Center for Applied Cybersecurity Research
Permanent link for this collectionhttps://hdl.handle.net/2022/15468
The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.
Browse
Browsing Center for Applied Cybersecurity Research by Type "Presentation"
Now showing 1 - 20 of 73
- Results Per Page
- Sort Options
Item 2021 NSF Cybersecurity Summit Collection of Presentations(2021-10) Welch, Von2021 NSF Cybersecurity Summit Collection of Presentations of slides for Plenary, Workshops & TrainingItem Aligning Your Research Cyberinfrastructure with HIPAA and FISMA(2015-08-17) Shankar, AnuragItem Analysis of authentication events and graphs using Python(2015-05) Heiland, Randy; Welch, VonDiscerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.Item Item The Applicability of HPC for Cyber Situational Awareness(2017-08-17) Leonard, Leslie, PhDItem Automated Assessment Tools Theory & Practice(2017-08-15) Miller, Barton; Heymann, ElisaInjection AttacksItem Beyond the Beltway-The Problems with NIST’s Approaches to Cybersecurity and Alternatives for NSF Science(2017-08-16) Jackson, Craig; Russell, Scott; Cowles, BobItem Bro Platform Training Workshop(2015-08-17) Amann, Johanna; Azoff, Justin; Slagell, AdamItem Building a Cybersecurity Program: A Tutorial for Managers and PIs(2013-09-30) Duda, Patrick; Marsteller, James; Butler, Randy; Bobba, Rakesh; Welch, Von; Jackson, CraigItem Building a Digital Forensics Program(2017-08-15) Raquel, WarrenCTSC’s mission is to provide the NSF community a coherent understanding of cybersecurity’s role in producing trustworthy science and the information and know-how required to achieve and maintain effective cybersecurity programs.Item Building a NIST Risk Management Framework for HIPPA and FISMA Compliance(2016-08-16) Shankar, AnuragItem Building the Modern Research Data Portal Using the Globus Platform(2016-08-16) Tuecke, SteveItem CCoE Webinar Series Kickoff(2016-05-23) Basney, Jim; Jackson, Craig; Marsteller, Jim; Miller, BartonIn 2016, CTSC launched a webinar series meant to fulfill the mission of providing readily available cybersecurity services tailored to the NSF science community. The CCoE Webinar Series Kickoff provides an overview of CTSC, its services, and how it can help science projects funded by NSF.Item CICI Regional Cybersecurity Collaboration Projects(2016-12-12) Nikolich, Anita; Fu, Xinwen; Joshi, James; Stengel, Brian; Flidr, Jaroslav; Gemmill, JillItem Computer Incident Response(2015-08-17) Butler, RandyItem Computer Incident Response: 2017 Great Plains Network & Greater Western Library Alliance Annual Meeting(2017-06-02) Raquel, WarrenItem Concerns and questions that should keep software creators awake at night(2017-08-16) Tannenbaum, ToddItem Cornell Red Cloud: Campus-based Hybrid Cloud(2017-08-16) Lee, Steven• Research computing and consulting services – Mission: accelerate discovery and broaden impact • Wide range of services – HPC cluster maintenance and storage to data management, programming, and visualization • Impact on research – Supporting Cornell faculty with over $100 million in research funding from NSF, NIH, USDA, DOE, NASA … – Management roles in national cyberinfrastructure program – NSF Computer, Information Science & Engineering Advisory CommitteeItem CTSC Secure Software Engineering Best Practices(2016-08-16) Heiland, Randy; Sons, SusanThis training session will introduce participants to a broad range of tools and methodologies for promoting secure software development throughout the software life cycle. Learn how software repositories, testing, static analysis, vulnerability management process, release/delivery management methods, integrated development environments (IDEs), and documentation can enhance or impair the security of the software that is written and released by any team.Item Cybersecurity for Science Gateways(2017-04) Heiland, RandyCybersecurity is a key part of sustainability for science gateways. This presentation provides some background, motivation, and best practices on this topic.