2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

October 15-17 ✶ Catamaran Hotel ✶ San Diego, CA

 

View the Program Agenda

View Training Description

View Speaker Presentations

View Speaker Bios

View Trusted Fellows

Read The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure

The 2019 NSF Cybersecurity Summit will take place on October 15th, 16th and 17th of 2019 at the Catamaran in San Diego, CA. Please mark your calendars and watch this space for registration info and further details in the coming months.

When: Oct 15 through October 17, 2019. The conference will adjourn at 12:30 pm on the 17th.

General schedule:

Oct 15th:  Half-day and full-day training workshops

Oct 16th & 17th: Keynote and plenary presentations. The conference will adjourn at 12:30 pm on the 17th.

Where: Catamaran Resort Hotel, San Diego, CA.  Reservations can be made online by clicking here.   or call the toll-free reservations line at 1-800-422-8386.

Who: Attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.

Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the process initiated in 2013, 2014, 2015, 2016, 2017 & 2018: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges. 

The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships. 

If you are interested in presenting at the Summit, please respond to the 2019 Call for Proposals when released. The Summit organizers welcome proposals from all individuals and agencies. 

To receive updates about the Summit please subscriber to the announce@trustedci.org email list.

To learn more about our past Summits, check us out under “Events”

For more information, please contact us at: info@trustedci.

View the Code of Conduct

The Student Program Call for Participation is closed.

Biographies for Speakers, Authors, Program Committee Members, Organizers, and Student Awardees

Ishan Abhinit is a Senior Security Analyst at the Centre for Applied Cybersecurity Research (CACR) at Indiana University. He joined the team in Feb 2019. He graduated from Cybersecurity Program at Northeastern University, Boston in Dec 2018. Previously, he has worked as a Security Risk Analyst Co-op at GMO, Boston. He has also worked as SOC Engineer and IT Security Analyst at Infosys Ltd and IBM India Pvt. Ltd. respectively before coming to the US for his MS in Cybersecurity.

Kay Avila is a senior security engineer at the National Center for Supercomputing Applications (NCSA), where she works on the Large Synoptic Survey Telescope (LSST) and Trusted CI projects.  Her primary responsibilities for LSST include managing the hardware firewalls and intrusion detection system.  As part of Trusted CI, she participates in consulting engagements helping NSF projects develop and assess their security programs.  Prior to this, Kay held positions in network engineering and network security at a Fortune 500 insurance company and in higher education.  She studied computer science and biology at the University of Northern Iowa.

Dr. Edwin “Leigh” Armistead is the President of Peregrine Technical Solutions www.gbpts.com, an SBA 8(a) certified, Alaskan Native Corporation (ANC), small disadvantaged business (SDB), operating with a primary NAICS code of 541513, under the $30.0M size standard. He has served as the PM on recent efforts where Peregrine SMEs have been conducting vulnerability assessments (VA) focused on control systems (CS) for the Department of Defense (DoD) and in particular the US Air Force (USAF) over the last four years with two contracts from OASD EI&E (Platform Resilience Mission Assurance and UAV Cyber Study at the following locations: Creech AFB (2X), Nellis AFB, Ramstein AFB, Joint Base Langley – Eustis, Cannon AFB, Tinker AFB, Buckley AFB, Wright-Patterson AFB, Springfield ANG Base, McConnell AFB and Vandenberg AFB. The latter was conducted in February 2018 as part of an FY2017 NDAA Sec. 1650, Evaluation of Cyber Vulnerabilities of DoD Critical Infrastructure effort. A retired Naval Officer, Dr Armistead wrote his PhD and has published three books, in an unclassified format in 2004, 2007 and 2010, all that focus on full spectrum Information Warfare. He is currently serving as the Chief Editor of the Journal of Information Warfare (JIW), a double-blind peer-reviewed academic publication, http://www.jinfowar.com/jiw; the Program Director of the International Conference of Cyber Warfare and Security, http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm; and the Vice-Chair Working Group 9.10 – http://www.ifip.org/bulletin/bulltcs/memtc09.htm.

Tom Barton is the Senior Consultant for Cyber Security and Data Privacy at the University of Chicago. He also works with Internet2 and InCommon in the area of trust and identity research engagement. He is a member of InCommon’s Community Trust and Assurance Board, Internet2’s Community Architecture Committee for Trust and Identity, the Kantara Initiative’s Assurance Review Board, and the Research & Education Federations (REFEDS) Steering Committee. He was a member of the Middleware Architecture Committee for Education that guided the early development of what is now called “trust and identity”, led the Internet2 Grouper project, and served on the InCommon Federation's Technical Advisory Committee and EDUCAUSE's Identity Management Working Group. He was the University of Chicago’s Chief Information Security Officer and has had IT leadership roles at UChicago and earlier at the University of Memphis, where he was a tenured member of the Mathematics faculty before turning to administration.

Dr. Jim Basney is a senior research scientist in the cybersecurity group at the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign. He is the deputy director of Trusted CI. Jim received his PhD in computer sciences from the University of Wisconsin-Madison.

Elizabeth Bautista is the Manager for the Operations Technology Group (OTG) at Lawrence Berkeley National Lab’s National Energy Research Scientific Computing (NERSC) Center. The group ensures 24x7 accessibility, reliability, and security of NERSC's High Performance Systems, data storage systems. NERSC is the primary scientific computing facility for the Office of Science in the U.S. Department of Energy.  

Bautista's team manages a 125 TB Elastic stack data warehouse infrastructure that collects at a rate of 25,000 data points/second. The types of datasets range from the facility environment (power, temperature, humidity) to storage I/O to system logs of the HPC systems and support services. The analysis of the real-time data provides alerts to manage the facility, and the archived data is correlated to provide business decisions and future trends.

