Andrew Adams

Principal Information Security Officer

akadams@psc.edu

412-268-4960

I’m PSC’s Principal Information Security Officer and Security Manager for Bridges.  However, I’m predominantly funded through Trusted CI — The NSF Cybersecurity Center of Excellence (formerly CTSC), supported by the National Science Foundation under Grant OAC-1547272, as well as the ResearchSOC (Grant OAC-1840034).  I hold M.S. degrees in both computer science and information science (U. Pittsburgh), and have 20+ years of experience in computer networking research as a previous member of PSC’s Networking Group, including operational responsibilities in the 3ROX GigaPoP.  As a member of PSC’s Security Group, I designed and developed multiple security oriented systems, performed risk assessments and developed security policies.  At present, my focus is in privacy and policy.

 

As a current member of Trusted CI, my skills in security policy and operations have been utilized in several Trusted CI engagements, including:

  • SLATE: Worked on review of their architecture (Blog Posts)
  • USARF: Worked on review of their fleet (Blog Posts)
  • REED+: Led review of vision to facilitate CUI data protection covering Purdue University’s cyberinfrastructure (Blog Posts)
  • PGC: Worked on developing a security program for them (Blog Posts)
  • SAGE2: Worked on exploring identify and access management solutions for them (Blog Posts)
  • Ike Wai gateway: Led review of EPSCoR‘s cyberinfrastructure through SGCI‘s Incubator consultations (Blog Post)
  • Cloud Security Best Practices: Led collaboration in producing “Security Best Practices for Academic Cloud Service Providers” (Blog Posts)
  • TransPAC: Led engagement to review their security program (Blog Post)
  • DesignSafe-CI: Led cybersecurity checkup of their cyberinfrastructure (Blog Posts)
  • DataONE: Worked on a review of their cyberinfrastructure (Blog Post)
  • OSCRP: Collaborated to develop a risk profile for open science “OSCRP” (Blog Posts)
  • USAP: Worked on in-depth review of their cyberinfrastructure (Blog Post)
  • HubZERO: Worked on developing a Master Information Security Policy and Procedures document and a Software Assurance and Testing Policy (Blog Post)
  • IBEIS/Wildbook: Worked in exploring alternative identity management options (Blog Post)

Additionally, I lead Trusted CI’s situational awareness group, Cyberinfrastructure Vulnerabilities (Blog Posts), and I’m an active member in REN-ISAC, and both Trusted CI”s and PSC’s Information Security program.

 

Recent Publications