Join us for these Q1/Q2 ResearchSOC webinars and events!
March
"Operationalizing the framework: Getting management to understand cybersecurity," Thursday, March 25th, 3:00 pm Eastern.
Cybersecurity professionals supporting research and higher education understand the value of having a common language with senior management. Published March 1st, the Trusted CI Framework Implementation Guide for Research Cyberinfrastructure Operators provides such a common language, which can lead to mutual understanding, shared goals, and mutually agreed-upon action plans and resource allocations. Join Craig Jackson, architect of the Trusted CI Framework and Susan Sons, Deputy Director of Research SOC, as they discuss how to use the Framework to enhance relationships with key stakeholders while driving forward action to improve the overall cybersecurity posture of an organization.
Register here
April
"Open source tools we like: a conversation with the ResearchSOC Project Liaisons," Thursday, April 22nd, 3:00 pm Eastern.
Register here
May
"Building a vulnerability management workflow that works, and getting the buy-in to implement it," Thursday, May 27th, 3:00 pm Eastern.
Register here
June
Whether virtual or in person, we'll see you at Educause SPC!
Past webinars
February
OmniSOC Year 3 Virtual Event, February 24-26, 2021
To celebrate OmniSOC's third year of operations and the opening of OmniSOC membership to the larger research and higher education community, OmniSOC conducted a three-day virtual event.
Selected panels and presentations included:
- "Cybersecurity as we emerge from the pandemic: restoring and evolving" (featured OmniSOC BTAA Founding member CIOs).
- "A SOC supporting scientific research: initial lessons learned and insights from the ResearchSOC experience."
- "OmniSOC infrastructure and threat hunting: how OmniSOC stalks threats."
- "Research opportunities with OmniSOC and ResearchSOC data."
Walk before You Run
Baseline controls and paths to cybersecurity maturity
Are you a seasoned IT pro who’s been tasked with handling security for your organization? Are you a brand-new CISO awash in a sea of security products and vendors? Or maybe you (finally!) received additional resources and management’s approval to “do something” about cybersecurity. Whichever the case, you look out over your environment of legacy systems and hardware, policies, multiple frameworks and compliance requirements and ask yourself:
Where do I begin, and how do I know that’s the right place?
This webinar is about laying the foundation of a cybersecurity program that will mature with your organization for years to come. At the end of this webinar, you’ll understand the logical steps for building that foundation, key tools to use, how to make progress in the face of cultural challenges, and how to put your resources to use where they will have the most impact.
This webinar will address:
- CIS Top 20 controls: the Basics
- How to bring baseline controls to an entrenched organization with legacy systems and infrastructure
- What to put off until a solid foundation is present
Cybersecurity professionals and those with security responsibilities, regardless of experience or the maturity of their program, should find this webinar useful.
View the presentation slides.
Strategies for better incident response
It's not if a cybersecurity incident will happen, it's when. In this webinar, you'll learn key strategies and concepts for more effective incident response to better protect open science projects. This webinar will discuss key concepts and essential components of incident response and incident response planning. Attendees will learn how to develop a customized incident response plan that prioritizes the goals of their organization. This webinar will be most helpful to IT security/operations professionals new to incident response and information security policy development.
View the recording
Download the presentation slides
Stakeholder Management In a Crisis: lessons from a crisis communicator
Incidents happen. The real test of a cybersecurity program is how those incidents are managed when they do happen. Executing well on technical incident response is important, but if stakeholders start to panic, or try to run the process themselves, even a straightforward incident can balloon into a complex crisis. Preventing this takes solid communication and the ability to constantly nudge people with different motivation and points of view toward a common and reasonable direction. Join this ResearchSOC webinar to learn a time-tested stakeholder management method taken from hostage negotiation and how to apply it to incident response. ResearchSOC Deputy Director, cybersecurity incident responder, and volunteer crisis communicator Susan Sons will lead the training.
View the recording
Download the presentation slides
How to select and use operational cybersecurity metrics to make cybersecurity operations more effective
When it comes to cybersecurity programs supporting science projects, how do we know whether we’ve really accomplished anything? How do we keep ourselves honest, and demonstrate to stakeholders the value of our evolving program? This webinar discusses the role of operational metrics in a cybersecurity program: how to select metrics to provide valuable information and avoid perverse incentives, how to gather and use metrics effectively, and how to create a culture of improvement that uses qualitative and quantitative measures to stay on track.
View the recording
Download the presentation slides
How to secure SCADA/ICS systems: strategies that work
SPECIAL GUESTS:
Dr. Stefan Lueders, CERN Computer Security Officer
Mr. Phil Salkie, Managing Member, Jenariah Industrial Automation/TallyEngine
Telescopes. Monitoring systems. Scientific instruments. Centrifuges. Control systems. These SCADA and ICS systems are large, complex, essential, expensive, and too often running highly specialized software, outdated and vulnerable software, or both. Join ResearchSOCs special guests as they bring their unique perspectives to the challenge of securing these systems and learn proven strategies for improving the security of these types of systems.
View the recording
Download the NSF Summit ICS class notes
Download the presentation notes
How to use security exercises to mature an information security program
Learn to use a regular program of security exercises to probe your infrastructure, program, and incident response for weaknesses and opportunities, then use your home-court advantage to constantly and incrementally improve security posture rather than waiting for disaster to strike. Participants will learn key elements in writing a tabletop security exercise that can test their incident response plans with their home organization. There is no charge for this webinar.
About the presenter
Josh Drake is a senior security analyst with the Center for Applied Cybersecurity Research (CACR). He works on a couple different NSF-funded projects to mature information security programs. Josh has a 15-year background in network and systems administration.
View the recording
Download presentation slides
Download sample security exercises
Additional webinar resources
Our friends at Trusted CI, the National Science Foundation Cybersecurity Center of Excellence and ResearchSOC's sister organization, also host a series of valuable webinars. We encourage you to view this list of their upcoming webinars.