Trusted CI podcast
Trusted CI
Trusted CI is the NSF Cybersecurity Center of Excellence. The mission of Trusted CI is to lead in the development of an NSF Cybersecurity Ecosystem with the workforce, knowledge, processes, and cyberinfrastructure that enables trustworthy science and NSF’s vision of a nation that is a global leader in research and innovation. More information can be found at trustedci.org.
Categorias: Tecnología
Escuchar el último episodio:
Cybersecurity and privacy threats increasingly impact our daily lives, our national infrastructures, and our industry. Recent newsworthy attacks targeted nationally important infrastructure, our government, our researchers, and research facilities. The landscape of what needs to be protected and from what threats is rapidly evolving as new technologies are released and threat actors improve their capabilities through experience and close collaboration. Meanwhile, defenders often work in isolation, use private data and facilities, and produce defenses that are quickly outpaced by new threats. To transform cybersecurity and privacy research into a highly integrated, community-wide effort, researchers need a common, rich, representative research infrastructure that meets the needs across all members of the community, and facilitates reproducible science. To meet these needs, USC Information Sciences Institute and Northeastern University have been funded by the NSF mid-scale research infrastructure program to build Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE). This infrastructure will offer access to an unprecedented variety of hardware, software, and other resources connected by user-configurable network substrate, and protected by a set of security policies uniquely aligned with cybersecurity and privacy research needs. SPHERE will offer six user portals, closely aligned with needs of different user groups. It will support reproducible research through a combination of infrastructure services (easy experiment packaging, sharing and reuse) and community engagement activities (development of realistic experimentation environments and contribution of high-quality research artifacts). Speaker Bios: Dr. Jelena Mirkovic is Principal Scientist at USC-ISI and Research Associate Professor at USC. She received her MS and PhD from UCLA, and her BSc from University of Belgrade, Serbia. Jelena's research interests span networking and cybersecurity fields, as well as testbed experimentation. Her current research is focused on authentication, use of machine learning for network attack detection, large-scale dataset labeling for security, and user privacy. She is the lead PI on the SPHERE project. Mr. David Balenson is Senior Supervising Computer Scientist and Associate Director of the Networking and Cybersecurity Division at USC-ISI. He received his MS and BS in Computer Science from the University of Maryland. His current research interests include cybersecurity and privacy for critical infrastructure and cyber-physical systems including automotive and autonomous vehicles, experimentation and test, technology transition, and multidisciplinary research. He is the Community Outreach Director for SPHERE.
Episodios anteriores
-
83 - April 2024: SPHERE - Security and Privacy Heterogeneous Environment for Reproducible Experimentation Tue, 09 Apr 2024 - 0h
-
82 - March 2024: Lessons from the ACCORD Project Mon, 18 Mar 2024 - 0h
-
81 - December 2023: Open Science Chain Mon, 04 Dec 2023
-
80 - September 2023: Improving the Privacy and Security of Data for Wastewater-based Epidemiology Wed, 13 Sep 2023
-
78 - July 2023: The Technical Landscape of Ransomware: Threat Models and Defense Models Mon, 17 Jul 2023 - 0h
-
77 - June 2023: SecureMyResearch at Indiana University: Effective Cybersecurity for Research Mon, 26 Jun 2023
-
76 - May 2023: Senior Citizens Striking Back at Scammers Mon, 22 May 2023
