Close

Presentation

Workshop
:
Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure
Workshop Organizer
Event Type
Workshop
Tags
Workshop
TimeTuesday, July 3011am - 5pm
LocationWater Tower
DescriptionThe Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sharing experiences, recommendations, and available resources for addressing cybersecurity challenges in research computing. Presentations by Trusted CI staff and community members will cover a broad range of cybersecurity topics, including science gateways, transition to practice, cybersecurity program development, workforce development, and community engagement (e.g., via the Trusted CI Fellows program). A selection of topics follows.

5-year Vision for an NSF Cybersecurity Ecosystem: The NSF community is large and diverse, encompassing NSF itself, its seven science directorates, over two dozen Large Facilities, and tens of thousands of smaller ephemeral projects. This community is tightly integrated with the higher education institutions and research laboratories that provide administrative homes for projects. The community also collaborates closely with communities from other federal and non-federal agencies, as well as with the international science community. The diversity of these projects’ science missions, combined with the complexities of implementing cybersecurity and open science in tandem, creates a serious cybersecurity challenge. There is no off-the-shelf approach to cybersecurity for open science that the NSF community can adopt. Even Large Facilities, the largest of the NSF projects, struggle to develop tailored approaches. To address this challenge, an approach is needed to manage risks – while providing both flexibility for project-specific adaptations and access to the necessary knowledge and human resources for implementation. Hence, the Trusted CI vision is for "A NSF cybersecurity ecosystem, formed of people, practical knowledge, processes, and cyberinfrastructure, that enables the NSF community to both manage cybersecurity risks and produce trustworthy science in support of NSF’s vision of a nation that is the global leader in research and innovation." See also: http://hdl.handle.net/2022/22178

A Framework for Open Science Cybersecurity Programs: Trusted CI is developing a framework for establishing and maintaining an open science cybersecurity program at any project scale and stage in a project’s life cycle. Such a framework is useful even for projects having significant compliance requirements (e.g., FISMA, HIPAA, NIST SP 800-171) in that it provides a starting point for evolving a cybersecurity program rather than hundreds of pages dense with unprioritized requirements. Trusted CI’s framework is built around four pillars: Mission Alignment, Governance, Resources, and Controls. Like the pillars supporting any structure, all are vital and required for an efficient and effective cybersecurity program.

Cybersecurity for Science Gateways: Science gateways provide the science community with access to scientific data and resources. Trusted CI partners with the Science Gateways Community Institute (SGCI) to provide cybersecurity training and consultation for science gateways at all phases of development. We will present the risks to science gateways and how to mitigate them.

Transition to Practice: Trusted CI’s Cybersecurity Research Transition To Practice (TTP) program is open to all NSF funded cybersecurity researchers and practitioners. We will discuss how we can work together to identify the cybersecurity gaps in scientific CI, and leverage cybersecurity research to fill those gaps. Information on Research for TTP from the academic community including AI/ML for information security and IOT/CPS research will be discussed, as well as the process we can enable to bring research and practitioners together to leverage the research in support of scientific cyberinfrastructure.

Fellows Program: Trusted CI launched the Open Science Cybersecurity Fellows Program in 2019. The program identifies members of the scientific community (e.g., an IT professional working with a science project), empowers them with basic knowledge of cybersecurity and the understanding of Trusted CI’s services, and has them serve as cybersecurity liaisons to their respective community. They then assist members of the community with basic cybersecurity challenges and connect them with Trusted CI for advanced challenges. The members of the fellows program will present their activities in a panel format at the workshop.

Lightning Talks and Open Discussion: Based on experience from our PEARC17 workshop and Cybersecurity Summit meetings, it is valuable to end the day with broad community participation in the form of lightning talks and open discussion. Community members are invited to give 5 minute presentations about experiences, recommendations, and available resources for addressing cybersecurity challenges in research computing. Following these presentations, members of the Trusted CI leadership team facilitate a discussion about takeaways from the topics covered in the workshop and open questions about topics not covered.

About Trusted CI: Trusted CI, the NSF Cybersecurity Center of Excellence, is comprised of cybersecurity experts who have spent decades working with science and engineering communities and have an established track record of usable, high-quality solutions suited to the needs of those communities. The team draws from best operational practices and includes leaders in the research and development of new methodologies and high-quality implementations. Trusted CI addresses the challenge for meeting the needs of individual cyberinfrastructure projects through deep engagements, training, and dissemination of experiences. At the same time, Trusted CI advances the state of cybersecurity practice across the community by analyzing gaps in cybersecurity technology to provide guidance to researchers and developers, addressing the application of software assessment to complicated cyberinfrastructure software stacks, and fostering the transition of cybersecurity research to practice.
Workshop Organizer