Bautista supports programs that seek to involve minorities and women in STEM and advocates that the next generation of professionals has practical hands-on training as part of their education. In her career, she has served as a member of the Lab’s Computing Science Diversity Group, is a member of Women Scientists and Engineers, was a delegate in the Council of University of California Staff Assemblies (CUCSA), a staff advocate group, she champions issues of retention and diversity and is the founder of Filipinas in Computing, a community in the Grace Hopper Conference. Bautista was named one of 100 most influential Filipina Women Globally in 2015. She has a B.S. in Computer Information Systems and an M.B.A. in Technical Management both from Golden Gate University.

Tony Baylis is the senior management advocate for diversity and inclusion for the Laboratory. Tony is responsible for overseeing the laboratory’s interactions and successful execution in building and collaborating with academic, community, governmental, and industry stakeholders. Tony's career represents 33 years of administrative, project, program, technical, and organizational management. He has worked in a scientific and technical environment for over 28 years. He represents the Laboratory on the subjects of Diversity and Inclusion, STEM, Outreach Efforts, and Student Programs.

Tony has a long history in working and building programs that impact underserved communities, Minority Serving Institutions, specifically relationships with American Indian Institutions, Hispanic Serving Institutions, and Historically Black College and Universities.. He serves as a Department of Energy Minorities in Energy Champion, a Board Member for the EmpowHer Institute, a NSF reviewer, and an Industry Advisory Board Member for the University of Florida Computer & Information Science & Engineering Department. He also serves as a conference program committee member and reviewer for the Grace Hopper Conference, Richard Tapia Diversity in Computing Conference, Supercomputing Conference, Women in Cybersecurity Conference, and NSF Cybersecurity Summit. Tony is an ACM and ACM SIGGRAPH member and currently serves SIGGRAPH in the role of Diversity and Inclusion Committee Chair. His passion is to serve others. He is honored to have had the opportunity to give advice and mentor many students and professionals throughout his career.

Kathy Benninger is the Manager of Network Research for the Pittsburgh Supercomputing Center, where she pursues her interests in network performance, emerging network technologies, and cyberinfrastructure. She has extensive experience engaging with PSC’s users to help them understand and maximize network throughput. She also brings her skills to XSEDE’s Data Transfer Services team, with responsibility for managing XSEDE’s perfSONAR 

infrastructure and advising on network performance issues. She joined Trusted CI in September 2019 where she is working to support the Trusted CI Summit and the Large Facilities Security Team. Kathy is a graduate of Carnegie Mellon University (B.S.E.E.).

Richard Biever is Duke University's chief information security officer and director of identity management. He has served in previous roles with the Georgia Institute of Technology's Office of Information Technology and Hewlett Packard. Under Richard’s leadership, Duke University has developed a strong, collaborative office working with university departments, research faculty, other higher education partners to develop and enable effective cybersecurity defenses at Duke. STINGAR, a Duke-developed and NSF-funded threat intelligence and sharing initiative, is currently being deployed beyond Duke with a number of higher education partners. More information on STINGAR may be found at https://stingar.security.duke.edu.

Leslee A. Bohland is the Director of Finance and Administration at Indiana University’s Center for Applied Cybersecurity Research (CACR).  Leslee provides leadership, financial acumen and strategic insight to ensure the financial health, integrity and growth of the organization.

Leslee has over 16 years of financial experience and began her professional career in private finance working for Evansville Federal Savings Bank. Following the launch of her career, she continued to develop and articulate her financial and analytical skills by serving in various financial planning and analysis, compliance, program management and consulting capacities for private and public entities.

Leslee holds a B.S. in Business, with a specialization in Finance from Kelley School of Business at Indiana University.

Dr. Dana Brunson is Executive Director for Research Engagement at Internet2. She is responsible for developing, directing, and executing Internet2’s strategy and active engagement with the national and global communities that supports the effective use and development of research cyberinfrastructure. Dana also provides leadership for the XSEDE Campus Champion program, the Campus Research Computing Consortium (CaRCC), and the Trusted CI Fellows program. Prior to joining Internet2 in January 2019, she was Assistant Vice President for Research Cyberinfrastructure, Director of the Oklahoma State University High Performance Computing Center, and co-lead of the OneOklahoma Cyberinfrastructure Initiative. She earned her Ph.D. in Mathematics at the University of Texas at Austin.

Diana Cimmer serves as the Events & Communications Manager at Indiana University’s Center for Applied Cybersecurity Research (CACR). She has worked for IU for 19 years in the IU UITS Finance office, before joining CACR in 2016.

Chris Clausen is a lead security engineer at the National Center for Supercomputing Applications (NCSA), where he is the primary security contact for vulnerability management for Blue Waters, LSST, and XSEDE. Chris plays a key role in securing the LSST systems at NCSA and in Chile, which will serve an international community of astronomers. Chris is also NCSA's primary representative to the REN-ISAC. Chris received his B.S. in Computer Science from the University of Illinois in 2009 and joined NCSA in 2016.

Michael Corn is the Chief Information Security Officer for UC San Diego. He co-chairs the Educause Higher Education Information Security Council. He has been a CISO since 2003 and has been a member of the NSF Cybersecurity Summit program committee since 2013.

Robert (Bob) Cowles is a principal in BrightLite Information Security performing cybersecurity assessments and consulting in research and education about information security. He served as CISO at SLAC National Accelerator Laboratory (1997-¬2012); participated in the development of security policies and procedures for the LHC Computing Grid (2001-¬2008); and was an instructor at the University of Hong Kong in information security (2000¬-2003). A contributor to Indiana University's CACR since 2013, he participated in the XSIM project on identity management and has been working with CTSC since 2015. In 2017, he was honored to be named as a CACR Senior Fellow.

