Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017
Session Abstract - Join us for an interactive discussion to determine how – working together – we can accelerate Transition To Practice (TTP) of cybersecurity research into operational environments. We will begin the afternoon with cybersecurity research relevant to Internet2’s top two priorities of advanced networking plus trust & identity. We will also have cybersecurity research related to cloud security, and innovation areas like smart grid and IoT.
NSF-funded cybersecurity researchers will be presenting their work to practitioners who would provide valuable feedback, and pursue potential pilot opportunities. “Practitioners” can include IT, networking, security, and research professionals. Additionally, workshop participants will discuss cybersecurity needs today and into the future. This meeting is supported by the NSF Cybersecurity Transition-To-Practice Acceleration EAGER Grant #1650445.
Agenda - Wednesday, April 26 - 12:30pm - 5:30pm
12:30-12:45 | Goals and Approach for Cybersecurity Research Transition to Practice Acceleration | Florence Hudson, Internet2 |
12:45-1:00 | University CIO Perspective on Leveraging Cybersecurity Research | Bruce Maas, University of Wisconsin-Madison |
Identity & Access Management and Network Security | ||
1:00-1:15 | CILogon 2.0 - An Integrated Identity and Access Management Platform for Science Poster on CILogon 2.0 Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney | Jim Basney, University of Illinois at Urbana-Champaign |
1:15-1:30 | Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci | Roberto Perdisci, University of Georgia |
1:30-1:45 | Data-Driven Cyber Vulnerability Maintenance Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP | Ted Allen, Ohio State University |
1:45-2:00 | Mitigating Insider Attacks in Provenance Systems Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg | Christian Collberg, University of Arizona |
Smart Grid | ||
2:00-2:15 | Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty | Aranya Chakrabortty, North Carolina State University |
2:15-2:30 | Discussion | |
2:30-3:00 | BREAK | POSTER SESSION & NETWORKING |
Cloud Security & Storage | ||
3:00-3:15 | A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion | Radu Sion, SUNY Stony Brook |
Data Analytics & Security | ||
3:15-3:30 | A Kit for Exploring Databases Under the Hood for Security, Forensics and Data Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin | Alex Rasin, DePaul University |
3:30-3:45 | A Distributed Visual Analytics Sandbox for High Volume Data Streams Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1 | Raju Gottumukkala, University of Louisiana-Lafayette |
3:45-4:00 | Discusson | |
4:00-4:30 | BREAK | POSTER SESSION & NETWORKING |
Internet of Things | ||
4:30-4:45 | Cybersafety of Electric Vehicles and EVSE Equipment Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2 | Raju Gottumukkala, University of Louisiana-Lafayette |
4:45-5:00 | Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib | Fareena Saqib, Florida Institute of Technology |
5:00-5:15 | Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP | Michael Anderson, University of Hartford |
5:15-5:30 | Discussion/Closing | Florence Hudson, Internet2 Emily Nichols, Internet2 |