Trusted CI: The NSF Cybersecurity Center of Excellence
Blog
Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI
The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC
Services Catalog Engagements
Resources Catalog Secure by Design Framework Employment Opportunities
Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit
Contact Trusted CI Email Lists Help
About Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI Community The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC Services Services Catalog Engagements Resources Resources Catalog Secure by Design Framework Employment Opportunities Events Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit Blog Contact Contact Trusted CI Email Lists Help
Trusted CI: The NSF Cybersecurity Center of Excellence
January 2023: Improving the Security of Open-Source Software Infrastructure
Jeannette DopheideFebruary 27, 2023
December 2022: Science DMZ Engagement with University of Arkansas
Jeannette DopheideDecember 5, 2022
September 2022: Lowering the Barrier to Entry for Regulated Research Through Community Building
Jeannette DopheideSeptember 26, 2022Comment
August 2022: CIS Controls with Trusted CI
Jeannette DopheideAugust 22, 2022
June 2022: Ransomware: Threats & Mitigations with REN-ISAC
Jeannette DopheideJune 27, 2022
Apr 2022: Updates from the Trusted CI Framework Cohort
Jeannette DopheideApril 25, 2022
Feb 2022: The Results of the Trusted CI Annual Challenge on Software
Jeannette DopheideFebruary 28, 2022
Jan 2022: Populating the HECVAT as an Academic Research Provider - Representing Your Security Posture For Your Higher-Ed Information Security Partners
Jeannette DopheideJanuary 24, 2022Comment
Dec 2021: Lessons learned from a real-world ransomware attack on researchers at MSU
Jeannette DopheideDecember 6, 2021
Oct 2021: The Trusted CI Framework; Overview and Recent Developments
Jeannette DopheideOctober 25, 2021Comment
Sep 2021: Q-Factor: Real-time data transfer optimization
Jeannette DopheideSeptember 27, 2021
Aug 2021: NCSA Experience with SOC2 in the Research Computing Space
Jeannette DopheideAugust 30, 2021
July 2021: A capability-based authorization infrastructure for distributed High Throughput Computing
Jeannette DopheideJuly 26, 2021
June 2021: Investigating Secure Development In Practice: A Human-Centered Perspective
Jeannette DopheideJuly 26, 2021
May 2021: Identifying Vulnerable GitHub Repositories in Scientific Cyberinfrastructure
Jeannette DopheideMay 25, 2021
Apr 2021: Trusted CI webinar: Arizona State's Science DMZ
Jeannette DopheideApril 26, 2021
Bonus episode: Operationalizing the Framework: Getting management to understand cybersecurity
Jeannette DopheideApril 16, 2021
May 2016: Webinar Series Kick-off
Jeannette DopheideApril 16, 2021
Jun 2016: Risk Self-Evaluation
Jeannette DopheideApril 16, 2021
Jul 2016: XSEDE Information Sharing
Jeannette DopheideApril 16, 2021
Newer Older
nsf_small.png
Contact Us
 

Trusted CI, the NSF Cybersecurity Center of Excellence is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. The views expressed do not necessarily reflect the views of the National Science Foundation or any other organization.

This work is licensed under a Creative Commons Attribution-­NonCommercial 4.0 International (CC BY­-NC 4.0) license. ©2025