Austin Cushenberry is an IT Support Specialist at the Indiana University Center for Applied Cybersecurity Research (CACR). He is a student at Indiana University studying Human Centered Interactions at the School of Informatics, Computing and Engineering (SICE). He previously worked for the Metropolitan School District of Warren Township as an IT Support Specialist.

Erik Deumens has a PhD in computational nuclear and chemical physics and has done research in modeling of chemical reactions and designed complex computational software. Since 2011, he is the full time director of the department of Research Computing in UFIT at the University of Florida. Starting 2015, he and his staff have been in charge of a FISMA 800-53 moderate computing environment for research. During 2018 a second generation system was completed to meet both FISMA and CUI 800-171 requirements. The new system has the advantage that it is more cost effective for research budgets. The system was assessed for compliance by a 3PAO. Seehttps:///www.rc.ufl.edu for details on UFIT RC and https://people.clas.ufl.edu/deumens/ for details on the research background. During this year we developed a Research Computing Consultant program to train IT staff to better support faculty in their computing needs for research, see https://www.rc.ufl.edu/research/events/ for details on the program.

Jeannette Dopheide is senior education outreach and training coordinator at NCSA. Her experience in education and outreach began as a high school teacher before moving onto business systems analysis and applications training for a commercial software company. Jeannette joined Trusted CI and NCSA in 2014 and works primarily on education outreach for projects that impact both Trusted CI and NCSA. Jeannette is a graduate of Illinois State University.

Ewa Deelman received her PhD in Computer Science from the Rensselaer Polytechnic Institute in 1998. Following a postdoc at the UCLA Computer Science Department she joined the University of Southern California’s Information Sciences Institute (ISI) in 2000, where she is serving as a Research Director and is leading the Science Automation Technologies group. She is also a Research Professor at the USC Computer Science Department and an IEEE Fellow.

The USC/ISI Science Automation Technologies group explores the interplay between automation and the management of scientific workflows that include resource provisioning and data management. Dr. Deelman pioneered workflow planning for computations executing in distributed environments. Her group has lead the design and development of the Pegasus Workflow Management software and conducts research in job scheduling and resource provisioning in distributed systems, workflow performance modeling, provenance capture, and the use of cloud platforms for science.

Andrew Ferbert is the Manager for Unix Applications and Virtualization within Research Data Services’s Infrastructure unit at the San Diego Supercomputer Center. Andrew also serves as SDSC Event/Change Manager coordinating both scheduled and unplanned events across several divisions serving a national research community. Andrew holds a degree in electrical engineering from California Polytechnic State University, San Luis Obispo, and is a loyal San Diego Padres fan.

Terry Fleury is a Senior Research Programmer at the National Center for Supercomputing Applications (NCSA). He has worked in the Cybersecurity Division since 2005 where he has assisted with development of several open-source security projects including MyProxy, CILogon, and SWAMP. In his work with Trusted CI, he has performed several engagements assisting NSF projects with risk assessments and cybersecurity program development.

Dr. David Halstead is the CIO for the National Radio Astronomy Observatory.  After obtaining a PhD in the computational simulation of surface catalysis in 1990, he moved to HPC research at the DOE Scalable Computing Laboratory in Ames Lab, implementing commodity parallel processing cluster solutions to benefit research in surface science, chemistry, physics and biology.  In 2002 he moved into industry with Celera Genomics to drive the Strategic Platform Initiative; transitioning away from the costly leased computer systems used to sequence the human genome, to scalable HPC systems supporting proteomics and therapeutics research.  Since joining NRAO in 2008, his responsibilities are focus on Data Management for the Observatory’s Cyber Infrastructure in support of national radio telescopes, as well as the general IT support for 500+ employees. 

Elisa Heymann is a Senior Scientist at the Computer Sciences Department of the University of WisconsinMadison, and an Associate Professor in the Computer Architecture and Operating Systems Department at the Autonomous University of Barcelona (UAB). She codirects the MIST software vulnerability assessment project in collaboration with her colleagues at the University of Wisconsin. Heymann is part of Trusted CI, the NFS cyber security center for excellence, where she works on Software Assurance training and engagements.

Heymann carries out training in universities, companies, and conferences around the world. Heymann's research interests include security and resource management for Grid and Cloud environments, and cybersecurity in transportation. Her research is supported by NSF, the Spanish government, the European Commission, and NATO.  Heymann received her M.S. and Ph.D. degrees in Computer Science from the Autonomous  University  of Barcelona (Spain) in 1995 and 2001 respectively.

Brian Hom is a security analyst at the San Diego Supercomputer Center (SDSC).  He is responsible for ensuring FISMA, HIPAA and CUI compliance for the Sherlock division of SDSC.  In addition to supporting the security needs of SDSC, he also collaborates closely with XSEDE’s Security Working Group.  He received his B.S. in Computer Science from San Diego State University in 2003 and joined SDSC in 2004.

