Cybersecurity training for open science research
Improve your cybersecurity posture with ResearchSOC technical training webinars!
Focused on the special needs of the NSF research community, ResearchSOC's webinars provide on-demand, how-to training for IT and cybersecurity professionals supporting open science research projects.
How to select and use operational cybersecurity metrics to make cybersecurity operations more effective
March 19th, 2020, 3pm Eastern
When it comes to cybersecurity programs supporting science projects, how do we know whether we’ve really accomplished anything? How do we keep ourselves honest, and demonstrate to stakeholders the value of our evolving program? This webinar discusses the role of operational metrics in a cybersecurity program: how to select metrics to provide valuable information and avoid perverse incentives, how to gather and use metrics effectively, and how to create a culture of improvement that uses qualitative and quantitative measures to stay on track.
Who should attend
IT and security personnel supporting open science and research projects, especially those who may be involved in cybersecurity incident response, program design and measurement, security exercises, or other security operations.
The webinars are recorded using Zoom will be available for on demand viewing. Each webinar includes a Q&A session.
Past Webinars (On demand-registration required)
How to secure SCADA/ICS systems: strategies that work
February 20, 2020, 3pm EST
Dr. Stefan Lueders, CERN Computer Security Officer
Mr. Phil Salkie, Managing Member, Jenariah Industrial Automation/TallyEngine
Telescopes. Monitoring systems. Scientific instruments. Centrifuges. Control systems. These SCADA and ICS systems are large, complex, essential, expensive, and too often running highly specialized software, outdated and vulnerable software, or both. Join ResearchSOC’s special guests as they bring their unique perspectives to the challenge of securing these systems and learn proven strategies for improving the security of these types of systems.
View the recording (registration required)
Download the NSF Summit ICS Class Notes
Download the presentation slides
How to use security exercises to mature an information security program
January 30, 2020, 3pm EST
Learn to use a regular program of security exercises to probe your infrastructure, program, and incident response for weaknesses and opportunities, then use your home-court advantage to constantly and incrementally improve security posture rather than waiting for disaster to strike. Participants will learn key elements in writing a tabletop security exercise that can test their incident response plans with their home organization. There is no charge for this webinar.
About the presenter
Josh Drake is a senior security analyst with the Center for Applied Cybersecurity Research (CACR). He works on a couple different NSF-funded projects to mature information security programs. Josh has a 15-year background in network and systems administration.
Additional Webinar Resources
Our friends at Trusted CI, the National Science Foundation Cybersecurity Center of Excellence and ResearchSOC's sister organization, also host a series of valuable webinars. We encourage you to view this list of their upcoming webinars.