Trusted CI: The NSF Cybersecurity Center of Excellence
Blog
The Team Mission Success Stories Reports Our Cybersecurity Program Code of Conduct Acknowledging Trusted CI Including Trusted CI in a Proposal
Advisory Committee Research Infrastructure Security Community (RISC) Partners Fellows Scholars Alumni Trustworthy Data Working Group
Cybersecurity for Research Security Framework Secure Use Of AI Employment Opportunities Resources Catalog Secure by Design Software Assurance
Events 2026 NSF Cybersecurity Summit 2026 Regional Summit Webinar Series
Contact Trusted CI Email Lists Help
About The Team Mission Success Stories Reports Our Cybersecurity Program Code of Conduct Acknowledging Trusted CI Including Trusted CI in a Proposal Community Advisory Committee Research Infrastructure Security Community (RISC) Partners Fellows Scholars Alumni Trustworthy Data Working Group Resources Cybersecurity for Research Security Framework Secure Use Of AI Employment Opportunities Resources Catalog Secure by Design Software Assurance Events Events 2026 NSF Cybersecurity Summit 2026 Regional Summit Webinar Series Blog Contact Contact Trusted CI Email Lists Help
Trusted CI: The NSF Cybersecurity Center of Excellence
April 2023: Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure
Jeannette DopheideApril 24, 2023
March 2023: The Internet2 Routing Integrity Initiative
Jeannette DopheideMarch 27, 2023
February 2023: Using the Trusted CI Framework to Create the CFDE Cybersecurity Program
Jeannette DopheideFebruary 27, 2023
January 2023: Improving the Security of Open-Source Software Infrastructure
Jeannette DopheideFebruary 27, 2023
December 2022: Science DMZ Engagement with University of Arkansas
Jeannette DopheideDecember 5, 2022
September 2022: Lowering the Barrier to Entry for Regulated Research Through Community Building
Jeannette DopheideSeptember 26, 2022Comment
August 2022: CIS Controls with Trusted CI
Jeannette DopheideAugust 22, 2022
June 2022: Ransomware: Threats & Mitigations with REN-ISAC
Jeannette DopheideJune 27, 2022
Apr 2022: Updates from the Trusted CI Framework Cohort
Jeannette DopheideApril 25, 2022
Feb 2022: The Results of the Trusted CI Annual Challenge on Software
Jeannette DopheideFebruary 28, 2022
Jan 2022: Populating the HECVAT as an Academic Research Provider - Representing Your Security Posture For Your Higher-Ed Information Security Partners
Jeannette DopheideJanuary 24, 2022Comment
Dec 2021: Lessons learned from a real-world ransomware attack on researchers at MSU
Jeannette DopheideDecember 6, 2021
Oct 2021: The Trusted CI Framework; Overview and Recent Developments
Jeannette DopheideOctober 25, 2021Comment
Sep 2021: Q-Factor: Real-time data transfer optimization
Jeannette DopheideSeptember 27, 2021
Aug 2021: NCSA Experience with SOC2 in the Research Computing Space
Jeannette DopheideAugust 30, 2021
July 2021: A capability-based authorization infrastructure for distributed High Throughput Computing
Jeannette DopheideJuly 26, 2021
June 2021: Investigating Secure Development In Practice: A Human-Centered Perspective
Jeannette DopheideJuly 26, 2021
May 2021: Identifying Vulnerable GitHub Repositories in Scientific Cyberinfrastructure
Jeannette DopheideMay 25, 2021
Apr 2021: Trusted CI webinar: Arizona State's Science DMZ
Jeannette DopheideApril 26, 2021
Bonus episode: Operationalizing the Framework: Getting management to understand cybersecurity
Jeannette DopheideApril 16, 2021
Newer Older
LinkedIn
nsf_small.png
Contact Us
Blog
 

Trusted CI, the NSF Cybersecurity Center of Excellence is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. The views expressed do not necessarily reflect the views of the National Science Foundation or any other organization.

This work is licensed under a Creative Commons Attribution-­NonCommercial 4.0 International (CC BY­-NC 4.0) license. ©2026