Request edit access
CTSC Engagement Application
Please complete all items and submit your application. If you have questions about this form or CTSC engagement processes, please see http://trustedci.org/application.

Do NOT put sensitive information of any kind into this form. If you have any questions about this form, contact info@trustedci.org.

Project or Facility Information
1. Project or facility name *
Your answer
2. Provide the source of funding (NSF directorate(s) or other) with award numbers. *
Your answer
3. Provide a brief description of your project or facility.
Your answer
4. Where is your project or facility in its funding lifecycle? *
Required
5. Contact Name *
Your answer
6. Contact Title / Role *
Your answer
7. Contact Email *
Your answer
8. At what level of project or facility management/leadership is this application supported?
Your answer
9. How many full-time equivalent (FTE) staff work for your project or facility? *
10. Does your project or facility employ personnel who focus on IT? If so, how many? *
Your answer
11. Does your project or facility have an information security officer or other similar role? Please describe. *
Your answer
12. Does your project or facility have a dedicated budget for information security?
13. Please provide a brief description of the current state of your information security program. *
Your answer
Application-Specific Information
14. When would you like to engage? Are there important dates or deadlines, or are you flexible? *
Your answer
15. Do you request an expedited review? Under limited circumstances, CTSC may undertake an expedited review. If yes, please provide an explanation. (Requests for expedited review without explanation will not be considered.) *
Your answer
16. Have you had any prior collaborations with CTSC (e.g., prior engagements)? Please describe. *
Your answer
17. How did you hear about CTSC? *
Your answer
18. What types of engagements are of interest? (Check all that apply.) *
Required
Addressing CTSC Application Criteria
19. NEED. How will this engagement impact the applicant and ultimately impact NSF science? (Note: Many NSF projects and facilities have institutional or other readily available cybersecurity resources. To clearly demonstrate the need for CTSC assistance, applicants are encouraged to provide context on the availability and utilization of these other resources.) [500 word limit]
Your answer
20. BROADER IMPACT. Is this engagement likely to produce broader impacts (e.g., public reports, tools, narratives, or other deliverables that will positively impact the science community beyond the engagee)? What other communities, organizations, or projects will benefit directly or indirectly from this engagement? (Note: To foster broader impact, submissions on behalf of multiple projects or communities are encouraged, as are those that collaborate with institutional or other information security teams.) [500 word limit]
Your answer
21. APPLICANT COMMITMENT. CTSC’s engagements are inherently collaborative and always require significant effort on the part of the engagee. Does the applicant have the appropriate managerial support, time, and resources to collaborate on the engagement and follow through with resulting recommendations? [500 word limit]
Your answer
22. Is there anything else that would assist CTSC in considering this application? If so, please use the space provided. [500 word limit]
Your answer
Submit
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Additional Terms