Building a vulnerability management workflow that works, and getting the buy-in to implement it Ken Goodwin, director of networking, Pittsburgh Supercomputing Center (PSC) will present “Building a vulnerability management workflow that works, and getting the buy-in to implement it,” on Thursday, May 27, 3pm Eastern, as part of the ResearchSOC webinar series. Register here Subscribing to a vulnerability identification… Read more »
webinars
Webinar preview: Operationalizing the framework: getting management to understand cybersecurity
Empowering organizations to confront cybersecurity challenges: a discussion with Trusted CI Framework architect Craig Jackson By Gregory Moore Cybersecurity professionals supporting research and higher education understand the value of having a common language with senior management. Published March 1, the Trusted CI Framework Implementation Guide for Research Cyberinfrastructure Operators provides such a common language, which can lead to mutual… Read more »
Webinar preview: “Walk before you run” with Josh Drake
Walk before you run: Baseline controls and paths to cybersecurity maturity By Gregory Moore Are you a seasoned IT pro who’s been tasked with handling security for your organization? Are you a brand-new CISO awash in a sea of security products and vendors? Or maybe you (finally!) received additional resources and management’s approval to “do… Read more »
Securing Virtual workshops in the age of Zoombombing
Security measures helped keep CI/CS Workshop attendees safe By Gregory Moore On August 18 and 20, 2020, ResearchSOC and CI CoE Pilot co-hosted the 2020 Cyberinfrastructure/Cybersecurity (CI/CS) Workshop, a virtual training event for cybersecurity and cyberinfrastructure professionals. Zalak Shah is a senior security analyst and deputy chief information security officer at Indiana University’s Center for Applied Cybersecurity Research (CACR) and oversaw the two-day event as the security officer. As with all online… Read more »
Preview: How to devise a network monitoring strategy
By Gregory Moore Focused on the special needs of the research and education community, ResearchSOC webinars and workshops provide on-demand, how-to training for IT and cybersecurity professionals supporting open science research projects. On August 20, Mark Krenz, ResearchSOC, Indiana University, and Scott Orr, OmniSOC, Indiana University, will present How to devise a network monitoring strategy,… Read more »
Webinar: NSF Resources for Research Cybersecurity: Trusted CI and ResearchSOC
Note: this announcement was originally posted on Trusted CI’s website. Trusted CI Director Von Welch and ResearchSOC Deputy Director Susan Sons will present “NSF Resources for Research Cybersecurity: Trusted CI and ResearchSOC,” on Friday June 14 at 2pm ET. This presentation is part of ESnet’s series of CI Brownbag talks. Cybersecurity for research has a… Read more »
Trusted CI Webinar “Securing Scientific Cyberinfrastructure: The ResearchSOC” video, slides available
An on-demand video of the National Science Foundation Cybersecurity Center of Excellence (Trusted CI) webinar “Securing Scientific Cyber Infrastructure: The ResearchSOC” is now available on the Trusted CI website. The video can be viewed here. The research and education (R&E) community faces particular challenges regarding cybersecurity: diversity of size and autonomy, the use of diverse… Read more »