1 / 3

Developing a Comprehensive GENI Cyber Security Program 

This project aims to establish a robust operational security program for the GENI initiative, focusing on policies and procedures that support incident response in a federated environment. Led by Von Welch and Adam Slagell from NCSA, this endeavor is grounded in extensive experience with scientific research security. Key tasks include formal risk analysis and stakeholder engagement to identify assets, actors, and use cases. The project's successful implementation will enhance the overall security posture of GENI and ensure effective response to potential threats.

len
Télécharger la présentation

Developing a Comprehensive GENI Cyber Security Program 

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Developing a Comprehensive GENICyber Security Program  • Von Welch, vwelch@ncsa.illinois.edu • PI, 4% • Adam Slagell, slagell@illinois.edu • Co-PI, 25% • NCSA has a lot of experience supporting operational security for scientific research • NCSA, Open Science Grid, TeraGrid, Blue Waters • Start date: Now, GEC 6 is our kick-off. GENI Operational Security Overview

  2. Overview of our work • Major goal: Develop an operational security program • Includes the policies, procedures to support incident response in federated environment • A major part of this is formal Risk Analysis • Like the rest of GENI, we are operating in spirals GENI Operational Security Overview

  3. Getting started • We need to under stand assets, actors, and use cases before addressing threats • First milestone is identifying stakeholders and use cases • We have indentified some existing use cases in GENI overview docs • Please, if you have any thoughts on missing use cases, talk with us. GENI Operational Security Overview

More Related