Florence Hudson is Founder & CEO of FDHint, LLC, consulting in advanced technologies, diversity and inclusion. She was an IBM Vice President and Chief Technology Officer, Internet2 Senior Vice President and Chief Innovation Officer, and aerospace engineer at Grumman Aerospace Corporation and NASA. Her expertise includes technical and business leadership, strategy, marketing, artificial intelligence, big data and analytics, blockchain, connected healthcare, cybersecurity, Internet of Things, and Smart Cities.  She is Special Advisor for Trusted CI, the NSF Cybersecurity Center of Excellence at Indiana University, leading the Cybersecurity Research Transition to Practice (TTP) program. She was PI for NSF EAGER #1650445 Cybersecurity Transition To Practice Acceleration, and NSF #1623931 End-to-End Trust and Security for the Internet of Things Workshop. She is Special Advisor for the Northeast Big Data Innovation Hub at Columbia University, leading EU-US collaboration on Next Generation Internet under the EU Horizon 2020 Initiative. She is on the Editorial Board for the journal Blockchain in Healthcare Today, and on advisory committees for Princeton University, Cal Poly San Luis Obispo, Stony Brook University, and the Computational Approaches for Cancer workshop at Supercomputing. She is on the IEEE Engineering in Medicine and Biology Standards Committee, and Chair of the IEEE Standards Working Group for Clinical Internet of Things Data and Device Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety, Security. She is Editor of the book "Women Securing the Future with TIPPSS For IoT" featuring 16 women authors from around the world.  She graduated from Princeton University with a BSE in Mechanical and Aerospace Engineering, and attended executive education at Harvard Business School and Columbia University. 

Zachary Hunsaker became a Security Engineer at NCAR after several years in the NOC working as a systems administrator. 

Zachary believes that security should empower end users and business processes.

Zachary has worked to streamline the Incident Response processes at his organization. He also led an effort to increase network visibility for his organization. He also frequently performs penetration tests and osint investigations.

When not working in Security Zachary enjoys spending time with his family hiking and flying drones.

Craig Jackson (scjackso@iu.edu) is Program Director at the Indiana University Center for Applied Cybersecurity Research (CACR), where his research and development interests include information security program development and governance, cybersecurity assessment design and conduct, legal and regulatory regimes' impact on information security and cyber resilience, evidence-based security, and innovative defenses. He leads CACR’s collaborative work with the defense community and interdisciplinary assessment and guidance teams for the NSF Cybersecurity Center of Excellence. He is a co-author of Security from First Principles: A Practical Guide to the Information Security Practice Principles. Craig is a graduate of the IU Maurer School of Law, IU School of Education, and Washington University in St. Louis. In addition to his litigation experience, Craig’s research, design, project management, and psychology background includes work at the IU Center for Research on Learning and Technology and the Washington University in St. Louis School of Medicine.

Sigita Jurkynaite is a Partner Relations Officer at GÉANT, Europe’s leading collaboration on e-infrastructure and services for research and education. Sigita is leading an international Cybersecurity project, which includes 3 tasks: Business Continuity, Security Baselining and Security Products and Services.

Sigita has a BA Music Technology degree from the University of Bedfordshire (UK) and BA Liberal Arts and Sciences, majoring in Film and Literature studies, from the Amsterdam University College. She completed part of her second degree at the University of Toronto, focusing on Slavic Languages and Literatures. 

Ryan Kiser is a Senior Security Analyst at the Indiana University Center for Applied Cybersecurity Research. Ryan has worked on information security projects across multiple domains including efforts to assess and improve the security of automotive engine systems, performing risk assessments for university central IT systems, and supporting researchers in efforts to adhere to regulated data requirements such as HIPAA, FISMA, and various CUI requirements. Ryan has been heavily involved in organizations serving information security needs for higher-ed and national research communities. Some of these include the Open Science Grid (OSG) as a member of the OSG Security Team, Trusted CI where he has led engagements to assist NSF-funded research projects in improving their security posture, and the NSF Cyberinfrastructure Center of Excellence (CI-CoE) Pilot as a member of the identity management team. His current interests involve novel applications of predictive modeling, machine learning, and brazilian jiu-jitsu.

Patricia Kovatch is the founding Senior Associate Dean for Scientific Computing and Data Science at Mount Sinai. She leads the team with the goal of enabling and accelerating biomedical discovery through collaborative research encompassing high-performance computing, biomedical informatics, and data science.  She has contributed to scientific discovery through three major efforts: (1) research on the real-life impact of production workloads on high-performance computing and data systems; (2) development and oversight of reliable and cost-effective high-performance computing and data systems tuned for optimal researcher productivity; and (3) community engagement with training, education, and workshops. Over her career, these endeavors have garnered $159 million in funding in the role of Principal Investigator (PI) or Co-PI. She has led the deployment and operation of over 10 of the Top 10 fastest supercomputers including the world’s third fastest in 2009, thereby delivering billions of compute hours to the national scientific community.

Mark Krenz is the Chief Security Analyst at Indiana University's Center for Applied Cybersecurity Research with over two decades of experience in information security and system administration spread across multiple sectors. His interests at CACR include policy development, operational security development, security auditing and security education. He studied Computer Science and Mathematics at Indiana University.

James A. Marsteller, Jr. is the Pittsburgh Supercomputer Center Chief Information Security Officer. He has extensive security leadership experience with the TeraGrid and XSEDE security operations team and is a Co-PI for the Center For Trustworthy Scientific Cyberinfrastructure, the NSF Cybersecurity Center of Excellence. James also has served as the program chair for annual NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure since 2007. He has also served on the board of directors for the Pittsburgh chapter of the FBI Infragard program for many years. He holds a Master of Information Technology Management from Carnegie Mellon University and is a Certified Information Systems Security Professional.

Barton Miller the Vilas Distinguished Achievement Professor and the Amar and Belinder Sohi Professor in Computer Sciences at the University of Wisconsin-Madison. He is Chief Scientist for the DHS Software Assurance Marketplace research facility. He co­directs the MIST software vulnerability assessment project in collaboration with his colleagues at the Autonomous University of Barcelona. He also leads Paradyn Tools project, which is investigating performance and instrumentation technologies for parallel and distributed applications and systems. His research interests include systems security, binary and malicious code analysis and instrumentation extreme scale systems, and parallel and distributed program measurement and debugging. 

