Trusted CI: The NSF Cybersecurity Center of Excellence
Blog
The Team Mission Success Stories Reports Our Cybersecurity Program Code of Conduct Acknowledging Trusted CI Including Trusted CI in a Proposal
Advisory Committee Research Infrastructure Security Community (RISC) Partners Fellows Scholars Alumni Trustworthy Data Working Group
Cybersecurity for Research Security Framework Secure Use Of AI Employment Opportunities Resources Catalog Secure by Design Software Assurance
Events 2026 NSF Cybersecurity Summit 2026 Regional Summit Webinar Series
Contact Trusted CI Email Lists Help
About The Team Mission Success Stories Reports Our Cybersecurity Program Code of Conduct Acknowledging Trusted CI Including Trusted CI in a Proposal Community Advisory Committee Research Infrastructure Security Community (RISC) Partners Fellows Scholars Alumni Trustworthy Data Working Group Resources Cybersecurity for Research Security Framework Secure Use Of AI Employment Opportunities Resources Catalog Secure by Design Software Assurance Events Events 2026 NSF Cybersecurity Summit 2026 Regional Summit Webinar Series Blog Contact Contact Trusted CI Email Lists Help
Trusted CI: The NSF Cybersecurity Center of Excellence
May 2016: Webinar Series Kick-off
Jeannette DopheideApril 16, 2021
Jun 2016: Risk Self-Evaluation
Jeannette DopheideApril 16, 2021
Jul 2016: XSEDE Information Sharing
Jeannette DopheideApril 16, 2021
Aug 2016: The Science DMZ as a Security Architecture
Jeannette DopheideApril 16, 2021
Sep 2016: The Risk of the Commons
Jeannette DopheideApril 16, 2021
Oct 2016: Science or Security?
Jeannette DopheideApril 16, 2021
Dec 2016: CICI Regional Cybersecurity Collaboration projects
Jeannette DopheideApril 16, 2021
Jan 2017: Open Science Cyber Risk Profile
Jeannette DopheideApril 16, 2021
Feb 2017: Practical Cybersecurity Program for (Smaller) Science Programs
Jeannette DopheideApril 16, 2021
Mar 2017: SDN and IAM Integration at Duke
Jeannette DopheideApril 16, 2021
Apr 2017: HIPAA and FISMA: Computing with Regulated Data
Jeannette DopheideApril 16, 2021
May 2017: Cybersecurity Research: Transition To Practice (TTP)
Jeannette DopheideApril 16, 2021
Jun 2017: Using the Blockchain to Secure Provenance Meta-Data
Jeannette DopheideApril 16, 2021
Jul 2017: Inaugural Security Program at Internet2
Jeannette DopheideApril 16, 2021
Aug 2017: Stronger Security for Password Authentication
Jeannette DopheideApril 16, 2021
Aug 2017: An overview of CTSC Engagements and the Application Process
Jeannette DopheideApril 16, 2021
Sep 2017: Demystifying Threat Intelligence
Jeannette DopheideApril 16, 2021
Oct 2017: Incident Response in an Open and Decentralized Network
Jeannette DopheideApril 16, 2021
Dec 2017: The State of the Cybersecurity Center of Excellence
Jeannette DopheideApril 16, 2021
Feb 2018: SmartProvenance: A Distributed, Blockchain Based Data Provenance
Jeannette DopheideApril 14, 2021
Newer Older
LinkedIn
nsf_small.png
Contact Us
Blog
 

Trusted CI, the NSF Cybersecurity Center of Excellence is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. The views expressed do not necessarily reflect the views of the National Science Foundation or any other organization.

This work is licensed under a Creative Commons Attribution-­NonCommercial 4.0 International (CC BY­-NC 4.0) license. ©2026