• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • About Us
    • 20th Anniversary
    • Governance
      • Steering Committee
      • Membership Committee
      • Technical Advisory Group
      • Microsoft Analysis Team
    • Contributors
    • Member List
    • Sponsors & Partners
    • Report a Vulnerability
    • Diversity
    • Accessibility
    • Staff
  • Membership
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Public Resources
    • Alerts & Advisories
    • HigherEd Incident Response
    • Vendor Assessment Toolkit
    • Cybersecurity Assessment Service
    • Cybersecurity Training
    • Workshops
    • More Resources
  • Member Resources
    • New Members: Start Here
    • The Hub
      • Hub FAQ
    • Get Involved!
    • SES Intelligence Feeds
      • SESv4 Data Summary
    • Daily Watch Report
    • Passive DNS
    • RIMM
  • News
    • Resources for News Media
  • Events
    • Event Archive
  • Login
  • Report a Vulnerability
  • Contact Us

REN-ISAC

  • Home
  • About Us
  • Membership
  • Public Resources
  • Member Resources
  • News
  • Events
  • Search
  • Login
  • Report a Vulnerability
  • Contact Us
  • Home
  • Events
  • February
  • TechBurst: Feb 22, 2018

Providing Cybersecurity Support for Funded Research Projects

Thursday, February 22, 2018

12:00 PM – 1:00 PM

-


Slides:  Linked here
Recording:  Available

Q&A File:  Linked here

Audience:[1]: Public [Pb]

An experienced principal investigator talks about how campus cybersecurity staff can best support NSF (and other funded) researchers for needs that are in addition to baseline campus support. A survey of over 700 National Science Foundation funded principal investigators and their familiarity with cybersecurity was conducted - learn about the surprising responses.

Speaker:

Jill Gemmill; Clemson University

Jill has been bridging the gaps between campus IT and researcher throughout her career. She is currently Principal Investigator for an NSF-funded program "CICI Regional: SouthEast SciEntific Cybersecurity
for University Research (SouthEast SECURE)².

-------------------------------

[1] Information Sharing Guidance: TechBursts marked with "MG" are open to members and hosted trusted guests of members. Because access to MG TechBursts require authentication with a REN-ISAC userid and password, guests must view the webcast with the member present. One marked "Pb" are open to the public (link). Ones not marked with MG or Pb are available to members only.

  • Event Archive

REN-ISAC social media channels

  • Twitter
  • LinkedIn

Research & Education Networks Information Sharing & Analysis Center

Contact Us
2715 E. Tenth Street
Bloomington, IN 47408
812-856-0717
info@ren-isac.net

Member of the Indiana University Cybersecurity Community

24-Hour CSIRT Watch Desk
+1 317-274-7228
soc@ren-isac.net

Report a Vulnerability

Indiana University

Accessibility | Privacy Notice | Copyright © 2023 The Trustees of Indiana University