Update on OCIs Cybersecurity Activities for CASC September 2011 Kevin Thompson.

Slides:



Advertisements
Similar presentations
CCIRN Meeting Douglas Gatchell US NSF/CISE/SCI July 3, 2004.
Advertisements

INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Xsede eXtreme Science and Engineering Discovery Environment Ron Perrott University of Oxford 1.
1 US activities and strategy :NSF Ron Perrott. 2 TeraGrid An instrument that delivers high-end IT resources/services –a computational facility – over.
Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
ACCI TASK FORCES Update CASC September 22, Task Force Introduction Timeline months or less from June 2009 Led by NSF Advisory Committee on.
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Science Gateway Security Recommendations Jim Basney Von Welch This material is based upon work supported by the.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation,
David A. Brown Chief Information Security Officer State of Ohio
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
Making Condor Safer with… A Collaborative Marketplace for Continuous Software Assurance Brooklin Gore, Chief Operations Officer
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
1 Software & Grid Middleware for Tier 2 Centers Rob Gardner Indiana University DOE/NSF Review of U.S. ATLAS and CMS Computing Projects Brookhaven National.
NATO Network Enabled Capabilities
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
EInfrastructures (Internet and Grids) - 15 April 2004 Sharing ICT Resources – “Think Globally, Act Locally” A point-of-view from the United States Mary.
Department of Internal Affairs Cloud computing considerations John Roberts Director, Relationship Management CRI Records Managers 11 June 2015.
(Geneva, Switzerland, September 2014)
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN The Coming of Cyberinfrastructure Gary M. Olson.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Website Hardening HUIT IT Security | Sep
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Computing in Atmospheric Sciences Workshop: 2003 Challenges of Cyberinfrastructure Alan Blatecky Executive Director San Diego Supercomputer Center.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Science of Security Experimentation John McHugh, Dalhousie University Jennifer Bayuk, Jennifer L Bayuk LLC Minaxi Gupta, Indiana University Roy Maxion,
Updates from EOSDIS -- as they relate to LANCE Kevin Murphy LANCE UWG, 23rd September
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Yuan Xue Vanderbilt University
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Campus Cyberinfrastructure – Network Infrastructure and Engineering (CC-NIE) Kevin Thompson NSF Office of CyberInfrastructure April 25, 2012.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
October 21, 2015 XSEDE Technology Insertion Service Identifying and Evaluating the Next Generation of Cyberinfrastructure Software for Science Tim Cockerill.
May 28, 2009Great Plains Network meeting, Kansas City 1 Some NSF funding opportunities Terry Langendoen (703) Expert, Robust.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Second Scientific Software Security Innovation Institute (S3I2) Workshop October 26, 2011 Chicago, IL Randal ButlerVon Welch.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
08/05/06 Slide # -1 CCI Workshop Snowmass, CO CCI Roadmap Discussion Jim Bottum and Patrick Dreher Building the Campus Cyberinfrastructure Roadmap Campus.
S2I2: Enabling grand challenge data intensive problems using future computing platforms Project Manager: Shel Swenson (USC & GATech)
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
Cyberinfrastructure: An investment worth making Joe Breen University of Utah Center for High Performance Computing.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
NSF Cybersecurity Funding Opportunities Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure September 2015.
1 NSF/TeraGrid Science Advisory Board Meeting July 19-20, San Diego, CA Brief TeraGrid Overview and Expectations of Science Advisory Board John Towns TeraGrid.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
Education, Outreach and Training (EOT) and External Relations (ER) Scott Lathrop Area Director for EOT Extension Year Plans.
2005 GRIDS Community Workshop1 Learning From Cyberinfrastructure Initiatives Grid Research Integration Development & Support
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Infrastructure Breakout What capacities should we build now to manage data and migrate it over the future generations of technologies, standards, formats,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Data Infrastructure Building Blocks (DIBBS) NSF Solicitation Webinar -- March 3, 2016 Amy Walton, Program Director Advanced Cyberinfrastructure.
Petascale Computing Resource Allocations PRAC – NSF Ed Walker, NSF CISE/ACI March 3,
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Building PetaScale Applications and Tools on the TeraGrid Workshop December 11-12, 2007 Scott Lathrop and Sergiu Sanielevici.
Sustaining the software capabilities long term Address Solutions as part of software. Act on “Hard challenges are not technical” bringing in the right.
Chief, ARSTAF Cyberspace Task Force
Comparison to existing state of security experimentation
NSF Middleware Initiative
Presentation transcript:

