In this presentation, we will present the motivations behind and structure for the Trusted CI Framework and related implementation guidance for research. We’ll field questions, as well as discuss opportunities for the community to get be involved. The Framework team members are Craig Jackson, Bob Cowles, Kay Avila, Scott Russell, Von Welch, and Jim Basney. Speaker bios: Craig Jackson is Program Director at the Indiana University Center for Applied Cybersecurity Research (CACR), where his research interests include information security program development and governance, cybersecurity assessments, legal and regulatory regimes' impact on information security and cyber resilience, evidence-based security, and innovative defenses. He l...
Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences an...
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
Secure development is not just a technical problem: it’s a human and organizational problem as well....
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
The Trusted CI Framework is a minimum standard for cybersecurity programs. In response to cybersecur...
The research and education (R&E) community faces particular challenges regarding cybersecurity: dive...
The REED+ framework integrates NIST SP 800-171 and other related NIST publications as the foundation...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.O...
The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent y...
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
The Research and Education Networks Information Sharing and Analysis Center (REN-ISAC) serves member...
At one time, higher-ed was the requestor of HECVAT's - now we are being called to populate them for ...
Data-intensive science applications in research fields such as bioinformatics, chemistry, and materi...
Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences an...
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
Secure development is not just a technical problem: it’s a human and organizational problem as well....
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
The Trusted CI Framework is a minimum standard for cybersecurity programs. In response to cybersecur...
The research and education (R&E) community faces particular challenges regarding cybersecurity: dive...
The REED+ framework integrates NIST SP 800-171 and other related NIST publications as the foundation...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.O...
The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent y...
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
The Research and Education Networks Information Sharing and Analysis Center (REN-ISAC) serves member...
At one time, higher-ed was the requestor of HECVAT's - now we are being called to populate them for ...
Data-intensive science applications in research fields such as bioinformatics, chemistry, and materi...
Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences an...
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
Secure development is not just a technical problem: it’s a human and organizational problem as well....