Miller's research is supported by the U.S. Department of Homeland Security, U.S. Department of Energy, National Science Foundation, NATO, and various corporations. In 1988, Miller founded the field of Fuzz random software testing, which is the foundation of many security and software engineering disciplines. In 1992, Miller (working with his then­student, Prof. Jeffrey Hollingsworth) founded the field of dynamic binary code instrumentation and coined the term “dynamic instrumentation”. Dynamic instrumentation forms the basis for his current efforts in malware analysis and instrumentation.

Miller was the chair of the IDA Center for Computing Sciences Program Review Committee, member of the Los Alamos and Lawrence Livermore National Labs Security Review Committee (POFMR), member of the Los Alamos National Laboratory Computing, Communications and Networking Division Review Committee, and has been on the U.S. Secret Service Electronic Crimes Task Force (Chicago Area). Miller received his Ph.D. degree in Computer Science from the University of California, Berkeley in 1984. He is a Fellow of the ACM.

Nicholas J. Multari is the senior technical advisor for research in cybersecurity at the Pacific Northwest National Lab (PNNL) in Richland, Washington.  He establishes the direction and leads the execution of the various research projects resulting in a rigorous foundation upon which security concepts are matured and implemented.  Prior to joining PNNL, he was the manager for trusted cyber technology at Boeing Research and Technology in Seattle, Washington. In 2008, he served as a consultant to the USAF Scientific Advisory Board (SAB) investigating the effects of the contested cyber environment on the USAF mission. In addition to being a Senior Security Engineer with Scitor Corporation in Northern Virginia where he supported the government in addressing enterprise level information assurance issues. Nick spent 20 years as a computer scientist in the Air Force retiring as a Lt. Col. In the Air Force, his positions ranged from system acquisitions to networking to computer security management. He received a bachelor’s degree in mathematics from Manhattan College, New York; a master’s degree in computing and information science from Trinity University, Texas; and a PhD in computer science from the University of Texas at Austin.

Charles Nguyen is the IT Director for the St. Anthony Falls Laboratory (SAFL) and the Polar Geospatial Center (PGC) at the University of Minnesota in Minneapolis. With over 20 years of experience partnering with researchers and staff in an academic environment, he works to understand their evolving needs as well as bring an open mind and sense of humor.

Charles is a research advocate who focuses on how technology can advance and enable science. Because his passion is to facilitate innovation through collaboration and technology, he recently became a CyberAmbassador Founding Fellow. The CyberAmbassadors program trains facilitators to conduct professional skills workshops based on the NSF-funded curriculum. He also completed his Master of Science in Management of Technology in 2018.

Some of his recent work includes the creation of a ScienceDMZ at the University of Minnesota and regional private colleges, deployment of numerous clusters with over 10PB of storage, and the completion of a cybersecurity assessment plan for the Polar Geospatial Center. He is also a member of the Campus Storage Champions, a new group at the University that is charged with finding appropriate need-driven storage solutions for the community.

Rajvardhan Oak is a graduate student at the School of Information at UC Berkeley. Originally a Computer Engineer from India, his research focus is Deep Learning, Security and Adversarial Machine Learning . He is actively involved in cyber security related research at the Center for Long Term Cybersecurity (CLTC), and the International Computer Science Institute (ICSI). He is also part of the Secure Computing Group at Berkeley and does research under Prof. Dawn Song. His most recent work has been on malware detection and anomaly detection.

Dr. Sean Peisert leads computer security research and development at Lawrence Berkeley National Laboratory. He is also chief cybersecurity strategist for CENIC; both an associate adjunct professor of Computer Science at the University of California, Davis and of Health Informatics at the University of California, Davis School of Medicine; and is a senior fellow in the Berkeley Institute for Data Science at UC Berkeley. 

His current research and development interests cover a broad cross section of usable and useful computer security and privacy solutions, particularly in enabling secure and privacy-preserving scientific data analysis in distributed, high-performance, and cloud computing environments. In recent years, Dr. Peisert's R&D has focused on improving security in high-performance computing systems and power grid control systems. 

Professor Peisert is chair of the IEEE Computer Society Technical Committee on Security & Privacy; associate editor-in-chief of IEEE Security & Privacy; a steering committee member and past general chair of the New Security Paradigms Workshop (NSPW); steering committee member and past program co-chair of the USENIX Workshop on Cyber Security Experimentation and Test (CSET); and past general chair for the IEEE Symposium on Security and Privacy, the flagship conference for security research. 

Previously, Dr. Peisert was an I3P Research Fellow and was a computer security researcher at the San Diego Supercomputer Center (SDSC). He received his Ph.D., Masters, and Bachelors degrees in Computer Science from UC San Diego.

Elliot Pfarr began his InfoSec career 6 years ago and since then has worked as a threat hunter, sales engineer and vulnerability analyst. He holds offensive and defensive InfoSec certifications, and well as a number of Splunk certifications. Elliot has been using Splunk as a SIEM throughout his career, and is currently responsible for integrating it with SDSC's vulnerability management program.

Susan Ramsey is a security engineer and risk assessor, currently working in the private sector. She has an MS in Computer Information Technology from Regis University, (thesis on risk and vulnerability assessment). She is working towards a second Master of Science degree, in Information Security Engineering, from SANS Technical Institute with another thesis planned on evidence-based quantitative risk assessment. She is a passionate advocate for science and education. 

Brigitte Raumann is a Product Manager at Globus and led the effort to enable Globus support for management of protected research data, including PHI and CUI. As the Globus Privacy Officer, she continues to oversee the Globus compliance program and incident investigations.

