Cybersecurity training for open science research
Improve your cybersecurity posture with ResearchSOC technical training webinars!
Focused on the special needs of the research and education community, ResearchSOC's webinars provide on-demand, how-to training for IT and cybersecurity professionals supporting open science research projects.
Strategies for better incident response
June 25th, 3pm Eastern
It's not if a cybersecurity incident will happen, it's when. In this webinar, you'll learn key strategies and concepts for more effective incident response to better protect open science projects. This webinar will discuss key concepts and essential components of incident response and incident response planning. Attendees will learn how to develop a customized incident response plan that prioritizes the goals of their organization. This webinar will be most helpful to IT security/operations professionals new to incident response and information security policy development.
Who should attend
IT and security personnel supporting open science and research projects, especially those who may be involved in cybersecurity incident response, program design and measurement, security exercises, or other security operations.
The webinars are recorded using Zoom will be available for on demand viewing. Each webinar includes a Q&A session.
Stakeholder Management In a Crisis: lessons from a crisis communicator
May 21, 3pm Eastern.
Incidents happen. The real test of a cybersecurity program is how those incidents are managed when they do happen. Executing well on technical incident response is important, but if stakeholders start to panic, or try to run the process themselves, even a straightforward incident can balloon into a complex crisis. Preventing this takes solid communication and the ability to constantly nudge people with different motivation and points of view toward a common and reasonable direction. Join this ResearchSOC webinar to learn a time-tested stakeholder management method taken from hostage negotiation and how to apply it to incident response. ResearchSOC Deputy Director, cybersecurity incident responder, and volunteer crisis communicator Susan Sons will lead the training.
View the recording (registration required)
How to select and use operational cybersecurity metrics to make cybersecurity operations more effective
March 19th, 2020, 3pm Eastern
When it comes to cybersecurity programs supporting science projects, how do we know whether we’ve really accomplished anything? How do we keep ourselves honest, and demonstrate to stakeholders the value of our evolving program? This webinar discusses the role of operational metrics in a cybersecurity program: how to select metrics to provide valuable information and avoid perverse incentives, how to gather and use metrics effectively, and how to create a culture of improvement that uses qualitative and quantitative measures to stay on track.
How to secure SCADA/ICS systems: strategies that work
February 20, 2020, 3pm EST
Dr. Stefan Lueders, CERN Computer Security Officer
Mr. Phil Salkie, Managing Member, Jenariah Industrial Automation/TallyEngine
Telescopes. Monitoring systems. Scientific instruments. Centrifuges. Control systems. These SCADA and ICS systems are large, complex, essential, expensive, and too often running highly specialized software, outdated and vulnerable software, or both. Join ResearchSOC’s special guests as they bring their unique perspectives to the challenge of securing these systems and learn proven strategies for improving the security of these types of systems.
View the recording
Download the NSF Summit ICS Class Notes
Download the presentation slides
How to use security exercises to mature an information security program
January 30, 2020, 3pm EST
Learn to use a regular program of security exercises to probe your infrastructure, program, and incident response for weaknesses and opportunities, then use your home-court advantage to constantly and incrementally improve security posture rather than waiting for disaster to strike. Participants will learn key elements in writing a tabletop security exercise that can test their incident response plans with their home organization. There is no charge for this webinar.
About the presenter
Josh Drake is a senior security analyst with the Center for Applied Cybersecurity Research (CACR). He works on a couple different NSF-funded projects to mature information security programs. Josh has a 15-year background in network and systems administration.
Additional Webinar Resources
Our friends at Trusted CI, the National Science Foundation Cybersecurity Center of Excellence and ResearchSOC's sister organization, also host a series of valuable webinars. We encourage you to view this list of their upcoming webinars.