Important information about NSF’s implementation of the revised 2 CFR

NSF Financial Assistance awards (grants and cooperative agreements) made on or after October 1, 2024, will be subject to the applicable set of award conditions, dated October 1, 2024, available on the NSF website. These terms and conditions are consistent with the revised guidance specified in the OMB Guidance for Federal Financial Assistance published in the Federal Register on April 22, 2024.

Important information for proposers

All proposals must be submitted in accordance with the requirements specified in this funding opportunity and in the NSF Proposal & Award Policies & Procedures Guide (PAPPG) that is in effect for the relevant due date to which the proposal is being submitted. It is the responsibility of the proposer to ensure that the proposal meets these requirements. Submitting a proposal prior to a specified deadline does not negate this requirement.

Archived document

This document has been archived.
Dear Colleague Letter

Trustworthy Computing


The lack of real-world data has hampered many cybersecurity researchers, making it difficult to tune algorithms and validate results. This letter is to let you know that new data resources are becoming available and to encourage you to take advantage of them in your research.

NSF's Trustworthy Computing program recently convened an invitational workshop on Cyber Security Data for Experimentation with the collaboration of the Department of Homeland Security (DHS), the Office of Naval Research, the Treasury Department, as well as other agencies. The workshop goal was to find new ways for industrial partners to exchange data with academic researchers. Access to data in DHS's PREDICT repository was also discussed. Academic, industry, and government participants engaged in spirited discussion and developed a deeper understanding of the issues involved in gaining access to industrial data sources and sharing research results based on those data.

Slides, videos of talks, and notes from the workshop can be found at the workshop website http://www.gtisc.gatech.edu/nsf_workshop10. One positive outcome of the workshop was the offer from some companies to work with researchers to provide access to their data. The workshop website has links to brief descriptions of what each company is willing to consider and how to contact someone for details.

I invite you to make use of these resources. If you could make use of such data for a currently-funded NSF grant, then I encourage you to apply for a supplement under normal NSF procedures to support your use of these resources.

Many thanks to Professor Nick Feamster of Georgia Tech for his role in organizing the workshop and the website.

Sincerely,

Keith A. Marzullo
Division Director, CISE/CNS

PROGRAM OFFICER CONTACT INFORMATION

Trustworthy Computing Contact: Carl Landwehr (clandweh@nsf.gov)