Update on OCIs Cybersecurity Activities for CASC September 2011 Kevin Thompson

Outline New SaTC solicitation FY11 SDCI program and new awards Software Institute workshop on Cyber Security from Aug 2010 revisited

SaTC – Secure and Trustworthy Cyberspace Joint solicitation from CISE, OCI, and SBE CISEs long standing basic research program in cyber security (Trustworthy Computing) as the basis OCIs Transition to Practice Theme

Software Development for Cyberinfrastructure (SDCI) FY10 Cyber Security Focus [Separate from the SDCI network performance focus area] Malware detection and prevention: areas include polymorphism, countering obfuscation, command&control Situational understanding: includes varying time scales, attack attribution, cross-boundary data sharing, and handling massive data. Assurance techniques in sharing data: anonymization and protections for data collected, in transit, and at rest Software assurance: tools and services for software testing and vulnerability analysis HPC resources and distributed computing: secure access to, leverage of, and improving security of existing compute resources. Research infrastructure: supporting cyber security r&d

SDCI Proposal Requirements Partnering with a scientific research project (users) and/or deployment environment (CI infrastructure) Working with an existing software base or initial prototype capability of some kind Use of NSF-funded software build-and-test services or alternative Application to NSF community, in terms of user identification, missing/needed capability, and impact Project plan including release, deployment info and eval plan open source license to be used Collaborations with industry encouraged, not required Strong preference will be shown for efforts that provide near-term benefit to a broad user base in the NSF community

SDCI Awards from FY11 8 projects Award activities 3 years in duration Total funding ~$5M Award abstracts available at

SDCI Awards from FY11 # – Distributed Web Security for Science Gateways – Jim Basney (UIUC) # – Metadata Management Software Tools to support R&D of Cyberinfrastructure – kc claffy (UCSD) and Minaxi Gupta (Indiana) # – New Software Platforms for Supporting Network-wide Detection of Code Injection Attacks – Fabian Monrose (UNC) # – Transport-Layer Abusive Traffic Detection and Mitigation – Rob Beverly (NPS) # – Traffic Modeling and Generation with Custom Fidelity for Cyber Security Experimentation – Jelena Mirkovic (USC) # – SESv3 (Security Event System – Version 3) – Doug Pearson (Indiana) # – Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names – Roberto Perdisci (Georgia) # – Integrated Simulation and Emulation Platform for Security Experimentation – Yuan Xue (Vanderbilt)

SI2 Workshop on Cyber Security from Aug 2010 Report of NSF Workshop on Scientific Software Security Innovation Institute Key recommendations / community needs (16 total): Provide leadership/guidance to NSF and NSF community Provide documentation, training, recommendations and consulting to NSF CI projects on s/w security, security s/w Short term support for orphaned critical security s/w Perform independent s/w security assessments Support security design reviews of MREFCs and smaller efforts

S2I2 recommendations contd Highlight/rank security s/w used in community Provide vulnerability analysis and security autiting Should Not develop s/w Should Not do s/w integration Should Not operational security services or replicate existing Governed in an open fashion Synthesis point for expertise w/out owning all expertise Coordinate with other agencies and agency efforts Defined relationship with CMU SEI, InCommon, I2, REN-ISAC, XD TAIS, etc Document institute success metrics and pursue other funding