-
75 - April 2023: Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure Mon, 24 Apr 2023
-
74 - March 2023: The Internet2 Routing Integrity Initiative Mon, 27 Mar 2023 - 0h
-
73 - February 2023: Using the Trusted CI Framework to Create the CFDE Cybersecurity Program Mon, 27 Feb 2023 - 0h
-
72 - January 2023: Improving the Security of Open-Source Software Infrastructure Mon, 27 Feb 2023 - 0h
-
71 - December 2022: Science DMZ Engagement with University of Arkansas Mon, 05 Dec 2022
-
70 - September 2022: Lowering the Barrier to Entry for Regulated Research Through Community Building Mon, 26 Sep 2022 - 0h
-
69 - August 2022: CIS Controls with Trusted CI Mon, 22 Aug 2022
-
68 - June 2021: Ransomware: Threats & Mitigations with REN-ISAC Mon, 27 Jun 2022 - 0h
-
67 - Apr 2022: Updates from the Trusted CI Framework Cohort Mon, 25 Apr 2022 - 0h
-
66 - Feb 2022: The Results of the Trusted CI Annual Challenge on Software Mon, 28 Feb 2022 - 0h
-
65 - Jan 2022: Populating the HECVAT as an Academic Research Provider - Representing Your Security Posture For Your Higher-Ed Information Security Partners Mon, 24 Jan 2022 - 0h
-
64 - Dec 2021: Lessons learned from a real-world ransomware attack on researchers at MSU Mon, 06 Dec 2021 - 0h
-
63 - Oct 2021: The Trusted CI Framework; Overview and Recent Developments Mon, 25 Oct 2021
-
62 - Sep 2021: Q-Factor: Real-time data transfer optimization Mon, 27 Sep 2021
-
61 - Aug 2021: NCSA Experience with SOC2 in the Research Computing Space Mon, 30 Aug 2021 - 0h
-
60 - July 2021: A capability-based authorization infrastructure for distributed High Throughput Computing Mon, 26 Jul 2021 - 0h
-
59 - June 2021: Investigating Secure Development In Practice: A Human-Centered Perspective Mon, 26 Jul 2021
-
58 - May 2021: Identifying Vulnerable GitHub Repositories in Scientific Cyberinfrastructure Tue, 25 May 2021 - 0h
-
57 - Apr 2021: Trusted CI webinar: Arizona State's Science DMZ Mon, 26 Apr 2021 - 0h
-
55 - May 2016: Webinar Series Kick-off Fri, 16 Apr 2021 - 0h
-
54 - Jun 2016: Risk Self-Evaluation Fri, 16 Apr 2021 - 0h
-
53 - Jul 2016: XSEDE Information Sharing Fri, 16 Apr 2021 - 0h
-
52 - Aug 2016: The Science DMZ as a Security Architecture Fri, 16 Apr 2021
-
51 - Sep 2016: The Risk of the Commons Fri, 16 Apr 2021
-
50 - Oct 2016: Science or Security? Fri, 16 Apr 2021 - 0h
-
49 - Dec 2016: CICI Regional Cybersecurity Collaboration projects Fri, 16 Apr 2021
-
48 - Jan 2017: Open Science Cyber Risk Profile Fri, 16 Apr 2021
-
47 - Feb 2017: Practical Cybersecurity Program for (Smaller) Science Programs Fri, 16 Apr 2021 - 0h
-
46 - Mar 2017: SDN and IAM Integration at Duke Fri, 16 Apr 2021 - 0h
-
45 - Apr 2017: HIPAA and FISMA: Computing with Regulated Data Fri, 16 Apr 2021
-
44 - May 2017: Cybersecurity Research: Transition To Practice (TTP) Fri, 16 Apr 2021 - 0h
-
43 - Jun 2017: Using the Blockchain to Secure Provenance Meta-Data Fri, 16 Apr 2021
-
42 - Jul 2017: Inaugural Security Program at Internet2 Fri, 16 Apr 2021 - 0h
-
41 - Aug 2017: Stronger Security for Password Authentication Fri, 16 Apr 2021 - 0h
-
40 - Aug 2017: An overview of CTSC Engagements and the Application Process Fri, 16 Apr 2021 - 0h
-
39 - Sep 2017: Demystifying Threat Intelligence Fri, 16 Apr 2021 - 0h
-
38 - Oct 2017: Incident Response in an Open and Decentralized Network Fri, 16 Apr 2021 - 0h
-
37 - Dec 2017: The State of the Cybersecurity Center of Excellence Fri, 16 Apr 2021 - 0h
-
36 - Feb 2018: SmartProvenance: A Distributed, Blockchain Based Data Provenance Wed, 14 Apr 2021 - 0h
-
35 - Mar 2018: Data quality and security evaluation framework development Wed, 14 Apr 2021 - 0h
-
34 - Apr 2018: Toward Security-Managed Virtual Science Networks Wed, 14 Apr 2021 - 0h
-
33 - May 2018: The EU General Data Protection Regulation (GDPR) Wed, 14 Apr 2021
-
32 - Jun 2018: Security Program at LSST Wed, 14 Apr 2021 - 0h