Securing Scientific Cyberinfrastructure: The ResearchSOC

Indiana University

An on-demand video of the National Science Foundation Cybersecurity Center of Excellence (Trusted CI) webinar “Securing Scientific Cyber Infrastructure: The ResearchSOC” is now available on the Trusted CI website.  The video can be viewed here and the presentation downloaded using this link. The research and education (R&E) community faces particular challenges regarding cybersecurity: diversity of size and autonomy, the use of diverse infrastructure (scientific instruments, sensor networks, sequencers, etc.), the highly collaborative and dynamic nature of scientific communities, and the specialized expertise needed to support cybersecurity in the research context.
Watch Now

Spotlight

How Cyber Insurance Can Be a Lifeline in Today’s Evolving Threat Landscape In this guide, you'll learn: How cyber insurance works, How you can qualify for cyber insurance, Which requirements may affect your rate, What insurers look for when evaluating an organization, How an evolving threat landscape can bring new challenges to

OTHER ON-DEMAND WEBINARS

Smartphones are the New Seatbelt: Turn Safety Into A Profit Center in 2019

Zendrive

Vehicles are safer than they were 30 years ago. Drivers, on the other hand, are becoming less safe. Despite the improvements in vehicle safety and protection, road deaths are still the largest killer of young males globally. Largely, in part, because drivers are becoming more and more distracted by smartphones.
Watch Now

Open-Source Software Supply Chain Security and Management

We know there will be more attacks like those on Solarwinds, Log4J, and Kaseya, and more compromises of open-source components like Apache Struts and OpenSSL. Software supply chain threats – both the malicious attackers and the accidents waiting to happen -- are now a fact of life. How can IT leaders stay ahead of them? How can CIOs empower their developers without creating new vulnerabilities, fix critical bugs in code the business might not even know is running, and remain both secure and productive?
Watch Now

Secure multi-cluster and multi-tenant cloud native applications with Mirantis and Tetrate.

Container and Kubernetes adoption at enterprises have skyrocketed as part of the emergence of cloud-native technologies. Typically, enterprises will have multiple Kubernetes clusters to avoid service outages and to manage security issues and other concerns. As the number of microservices and mesh deployments grows, we need a tool to manage traffic between services efficiently.
Watch Now

Bridging the Gap Between Legacy and Multicloud

IT Organisations are struggling with their ability to transition to the cloud to drive innovation and improve customer engagement while supporting mission critical legacy applications. But the key to unlocking value lies in the ability to integrate and optimise services, operations and management across both legacy and cloud env
Watch Now

Spotlight

How Cyber Insurance Can Be a Lifeline in Today’s Evolving Threat Landscape In this guide, you'll learn: How cyber insurance works, How you can qualify for cyber insurance, Which requirements may affect your rate, What insurers look for when evaluating an organization, How an evolving threat landscape can bring new challenges to

resources