Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017

Session Abstract - Join us for an interactive discussion to determine how – working together – we can accelerate Transition To Practice (TTP) of cybersecurity research into operational environments. We will begin the afternoon with cybersecurity research relevant to Internet2’s top two priorities of advanced networking plus trust & identity. We will also have cybersecurity research related to cloud security, and innovation areas like smart grid and IoT.

NSF-funded cybersecurity researchers will be presenting their work to practitioners who would provide valuable feedback, and pursue potential pilot opportunities. “Practitioners” can include IT, networking, security, and research professionals. Additionally, workshop participants will discuss cybersecurity needs today and into the future. This meeting is supported by the NSF Cybersecurity Transition-To-Practice Acceleration EAGER Grant #1650445.

 

Agenda - Wednesday, April 26 - 12:30pm - 5:30pm 

12:30-12:45

Goals and Approach for Cybersecurity Research Transition to Practice Acceleration

Florence Hudson, Internet2
Anita Nikolich, NSF

12:45-1:00University CIO Perspective on Leveraging Cybersecurity ResearchBruce Maas, University of Wisconsin-Madison
 Identity & Access Management and Network Security 
1:00-1:15

CILogon 2.0 - An Integrated Identity and Access Management Platform for Science

Poster on CILogon 2.0

Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney

Jim Basney, University of Illinois at Urbana-Champaign
1:15-1:30

Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names

Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names

Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci

Roberto Perdisci, University of Georgia
1:30-1:45

Data-Driven Cyber Vulnerability Maintenance

Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP

Ted Allen, Ohio State University
1:45-2:00

Mitigating Insider Attacks in Provenance Systems

Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg

Christian Collberg, University of Arizona
 Smart Grid 
2:00-2:15

Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids

Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids

Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty

Aranya Chakrabortty, North Carolina State University
2:15-2:30Discussion  
2:30-3:00BREAKPOSTER SESSION & NETWORKING
 Cloud Security & Storage 
3:00-3:15

A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education

Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion

Radu Sion, SUNY Stony Brook
 Data Analytics & Security 
3:15-3:30

A Kit for Exploring Databases Under the Hood for Security, Forensics and Data 

Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data

Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin

Alex Rasin, DePaul University
3:30-3:45

A Distributed Visual Analytics Sandbox for High Volume Data Streams

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1

Raju Gottumukkala, University of Louisiana-Lafayette
3:45-4:00Discusson 
4:00-4:30BREAKPOSTER SESSION & NETWORKING
 Internet of Things 
4:30-4:45

Cybersafety of Electric Vehicles and EVSE Equipment

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2

Raju Gottumukkala, University of Louisiana-Lafayette
4:45-5:00

Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs

Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib

Fareena Saqib, Florida Institute of Technology
5:00-5:15

Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm

Poster on Toward Ethical Intelligent Autonomous Systems, A Case-Support Principle-Based Behavior Paradigm

Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP

Michael Anderson, University of Hartford
5:15-5:30Discussion/ClosingFlorence Hudson, Internet2
Emily Nichols, Internet2