2022 NSF Cybersecurity Summit

Conference program

 
 

PLENARY DAY 1
Wednesday, October 19, 2022

All times listed in Eastern Daylight Time (EDT). Sessions will be livestreamed. Program is subject to change.

Time Session title
8:00–9:00 a.m.

Sign-In and Continental Breakfast

9:00 am

Welcome & NSF Address

Rob Beverly/NSF

9:15 am

Cybersecurity: New Issues, Old Problems

Helen Patton

10:15 am

Trusted CI Update

Jim Basney

10:35 am

COFFEE BREAK

11:00 am

STUDENT INTRODUCTION

11:30 am

Lightning Talks

Trusted AI – Paul Brenner

Understanding the role of cyber hygiene in target suitability – Harsh Parekh

Position paper: IRIS data integrity threat models – Emily Adams, Brian Chase

Your screenshots tell more than you think: Privacy leakage in screenshots shared over Twitter – Yunhe Feng

A data anonymization proxy for interactive log analyses – Phuong Cao

12:00–1:30 pm

LUNCH & TABLETALKS

1:30 pm

Observations on the Security of Operational Technology in Scientific Research

Emily K Adams, Ryan Kiser, Mark Krenz, Sean Peisert

2:00 pm

Lessons from the Trusted CI Framework Cohort

Scott Russell
Panel: Jerry Brower, Wade Craig, Eric Cross, Doug Ertz, Craig Risien, and Randy Trudeau

3:00 pm

Cybersecurity in a Large NSF Research Facility (One Institution's Approach)

Joseph Brigham, David S. Butcher, Julia H. Smith
Panel: Jim Berhalter, Abigail Centers

4:00 pm

COFFEE BREAK

4:30 pm

ResearchSOC and CI Security Operations—What We've Learned

Josh Drake

5:00 pm

ADJOURN

6:00–9:00 pm

SOCIAL

Nick's English Hut

Abstracts

Cybersecurity: New Issues, Old problems

Cybersecurity seems like an ever-changing problem. Hot topics appear all the time - supply chain security, cloud security, blockchain, quantum cryptography, nation-state attacks, to name a few. From the perspective of the security practitioner, the cybersecurity environment is becoming more changeable and less predictable.

How can security practitioners frame these challenges so that they can be managed? How can cybersecurity practitioners and researchers partner to address these concerns?

Observations on the Security of Operational Technology in Scientific Research

This talk aims to communicate the initial findings and recommendations derived from the 2022 Trusted CI Annual Challenge on the Security of Operational Technology in Scientific Research.

Operational technology (OT) refers to networked systems connected to computing systems on one side and to either controls or sensors of physical systems on the other side. Networked sensors and control systems are increasingly important in the context of science as they are critical in operating scientific instruments like telescopes, biological and chemical reactors, and even vehicles used in scientific discovery.

This year’s Annual Challenge is a year-long project with the goal to understand and improve the security of the specialized operational technology used in scientific research. To accomplish this, in the first half of the year, we had conversations with personnel involved with IT security and OT operations at a variety of NSF Major Facilities. In the second half of the year, we plan to leverage this insight to develop a multi-year roadmap of solutions to advance the security of scientific operational technology. This presentation will discuss the observations and findings from our conversations with NSF Major Facilities, and preliminary elements of the roadmap we are developing and planning for release at the end of 2022.

Cybersecurity in a Large NSF Research Facility (One Institution’s Approach)

Our plenary presentation will introduce and discuss some of the essential differences between IT (Information Technology) and RT (Research Technology) and why it is important to recognize the unique requirements and constraints associated with these technology domains when developing plans for enhancing cybersecurity capabilities in a large research facility. Lessons learned related to FSU’s & NHMFL’s shared approach for establishing a multidisciplinary team that can guide and implement needed cybersecurity, while not novel, will be covered over the course of our discussion. We will contrast the Trusted CI, NIST, and NERC frameworks, briefly examine our layered architecture approach, and introduce these components as catalysts for improving cybersecurity awareness and managing the cybersecurity challenges facing FSU and the Lab in the 2020s. We also will discuss the need to design and implement cybersecurity controls rooted in pragmatic decisions to avoid hindering vital research activities and to enable safe FAIR (Findability, Accessibility, Interoperability, and Reusability) data management practices. Critical success factors we will address include obtaining resources required to implement and maintain needed capabilities, interdisciplinary and diverse skill sets, phased implementation, and shared understanding and allocation of NHMFL and FSU responsibilities. The format is planned to be interactive with our panel and allow time for question and answer.