• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • About Us
    • Governance
      • Steering Committee
      • Membership Committee
      • Technical Advisory Group
      • Microsoft Analysis Team
    • Sponsors & Partners
    • Report a Vulnerability
    • History
    • Diversity
    • Accessibility
    • Staff
  • Membership
    • New Members: Start Here
      • Nomination Process
      • SSO
      • Slack
    • Get Involved!
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Services
  • Assessments
    • Comprehensive General Assessments
    • Policy, Process, and Compliance Reviews
    • Penetration Testing
    • Kickstart Engagements
    • Tabletop Exercises
  • News
    • Resources for News Media
  • Events
    • Event Archive
  • Login
  • Report a Vulnerability
  • Contact Us

REN-ISAC

  • Home
  • About Us
  • Membership
  • Services
  • Assessments
  • News
  • Events
  • Search
  • Login
  • Report a Vulnerability
  • Contact Us
  • Home
  • Events
  • webinars
  • 2018
  • TechBurst: Feb 22, 2018

Providing Cybersecurity Support for Funded Research Projects

Thursday, February 22, 2018

12:00 PM – 1:00 PM

-


Slides:  Linked here
Recording:  Available

Q&A File:  Linked here

Audience:[1]: Public [Pb]

An experienced principal investigator talks about how campus cybersecurity staff can best support NSF (and other funded) researchers for needs that are in addition to baseline campus support. A survey of over 700 National Science Foundation funded principal investigators and their familiarity with cybersecurity was conducted - learn about the surprising responses.

Speaker:

Jill Gemmill; Clemson University

Jill has been bridging the gaps between campus IT and researcher throughout her career. She is currently Principal Investigator for an NSF-funded program "CICI Regional: SouthEast SciEntific Cybersecurity
for University Research (SouthEast SECURE)².

-------------------------------

[1] Information Sharing Guidance: TechBursts marked with "MG" are open to members and hosted trusted guests of members. Because access to MG TechBursts require authentication with a REN-ISAC userid and password, guests must view the webcast with the member present. One marked "Pb" are open to the public (link). Ones not marked with MG or Pb are available to members only.

  • Event Archive

REN-ISAC social media channels

  • Twitter
  • LinkedIn

Research & Education Networks Information Sharing & Analysis Center

Contact Us
2715 E. Tenth Street
Bloomington, IN 47408
812-856-0717
info@ren-isac.net

Member of the Indiana University Cybersecurity Community

24-Hour CSIRT Watch Desk
+1 317-274-7228
soc@ren-isac.net

Report a Vulnerability

Indiana University

Accessibility | College Scorecard | Privacy Notice | Copyright © 2025 The Trustees of Indiana University