Technical Research and Analysis Services

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is a component of the U.S. Department of Defense’s Information Analysis Center (IAC) enterprise.

What We Do

As a DoD IAC, we provide a number of resources and services to help you in your research and provide you with focused expert assistance and unbiased scientific and technical information.

Stay up-to-date with our digest

Receive a digest of the latest in cybersecurity and information systems straight to your inbox

Recent Inquiries

Security-Conscious Password Behavior From the End-User’s Perspective

How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

What are the major requirements of the Cybersecurity Maturity Model Certification for DoD contractors and subcontractors?

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

What is the industry standard for performing a privacy impact assessment?

The DoD Cybersecurity Policy Chart

Captures the tremendous breadth of applicable cybersecurity policies in a helpful organizational scheme

Articles

DARPA Joins Public-Private Partnership to Address Challenges Facing Microelectronics Advancement

DARPA announced its participation in a new long-term university research collaboration with the Semiconductor Research Corporation (SRC) and a consortium of companies in the commercial semiconductor industry and the defense industrial base called the “Joint…

National Cyber Director Unveils New Approach at Cyber War College Conference

After almost two years of operating within the COVID-19 environment, Cassandra C. Lewis knew it was time that her organization’s annual flagship conference focus on the enduring impacts of the pandemic. Lewis leads the University’s…

DARPA Open Sources Resources to Aid Evaluation of Adversarial AI Defenses

There are many inherent weaknesses that underlie existing machine-learning (ML) models, opening the technology up to spoofing, corruption, and other forms of deception. Attacks on artificial intelligence (AI) algorithms could result in a range of…

Ready to submit a technical inquiry?

Receive free information research on technical topics