Big Data Summit V – Click for Detailed Schedule

May 31, 2017:   1-5PM
Admission:  Free

This is the fifth annual Big Data Summit that is co-sponsored by the Great Plains Network and the Greater Western Library Alliance. Cliff Lynch of the Coalition for Networked Information will be the keynote speaker. John Towns of XSEDE will be the  closing speaker. There will be a Developing Data Personas Workshop as well.

Developing Data Personas Workshop – During the Big Data Summit

This workshop will guide small groups through the creation of a datapersona, an adaptable tool that can be used for critical-thinking and troubleshooting of common, or not so common, research data problems. From the grad student who lost their USB drive, to a researcher running a multi-million dollar grant project, data personas can address research and data needs of all levels and help workshop participants understand, and communicate, how the data lifecycle is involved in all aspects of the research process.

This workshop will be valuable to research librarians, network IT and HPC staff as well as others who are likely to engage researchers to try to understand their research data needs.

Participants will be asked to draw on personal and professional knowledge of all kinds. No experience is necessary and creativity is encouraged.

Annual Meeting – Click for Detailed Schedule

May 31, 2017:  Gala Reception at 5:30 PM
June 1, 2017:  8:30 – 5PM
June 2, 2017:  8:30 – Noon
Admission:  Admission includes one ticket to the Gala Reception

The Annual Meeting features regional and national cyberinfrastructure and research data management experts.  In addition to invited speakers there are a range of activities and affinity group meetings.

CIO Forum

June 1, 2017:  10 – 4PM
Admission:   Annual Meeting Admission Required – For CIOs from GPN member institutions or their designees, only


June 1, 2017:   1:30 – 4:30 PM
Admission:  Free

There are many actions researchers can take to increase the openness and reproducibility of their work. Please join us for a workshop, hosted by the Center for Open Science, to learn easy, practical steps researchers can take to increase the reproducibility of their work. The workshop will be hands-on. Using example studies, attendees will actively participate in creating a reproducible project from start to finish.

Topics covered:

This workshop is being presented by the Center for Open Science.


June 2, 2017:  8:30 – 4:30 PM
Admission:   Annual Meeting Admission Required

Computer Incident Response (morning session). Computer Incident Response is a required capability for any project or activity that is running internet connected services. The overall goal of this portion of the workshop is to provide basic information on setting up an incident response program and preparing your project team or organization for an incident investigation. Part one will focus on identifying the processes, policies, information, and monitoring services that are required to effectively respond to a security incident as well as on investigation and analysis tools that might be useful for investigations. Part two will identify a series of questions the incident response team can use to guide them through both the investigation and the mitigation process. The participant should leave the session with an understanding of the basic steps needed to create an incident response program and what to do when an incident occurs. Warren Raquel is a Senior Security Engineer at the National Center for Supercomputing Applications and will be presenting the Computer Incident Response portion of the workshop.


Log Analysis (afternoon session). The goal of security log analysis is to more efficiently leverage log collection in order to identify threats and anomalies in their cyberinfrastructure. This portion of the workshop will help attendees tie various log and data sources together to provide a more rounded, coherent picture of a potential security event. It will also help attendees understand log analysis as a life cycle (Collection, Event Management, Analysis, Response) that contributes to a security team’s effectiveness. Interactive demonstrations will cover both automated and manual analysis using multiple log sources (network protocols, files, software, intel, etc.), with examples from real security incidents. Lastly, the training will cover how to use lessons learned during each cycle to tune the monitoring and analysis workflow to improve an organization’s operational security footing over time. Mark Krenz is a Lead Security Analyst for the Center for Applied Cybersecurity Research and will be presenting the Log Analysis portion of the workshop.


The CTSC is the National Science Foundation Cybersecurity Center of Excellence.   CTSC draws on expertise from multiple internationally recognized institutions to collaborate with NSF-funded research organizations, focusing on addressing the unique cybersecurity challenges faced by such entities. NCSA ( the National Center for Supercomputing Applications) is located at the University of Illinois Champaign-Urbana.