Brigitte has focused her career on providing researchers with the software tools and data they require to advance discovery.  Her decades of experience span sectors as diverse as biotech, publishing, patent law, and academic clinical research. Brigitte Raumann earned her B.A. from the University of California, Berkeley and her Ph.D. in biochemistry from the Massachusetts Institute of Technology.

Scott Russell (scolruss@indiana.edu) is a Senior Policy Analyst with the Indiana University Center for Applied Cybersecurity Research (CACR), where his work focuses on the improvement of privacy and cybersecurity policy. A lawyer and researcher, Scott specializes in privacy, cybersecurity, and international law, and his past research has included principled cybersecurity, cybersecurity assessments, cybersecurity due diligence, cybersecurity self-governance, international data jurisdiction, and constitutional issues on digital surveillance. He is a co-author of Security from First Principles: A Practical Guide to the Information Security Practice Principles, and a key contributor to CACR’s collaborative efforts with Naval Surface Warfare Center Crane. He received his B.A. in Computer Science and History from the University of Virginia, received his J.D. from Indiana University, interned at MITRE, and served as a postdoctoral fellow at CACR.

Phil Salkie is a computer scientist who has been working as an industrial controls and automation engineer since 1984. His software and hardware designs serve sectors as diverse as food packaging, broadcast television, emergency power generation, water purification, sewage processing, medical device manufacturing, and UV photochemistry.

He is managing partner of Jeneriah Industrial Automation, designing, supporting, and securing PLC, HMI, and SCADA systems, as well as embedded controllers using Linux and RTOS.

He was honored to present the lunch Keynote address at the 2017 CACR CyberSecurity Summit - "Automation: Ready or not, here it comes", and has given ICS security training at the annual NSF Cybersecurity Summit since 2015.

Scott Sakai is one of four cybersecurity analysts who comprise the Security Team at the San Diego Supercomputer Center. His area of focus is supporting the security needs of SDSC’s HPC installations and serves as a subject-matter expert for security issues relating to intrusion detection, incident response, networking, Unix environments, programming, and general

IT. In addition to supporting the security needs of SDSC, Scott also collaborates closely with XSEDE’s Security Working Group in a similar role. He received his B.S. in Computer Science and Engineering from UC San Diegoin 2003 and joined SDSC in 2004.

Jeremy Sampson is a Research Scientist/Software Engineer at Battelle Memorial Institute working on NEON. He has contributed to a wide range of software projects and is well versed in a variety of programming languages, frameworks, technology stacks, software engineering practices and design methodologies.

Stefan Savage is a professor of Computer Science and Engineering at the University of California, San Diego. He received his Ph.D. in Computer Science and Engineering from the University of Washington and a B.S. in Applied History from Carnegie Mellon University. Savage is a full-time empiricist, whose research interests lie at the intersection of computer security, distributed systems and networking.  He currently serves as co-director of UCSD's Center for Network Systems (CNS) and for the Center for Evidence based Security Research (CESR). Savage is a MacArthur Fellow, a Sloan Fellow, an ACM Fellow, and is a recipient of the ACM's Prize in Computing and SIGOPS Weiser Award.   He currently holds the Irwin and Joan Jacobs Chair in Information and Computer Science, but is a fairly down-to-earth guy and only writes about himself in the third person when asked.

Anurag Shankar is a senior security analyst at Indiana University’s Center for Applied Cybersecurity Research (CACR). His expertise includes regulatory compliance (HIPAA, FISMA, CUI) and cybersecurity risk management. He has helped numerous institutions tackle HIPAA compliance and is responsible for developing a NIST based risk management framework and using it to align IU's central research and enterprise cyberinfrastructures with HIPAA.  His prior engagements include nearly twenty years with IU’s central IT organization developing, delivering, and managing Unix support, massive data storage, the national Teragrid project, and supporting the research mission of the IU School of Medicine. He played a key role in building IU's research data storage environments, for supporting IU's Indiana Genomics Initiative and other life sciences efforts, and for creating information infrastructures and technology solutions for the Indiana Clinical and Translational Sciences Institute (CTSI). He is a computational astrophysicist by training (Ph.D. University of Illinois, '90).

Susan Sons serves as a Chief Security Analyst at Indiana University's Center for Applied Cybersecurity Research and as President of the Internet Civil Engineering Institute, a nonprofit dedicated to supporting and securing the common software infrastructure we all depend on. Susan is also the Deputy Director of the Research Security Operations Center (ResearchSOC). She comes from a background in abuse management, systems software engineering, web development, and pentesting.

Victoria Stodden is an associate professor in the School of Information Sciences at the University of Illinois at Urbana-Champaign, with affiliate appointments in the School of Law, the Department of Computer Science, the Department of Statistics, the Coordinated Science Laboratory, and the National Center for Supercomputing Applications. She is also a faculty affiliate of the Center for Informatics Research in Science and Scholarship (CIRSS) in the School of Information Sciences at the University of Illinois.

Victoria completed both her PhD in statistics and her law degree at Stanford University, and graduated magna cum laude from the University of Ottawa. 

Dr. Nitin Sukhija, is a Director of Center of Cybersecurity and Advanced Computing (C2AC), an assistant professor and one of the XSEDE Campus Champion specializes in the area of high performance data analytics and security. He has been involved in research and management of various projects pertaining to the HPC and software challenges in industry and academia for over a decade. Dr. Sukhija chaired and co-chaired many conferences such as ACM XSEDE16, MEDES18, and IEEE WHPBDC(16-19) conference and is also serving as an active member of the organizing committees of various esteemed (national and international) ACM and IEEE conferences and workshops, such as, XSEDE,IPDPS, PASA, ICPP, ISPDC, WHPBDC, SC EduHPC, SC18 Early Career Program, SIAM CSE Broader Engagement and others. He currently co-chairs the ACM SIGHPC Education Chapter workshop committee and has been active in the planning and participation in HPC Workshops series at SC , ISC and other conferences.

