Call for Participation

2025 NSF Cybersecurity Summit

October 20th - 23rd ✶ Boulder, CO

https://trustedci.org/summit/

It is our pleasure to announce that the 2025 NSF Cybersecurity Summit is scheduled to take place the week of Oct 20th at the Center Green Campus at UCAR and NSF NCAR.

About the Summit

The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, and complex collaborations). This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit brings together leaders in NSF cyberinfrastructure and cybersecurity to build a trusting, collaborative community that addresses the community’s core cybersecurity challenges.


Proposing Content for the Summit
Proposing a Plenary Presentation
Proposing a Workshop or Training Session
Birds of a Feather and Project Specific Meeting Proposals
Poster Proposals
TLP:RED Talks
About UCAR and NSF NCAR

 

Proposing Content for the Summit

There are many ways to contribute to the Cybersecurity Summit. We are open to proposals for plenary presentations, workshops/trainings, project meetings, birds of a feather(BoFs), and posters. More specific information on each format is available below. Submissions can be made using the online form by Monday, June 30th. Multiple submissions are allowed but only one may be accepted to allow for a variety of speakers. First-time presenters are encouraged to submit a proposal!

Responses will be announced by Monday, July 21st, to ensure adequate planning time for presenters.

We welcome your proposals relevant to a broad range of topics related to the operational cybersecurity of NSF cyberinfrastructure and programs.  However, we encourage proposals that address topics highly ranked by the NSF CI Community. These include: 

  1. HPC security

  2. AI in cybersecurity:  Practical use in operational security and/or  balancing automation and oversight

  3. Network security and defense

  4. Regulatory compliance

  5. Staying on top of emerging threats (how-to guide)

  6. Pros and cons of federal, academic, and private research funding

  7. Digital forensics and incident response (case studies)

  8. Zero-trust architecture implementation

  9. Security of research IOT

  10. Adjusting your cybersecurity program during cuts

 

Proposing a Plenary Presentation

We encourage plenary topics that focus on NSF cyberinfrastructure operators’ unmet cybersecurity challenges, lessons learned, and/or significant successes. Plenary talks are limited to 25 minutes in length, including time for questions.

  • All plenary talks will be recorded and made available after the event.

  • All plenary presentations should be TLP:CLEAR - Information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction. 

    • We are accepting TLP:RED talks in a separate form (scroll down to submit a TLP: RED talk)

Submission deadline: Monday, June 30th

To propose a plenary talk, complete this form: 
https://forms.gle/9HMa9c2wjKBtEsKo7 

Notification of Acceptance: Monday, July 21st

 

Proposing a Workshop or Training Session

The Summit accepts proposals for workshops and trainings, seeking to build communities of practice related to the NSF CyberInfrastructure. Examples include table-top exercises, log analysis, secure coding, focused discussions and activities around a relevant cybersecurity tool, and collaborative information sharing.

  • Workshops can be of varying length ranging from one hour to a half day (3 hours).

  • Workshops can be limited to a specific audience to provide confidentiality and should be clearly noted in the proposal submission.

Submission deadline: Monday, June 30th

To propose a workshop or training session, complete this form:
https://forms.gle/9HMa9c2wjKBtEsKo7 

Notification of Acceptance: Monday, July 21st

 

Birds of a Feather and Project Specific Meeting Proposals

Birds of a Feather (BoFs): Informal gatherings of like-minded individuals who wish to discuss a certain topic can be 1-2 hours in length. Proposers of BoF sessions should serve as discussion leaders to explore and address challenges for a specific topic.

Project Specific Meetings: The Summit organizers recognize that the summit attracts many people who work remotely on projects with distributed staff (ACCESS, ESNet, OSG, Zeek, Jupyter). This presents an opportunity for people who work collectively on a shared project to meet in-person. Requests will be reviewed and scheduled based on room availability. 

Submission deadline: Monday, June 30th

To propose a BoF or Project Specific Meeting, complete this form:
https://forms.gle/9HMa9c2wjKBtEsKo7 

Notification of Acceptance: Monday, July 21st

 

Posters

The poster session is an opportunity to disseminate your work with Summit attendees, receive helpful feedback, and engage others who are interested in the same subject. Details on shipping posters will be provided upon acceptance.

Submission deadline: Friday, August 29

To propose a poster, complete this form:
https://forms.gle/5LchJiakoj9D3pLEA 

Notification of Acceptance: Friday September 5th

 

TLP:RED talks

The purpose of these talks is to collectively enhance situational awareness and better understand the evolving threat landscape while also strengthening collaboration and trust in the NSF CI Community.

TLP:RED CISA Description

When should it be used? Sources may use TLP:RED when information cannot be effectively acted upon without significant risk for the privacy, reputation, or operations of the organizations involved. For the eyes and ears of individual recipients only, no further.

How should it be shared? Recipients may not share TLP:RED information with any parties outside of the specific exchange, meeting, or conversation in which it was originally disclosed. In the context of a meeting, for example, TLP:RED information is limited to those present at the meeting. In most circumstances, TLP:RED should be exchanged verbally or in person.

Submission deadline: Friday October 3rd

To propose a TLP:RED Talk, complete this form: 
https://forms.gle/sqXTLhoFJP7n6AP57 

Notification of Acceptance: Friday October 10th

 

About UCAR and NSF NCAR

UCAR is the University Corporation for Atmospheric Research. UCAR is a hub for the Earth system sciences and a gateway to cutting-edge resources and services. UCAR manages the U.S. National Science Foundation National Center for Atmospheric Research (NSF NCAR) on behalf of NSF. Trusted CI is grateful to the UCAR and NSF NCAR staff for graciously hosting us this year.

More information about UCAR can be found at ucar.edu.

More information about NSF NCAR can be found at ncar.ucar.edu.