Two members of the ResearchSOC leadership team will be part of a presentation team on “Strategies and Resources for Research Cybersecurity and Compliance” at the upcoming 2019 Internet2 Global Summit on March 8 at 8:45 a.m.
ResearchSOC leadership Team members Von Welch (Indiana University) and Michael Corn (University of California, San Diego) are part of a team presenting at the 2019 Intenet2 Global Summit. The presentation will provide an overview of the landscape of cybersecurity and compliance for research, along with pointers to resources and helpful means of engaging with researchers to build collaboration around securing research.
Corn and Welch are information security professionals who have decades of experience working very closely with researchers. They have learned that emphasizing scientific reproducibility and productivity are key to achieving collaboration when presenting issues around compliance and cybersecurity to researchers. This collaboration can help ensure that researchers are motivated to operate within their institutional infrastructure, policies, and guidelines.
Jim Basney, a senior research scientist at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, is also a member of the presentation team.
While campus administrators who manage institutional data often couch discussions of research cybersecurity in terms of HIPAA and CUI (Controlled Unclassified Information) requirements, often researchers see these requirements as burdens with no apparent benefit.
Yet the requirements many researchers have to seamlessly share and access data across institutional and geographic boundaries is critical to their research. This requirement challenges traditional methods of implementing cybersecurity controls. When, for example, a researcher on a campus is collaborating with hundreds of colleagues in multiple institutions in multiple countries while sharing and analyzing data from instrumentation or laboratories on the on the other side of the world, how will this researcher’s workflows fit into your cybersecurity program and IT infrastructure? Can your infrastructure provide the integrity protections to provide trust in this research while allowing the broad sharing and collaboration? Do you know how to go about engaging with the researcher to arrive at such a set of cybersecurity controls?
The Research Security Operations Center (ResearchSOC) is a collaborative security response center that addresses the unique cybersecurity concerns of the research community. ResearchSOC helps make scientific computing resilient to cyberattacks and capable of supporting trustworthy, productive research. For more information on the ResearchSOC, visit our website or email rsoc@iu.edu.
Leave a Reply