AKAdams

Andrew K. Adams

Phone: 1-412-268-5142
E-mail: akadams@psc.edu
Office: 300 S. Craig St., Room 361, Pittsburgh, PA, 15213
Google+ 

I'm a Senior Information Security Analyst within PSC’s Security Group, however, I'm presently funded through Trusted CI -- The NSF Cybersecurity Center of Excellence (formerly CTSC), supported by the National Science Foundation under Grant OAC-1547272, as well as the ResearchSOC (Grant OAC-1840034).  I hold M.S. degrees in both computer science and information science (U. Pittsburgh), and have 20+ years of experience in computer networking research as a previous member of PSC’s Networking Group, including operational responsibilities in the 3ROX GigaPoP.  While in PSC’s Security Group, I designed and developed multiple security oriented systems, performed risk assessments and developed security policies.  At present, my focus is in privacy and policy.

 

As a current member of Trusted CI, my skills in security policy and operations have been utilized in several Trusted CI engagements, including:

  • REED+: Led review of vision to facilitate CUI data protection across all of University of Purdue's cyberinfrastructure (Blog Posts)
  • PGC: Worked on developing a security program for them (Blog Posts)
  • SAGE2: Worked on exploring identify and access management solutions for them (Blog Posts)
  • Ike Wai gateway: Led review of EPSCoR's cyberinfrastructure through SGCI's Incubator consultations (Blog Post)
  • Cloud Security Best Practices: Led collaboration in producing "Security Best Practices for Academic Cloud Service Providers" (Blog Posts)
  • TransPAC: Led engagement to review their security program (Blog Post)
  • DesignSafe-CI: Led cybersecurity checkup of their cyberinfrastructure (Blog Posts)
  • DataONE: Worked on a review of their cyberinfrastructure (Blog Post)
  • OSCRP: Collaborated to develop a risk profile for open science (OSCRPBlog Post, Initial Blog Post)
  • USAP: Worked on in-depth review of their cyberinfrastructure (Blog Post)
  • HubZERO: Worked on developing a Master Information Security Policy and Procedures document and a Software Assurance and Testing Policy (Initial Blog Post)
  • IBEIS/Wildbook: Worked in exploring alternative identity management options (Blog Post)

Additionally, I lead Trusted CI's situational awareness group, Cyberinfrastructure Vulnerabilities (Blog Posts), and I'm an active member in both Trusted CI"s and PSC's Information Security program.

 

Recent Publications