Kevin Thompson serves as a Program Director at the U.S. National Science Foundation’s (NSF) Office of Advanced Cyberinfrastructure (OAC). He manages NSF’s International Research Network Connections (IRNC) program, the Campus Cyberinfrastructure (CC*) program, the Cybersecurity Innovations for Cyberinfrastructure (CICI) program, and the Transition to Practice (TTP) designation under the Secure and Trustworthy Cyberspace (SaTC) program. He started at NSF in 2003, and from 2009–2010 served as a Program Director of the DHS Cyber Security Research and Development program at the US Department of Homeland Security (DHS).  Prior to NSF, he was Senior Manager in MCI's Advanced Internet Technologies department, responsible for advanced services of the vBNS, a national research and education network.

Romain Wartel has been actively trying to protect the academic & research community and "Science For Peace" for more than 15 years. Romain works at the European Organization for Nuclear Research, in Geneva, Switzerland. He specializes in threat intelligence, large scale intrusions management and forensics, but also enjoys causal botnet hunting.

Kathleen Weathers is a senior scientist and G.Evelyn Hutchinson Chair in ecology at the Cary Institute of Ecosystem Studies, Millbrook, NY.   She has a master’s degree in forest science from Yale University and a Ph.D. in ecology from Rutgers University. Weathers is an ecosystem scientist who focuses on the air-land-water interface.   She has had extensive experience in creating and leading network science and network scientists. Weathers has served as co-Chair of the Global Lake Ecological Observatory Network (GLEON) and is President-elect of the Ecological Society of America (ESA). Weathers collaborates with CS colleagues, primarily in association with GLEON research, and has been PI for a Cyberinfrastructure Team grant,  and is currently PI for a FAIR workshop, and co-PI for a Spokes grant. She served as an NSF rotating program officer in DEB during 2009-2010.

Chris Weaver is a software engineer, working for the Maniac Lab group at the University of Chicago. His background is in astroparticle physics, which he studied at the University of Wisconsin, Madison. His current work is focused on creating tools to build more efficient and reliable cyberinfrastructure for science research.

Dr. Derek Weitzel is a research assistant professor in Computer Science at the University of Nebraska - Lincoln.  He has been providing distributed computing solutions to the Open Science Grid since 2009. He is a member of the OSG’s technology investigations team, which researches new technology for usefulness and inclusion in OSG’s cyberinfrastructure.  His current areas of research involve distributed data management for shared and opportunistic storage, secure credential management, and network monitoring and analytics.

Von Welch is the director of the Indiana University Center for Applied Cybersecurity Research. CACR has a unique focus - improve real world cybersecurity for organizations with missions that challenge for traditional cybersecurity approaches. Examples include research and development, open science, and highly distributed collaborations. CACR project partners and funders include the US Department of Defense, National Science Foundation, Department of Homeland Security, as well as private sector organizations - and Von’s roles span research, development, operations, and leadership.

Alex Withers is an Assistant Director for Cyber Security and the Chief Information Security Officer at the National Center for Supercomputing Applications (NCSA). Additionally, he is the security co-manager for the XSEDE project and NCSA’s HIPAA Security Liaison. He is also a PI and co-PI for a number of NSF-funded cybersecurity projects.

Trusted CI Fellows

Matias Carrasco Kind is a senior research and data scientist at the National Center for Supercomputing Applications. Matias is an expert in scientific cloud computing and scientific platforms. and his interests in astrophysics are in cosmology, extragalactic astronomy, machine and deep learning, especially in large scale structures, galaxy formation and evolution, and photometric redshift estimation. He is also interested in data-intensive science, data visualization, image processing, web applications, scientific platforms, software engineering and architecture, and cyberinfrastructure in general.

Shafaq Chaudhry is the assistant director of graduate and research IT at the University of Central Florida. Shafaq's research interests include public safety communications, wireless networks and Software-Defined Networking. She is the Central Florida coordinator for Aspirations in Computing (AiC) program of National Center for Women & Information Technology (NCWIT) and the president of the Women in EECS group at UCF. Shafaq has been serving on the reviewer committee for the Grace Hopper Celebration conference since 2017.

Gabriella Perez is the research technology compliance specialist at the University of Iowa. Gabriella has served as the University of Iowa’s Research Technology Compliance Specialist since the position was created in May 2017. She is the primary campus point-of-contact for technology compliance questions among researchers and the campus OneIT network of technical specialists who utilize the campus computing cluster. She serves as a cybersecurity and compliance liaison with the Division of Sponsored Programs, the Human Subjects Office, and the UI Libraries.

Aunshul Rege is an associate professor with the Department of Criminal Justice at Temple University. Anushul has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her research examines adversarial and defender behavior, decision-making, adaptations, modus operandi, and group dynamics. Aunshul is also passionate about educating the next generation workforce across the social and hard sciences about the relevance of the human factor in cybersecurity through experiential learning.

Chrysafis Vogiatzis is an assistant professor at North Carolina A&T State University. Chrysafis' current research interests lie in network optimization and combinatorial optimization, along with their vast applications in modern socio-technical and biological systems. One of the main axes of his research is focusing on the study of centrality metrics in biological, social, and infrastructure networks, in order to identify groups and persons of interest.

