
 
A Method to Select e-Infrastructure Components to Sustain
A Method to Select e-Infrastructure Components to SustainA Method to Select e-Infrastructure Components to Sustain
A Method to Select e-Infrastructure Components to Sustain
 
Data-X-Sparse-v2
Data-X-Sparse-v2Data-X-Sparse-v2
Data-X-Sparse-v2
 
Data-X-v3.1
Data-X-v3.1Data-X-v3.1
Data-X-v3.1
 
Research IT at the University of Bristol
Research IT at the University of BristolResearch IT at the University of Bristol
Research IT at the University of Bristol
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & Operationalization
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of Zurich
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

PEARC17: Workshop on Trustworthy Scientific Cyberinfrastructure. Cybersecurity Research Transition to Practice Acceleration. Florence Hudson @Internet2

  • 1. PRESENTED BY: Florence Hudson, Senior Vice President & Chief Innovation Officer, Internet2 Cybersecurity Research Transition to Practice (TTP) Acceleration PEARC17: Practice and Experience in Advanced Research Computing. Workshop on Trustworthy Scientific Cyberinfrastructure. July 13, 2017
  • 2. Internet of Things (IoT):  IoT Sandbox  Smart Campuses and Cities  Smart Grid Testbed E2E Trust & Security (E2ET&S):  TIPPSS for IoT – Trust, Identity, Privacy, Protection, Safety, Security  NSF EAGER Cybersecurity Transition to Practice (TTP) Acceleration  SDP (Software Defined Perimeter), Network Segmentation for IoT Distributed Big Data & Analytics (DBDA):  Health & Life Sciences / Genomics  Smart Campuses and Cities  NSF Big Data Hub Collaboration End-to-End Trust & Security was one of the top three focal areas identified in a May 2015 Internet2 member innovation survey.
  • 3. Scientific Impact • Increase awareness of cybersecurity research & capabilities • Accelerate cybersecurity TTP in the near- to mid-term to make cyberspace safer • Identify cybersecurity needs to inform future NSF solicitations Solution • Identify & assess NSF cybersecurity research inventory • Interview researchers & practitioners for TTP needs and best practices • Leverage Internet2 community to enable “matchmaking” • Deploy webinars, portal, in-person events for researcher/IT matchmaking at Internet2 Global Summit, TechEx, and regional workshops • Identify cybersecurity needs/gaps Challenge • Accelerate Transition To Practice (TTP) of NSF-funded later-stage cybersecurity research into Research & Education environments Broader Impact • Enable partnership for NSF TTP with other Federal agency programs to accelerate & streamline TTP pipeline • Enable more diverse R&E pipeline partnering with Society of Women Engineers and others Award Number: 1650445 Internet2 PI: Florence Hudson, SVP/Chief Innovation Officer Team: Emily Nichols, Giselle Trent, Bruce Maas NSF EArly-concept Grant for Exploratory Research (EAGER): Cybersecurity Transition To Practice (TTP) Acceleration Cybersecurity Research Assets: • NDN • CILogon 2.0 • CipherLocker • … 3
  • 4. Cybersecurity Researchers • Key needs for TTP identified: Funding from NSF and others, early user feedback • User feedback from pilot deployments critical to accelerate TTP • Opportunity for acceleration of the TTP process at multiple steps • Researchers like opportunity to leverage NSF TTP, DHS TTP, I-CORPS, multiple agency support • NSF TTP dollars sometimes perceived as small & cumbersome to capture, prefer working with VCs • TTP not a priority for some researchers – looking to solve complex problems, not start a business Practitioners for Pilot Deployments • Practitioners need to know operational requirements for pilot use of TTP assets • All size universities and regional networks interested in potential to test out / pilot cyber research early • Smaller universities requested to participate in TTP suggesting they have simpler approval processes • Some universities unwilling to deploy unproven, non-production tested cybersecurity code Agencies • Interested in cross-agency collaboration opportunities for NSF and DHS to accelerate cyber TTP SME Interview insights regarding TTP acceleration
  • 5. Cybersecurity TTP Acceleration Project Plan Start Date August 2016 - Ongoing research asset inventory and outreach - Ongoing interviews with SMEs - Matchmaking showcases & workshops with researchers and practitioners  Kickoff Workshop Sept 2016 - TechEx  Webinar Nov 2016  Workshop April 2017 – Global Summit  Monthly webinars June-October 2017  Workshops planned:  October 11, 2017 at IUPUI with CTSC  October 18, 2017 at TechEx with CENIC in San Francisco  Spring 2018 in NY/NJ area with NYSERNET and SUNY et al
  • 6. • Engage more researchers and practitioners, plus students to enable the cybersecurity pipeline • Execute more matchmaking events – webinars, workshops, showcases • Encourage matchmaking to result in pilots and more research feedback • Gain insight from practitioners and researchers regarding unmet cybersecurity needs and gaps • Consider additional TTP webinars, materials and workshops for researchers to enable matchmaking success – Knowing when you are ready to transition to an applied research environment for user input – MOU for pilot engagements, clarifying value proposition, user handbook, operational requirements, user support • Potentially provide an on-line matchmaking tool (perhaps the Vanderbilt/NSF SaTC virtual organization (VO)) for matchmaking and cybersecurity research awareness between cybersecurity researchers and campus, HPC & regional network IT organizations Cybersecurity TTP matchmaking next steps
  • 7. Join us in EAGER Cybersecurity TTP Acceleration Researchers: Do you have a Cybersecurity Research Asset ready to present for potential pilot opportunities in research & education? Practitioners: Are you interested in…? • Learning about the latest NSF funded cybersecurity research • Providing input on the research, potentially piloting it • Providing input on what new cybersecurity research is needed Participate in cybersecurity TTP webinars and workshops: – Monthly Internet2 hosted Webinars – July 28, August 11, September 22, October 13 – Workshop co-hosted with CTSC at IUPUI, October 11, 2017, in Indianapolis, IN – Workshop at Internet2 TechEx, October 18, 2017, co-hosted with CENIC in San Francisco http://bit.ly/2rvpuY3 To join the EAGER Cybersecurity TTP program – email CINO@Internet2.edu
  • 8. Questions & Answers… Thank You fhudson@Internet2.edu @FloInternet2