Page tree
Skip to end of metadata
Go to start of metadata

The WISE Community will meet for a half-day session at the NSF Cybersecurity Summit 2019 in San Diego, California, USA on Tuesday 15th October!  I am sorry to report that we are not able to offer remote participation.

Please join the community mail list (see below).

Session Description:

About WISE:

The WISE (Wise Information Security for collaborating E-infrastructures) community was born as the result of a first workshop in October 2015. It was agreed then that collaboration and trust is the key to successful information security in the world of federated digital infrastructures for research. WISE is an international community with participants spanning North America, Europe, Asia and Australia.

WISE provides a trusted global environment where security experts from general and research domain-specific Infrastructures can share information on topics such as risk management, experiences about certification processes and threat intelligence. With participants from e-Infrastructures such as EGI, EUDAT, GEANT, EOSC-hub, PRACE, XSEDE, OSG, NRENs and more, the main aim of WISE is to promote best practice in Information Security by developing trust frameworks, template policies and guidelines for e-Infrastructures.

The actual work of WISE is performed in focussed working groups, each tackling different aspects of collaborative security and trust. While many of the working group activities are performed by conference calls and e-mail, experience has shown that we can make very good progress by holding face to face WISE events. These events are held at least twice a year. We have already met once in 2019 in Europe, joint with SIG-ISM, in Kaunas, Lithuania, in April, and we are very grateful to the programme committee and organisers for this WISE training/workshop at the NSF Cybersecurity summit as a second event in 2019, this time in North America.

WISE and Trusted CI

WISE and Trusted CI have agreed a joint statement of collaboration: Trusted CI and WISE share a common goal to support the research mission through the development of appropriate cybersecurity practices. Through close collaboration, the groups will ensure that cybersecurity frameworks, templates, and policies for our international infrastructures for research will grow increasingly aligned and interoperable.”

Target Audience:

We invite security representatives from E-Infrastructures and Large-Scale NSF facilities to participate. This includes operational security individuals and policy makers. The training will take the form of management/planning/brainstorming sessions, to assist the WISE working groups in the production of new template policies and best-practice documents.

Agenda (Tuesday, 15 October 2019):

Oops, it seems that you need to place a table or a macro generating a table within the Table Filter macro.

The table is being loaded. Please wait for a bit ...

Time

Item

Description

09:00 PDT

Welcome and Introduction to WISE (David Kelsey)
[Slides]

Introductions. What is WISE all about? What are we working on? The agenda today.

09:10

The Security Communications Challenge Coordination Working Group - joint with GEANT SIG-ISM
(Sigita Jurkynaite)

Slides


10:00Operational security and sharing threat intelligence - part 1 (Romain Wartel)
10:30Coffee
11:00Operational security and sharing threat intelligence - part 2 (Romain Wartel)

11:15

Security for Collaborating Infrastructures - the WISE SCI working group.

* (30mins) WLCG SLATE WG Charter review and survey of concerns (Rob Gardner and Romain Wartel)

Slides
* (30mins) Review of 5 core SLATE "workflows" (Chris Weaver )
* (20mins) Status update on SLATE security policies (Chris Weaver)

Slides
* (10mins) Discuss container image security scanning tools (Jim Basney) [slides]


Trust and policy issues for Edge Services, in particular the SLATE federated operation of science platforms. see https://slateci.io/


Desirable outcomes of this topic (during or after the event):

1. Feedback from WISE on prioritization among the various security policies
2. Feedback from WISE on the workflow risk assessments
3. Input from WISE on any experiences using container image security scanning tools

12:45Wrap-up and next steps (David Kelsey)
13:00Lunch

Meeting glossary:

Resources:


  • No labels