1 of 5

Research Cybersecurity: What’s Next, What Now

Michael Corn

CISO, UC San Diego

mcorn@ucsd.edu

2 of 5

What’s next

What now

3 of 5

National Security Presidential Memo 33

    • Implementation in public comment period, should land late ‘23 or early ‘24
    • Requires 14 basic cybersecurity controls for all projects

Provide regular cybersecurity awareness training*

Identify information system users, processes acting on behalf of users, or devices.

Provide protection from malicious code

Limit information system access to authorized users

Update malicious code protection mechanisms

Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

Perform periodic scans of the information system and real-time scans of files

Authenticate (or verify) the identities of those users

Provide protection of scientific data from ransomware*

Control any non-public information posted or processed on publicly accessible information systems.

Verify and control/limit connections to and use of external information systems

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

Monitor, control, and protect organizational communications,

Identify, report, and correct information and information system flaws in a timely manner.

What’s Next

UCSD Implementation: https://bit.ly/RCI-NSPM33

4 of 5

NSF Cyber Initiative

What Now?

Note recommendation 5:

Recommendation: NSF and the major facilities must be adequately resourced for their cyberinfrastructure and cybersecurity needs. What is appropriate will depend on each facility's unique characteristics and specific needs. The cybersecurity budget should be commensurate with perceived risk of an event, which may be unrelated to the cost of constructing or operating the facility.��NSF response: NSF will work with each awardee to develop a cybersecurity risk register for each major facility and will then integrate those risk registers in order to determine the highest NSF risks and implement any needed mitigations.

5 of 5

What constitutes a risk register?

What Now?

  • Do not focus on ‘classical’ cyber risks
  • Do focus on risks specific to your project, domain, or data
  • Do identify possible mitigations for those risks
  • Do assign responsibilities for those mitigations
  • Do assign a timeline for mitigations