Q: How can we get the videos? A: Answered in video (they are not available yet, as they need some changes) Q: Is there an event where the various recipients of NSF Cybersecurity grants meet to discuss the research? A: Answered in video A: Attendee answer: trustedci.org/summit/ Q: Do you see that researchers will interface with Institutional Cybersecurity staff to work on projects? What is that relationship like? A: Answered in video Q: How important is a Protected Research Data Network in NSF-funded projects? Are there any current requirements? A: Answered in video A: Additional answers provided by attendees: - https://fasterdata.es.net/science-dmz/science-dmz-security/ - Here is a way to do security in high speed science networks: - https://www.cspi.com/wp-content/uploads/2016/09/Berkeley-100GIntrusionDetection.pdf - https://www.internet2.edu/presentations/spring10/20100428-BroCluste-Mellander.pdf