S. Jay Yang is a professor at the Rochester Institute of Technology. Jay is currently a professor and the department head for the Department of Computer Engineering at Rochester Institute of Technology and also serves as the Director of Global Outreach in the Center of Cybersecurity at RIT. His research group has developed several pioneering machine learning, attack modeling, and simulation systems to provide predictive analytics and anticipatory cyber defense. His earlier works included FuSIA, VTAC, ViSAw, F-VLMM, and attack obfuscation modeling.

2019 NSF Cybersecurity Summit: Student Bios

Merlin Cherian is a senior Computer Science student pursuing an accelerated BS/MS degree from Drexel University. She is interested in AI, Machine Learning, Big Data and Computer Vision. She has been actively involved with the Women in Computing initiative at her university and is currently serving as a Dean’s Ambassador for the College of Computing and Informatics. She has more than 2 years of work experience from various internships, research opportunities and internships with companies including Comcast and Boeing. Merlin is also a member of Upsilon Pi Epsilon (UPE), international honor society for academic excellence in computing. She will be graduating in June 2020 and is seeking full-time opportunities.

Shuvra Chakraborty is a 4th year Ph.D. student in the Department of Computer Science at the University of Texas at San Antonio (UTSA). Her doctoral research works focus on the investigation of novel access control methodologies; development and deployment. She also holds a master’s degree in Computer Science and Engineering from the University of Dhaka, Bangladesh, and did research on person authentication using iris recognition as a part of MS thesis. Before joining the UTSA, Shuvra has spent more than five years in teaching and research in several universities as a faculty, predominantly at the University of Dhaka, Bangladesh. She has also worked on different projects with reputable agencies, and the most notable one was the "Drowsy driver detection". As a member of a committee, she participated in the procurement of hardware and software, and conference organization. She is an active member of two honor societies (i.e., ACM and Alpha Chi) and UTSA-students run non-profit organization - Bangladesh Student Association (BSA). Apart from this, Shuvra is very enthusiastic about the real-world security problem, coding and traveling!

Merlin Cherian is a senior Computer Science student pursuing an accelerated BS/MS degree from Drexel University. She is interested in AI, Machine Learning, Big Data and Computer Vision. She has been actively involved with the Women in Computing initiative at her university and is currently serving as a Dean’s Ambassador for the College of Computing and Informatics. She has more than 2 years of work experience from various internships, research opportunities and internships with companies including Comcast and Boeing. Merlin is also a member of Upsilon Pi Epsilon (UPE), international honor society for academic excellence in computing. She will be graduating in June 2020 and is seeking full-time opportunities.

Roncs Etame is currently a senior at Marymount University, and an NSF CyberCorps Scholarship for Service student. He is working towards a combined BS/MS in Information Technology with a concentration in Applied Cybersecurity. He's been working in the field of cyber for approximately two years, as a cybersecurity analyst for a cloud security firm. He's participated in numerous programs such as NASA's Community College Aerospace Scholars at Johnson Space Center, in addition to being a 2018 DHS Secretary's Honors Intern at the U.S. Coast Guard. Roncs is continually active in the community, participating in panels, and volunteering in outreach events through different organizations.

Luis Gonzalez is a Senior at Florida International University. Currently, he is part of a fellowship program for Software Defined Networking (SDN) by the Center for Internet Augmented Research and Assessment (CIARA) at Florida International University. The synopsis of the program includes active research participation in the implementation of an OpenFlow/SDN network for research and experimentation, connecting U.S. and Brazil OpenFlow network deployments via the AMPATH International Exchange Point in Miami, Florida. Louis has previous work experience training employees in cybersecurity practices at an enterprise level.

Emma (Yi) He is a Master student in Computer Sciences at the University of Wisconsin-Madison. Her research interests include cybersecurity and operating systems. Emma has been assisting Prof. Barton Miller and Dr. Elisa Heymann with cybersecurity projects and courses. She developed hands-on exercises for an undergraduate course on software security, including XML injection, directory traversal, and web attacks.

Tre’ Jeter is an undergraduate student at Claflin University, working on his Bachelor of Science Degree in both Computer Science and Computer Engineering while minoring in Cybersecurity. Tre’ has recently completed an internship as a 2019 Computation Scholar at Lawrence Livermore National Laboratory. Tre’ plans to graduate in May 2021 and heading to graduate school.

Desiree Lester is a senior Computer Science major. She attends the illustrious Norfolk State University and is from Washington DC. Desiree is optimistic and determined to learn something new everyday.

Minh Nguyen received his MS degree in Computer Engineering from the University of Missouri in 2016. He is currently a PhD student in the Department of Computer Science at the City University of New York. His current research interests include network security and cloud computing.

Cameron Ogle is a senior Computer Science major at Clemson University. Cameron finds the entire field of computer science interesting, and cybersecurity in particular. Since freshman year he has been a member of CU Cyber, Clemson’s cybersecurity club, and has participated in events ranging from CTFs (Capture The Flag) to cyberdefense competitions. Currently, Cameron is researching information centric networking and how it can be used to benefit PIs all across the nation. Outside of academics, he enjoys writing, drawing, and even performing standup comedy! Ultimately, Cameron's goal is to use his skills to create products that will benefit people in need.

Alexis Reyes was born and raised in El Paso, Texas and attends the University of Texas at El Paso. Alexis is a recipient of the Cyber Corps: Scholarship for Service program, which has allowed her to enroll in a fast-track program to obtain her Bachelor's and Master's degrees in 5 years. In May Alexis received her undergraduate degree in Computer Science and currently working toward a Master's of Science in Software Engineering. Both degrees have a focus in Cyber Security. Alexis has completed 3 summer internships at the Johns Hopkins Applied Physics Laboratory, where she worked on projects involving automated configuration management for compliance, internal vulnerability scanning of web applications, and evaluation of the cyber security of ships in development by the Coast Guard.