CYBERSECURITY

& Information Systems Digest

2 JULY 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DoD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful
colors fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to view and download the latest chart.

FEATURED ARTICLE

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure,…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum computer attacks. In this webinar, a novel quantum protocol addressing security and privacy issues in the current network environment will…

Read More...

UPCOMING EVENTS

ITEN Wired | TechNet CyberCoast Conference

Join us October 16-18, 2024 in beautiful Pensacola Beach, Florida for an event celebrating the southeast tech community. ITEN (innovation, technology, entrepreneurship, and network) WIRED |TechNet CyberCoast is the tech conference to connect, collaborate, and…

National Summit on Military Training, Modeling, & Simulation

Synthetic environments, integrating cutting-edge technologies such as virtual reality, augmented reality, mixed reality, and artificial intelligence, are reshaping traditional training methodologies, and offering a vital means to enhance readiness and resilience among military personnel. Against…

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 Department of Defense Intelligence Information System Worldwide Conference

The Defense Intelligence Agency (DIA) Chief Information Office (CIO) is excited to welcome participants to the 2024 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference at the Omaha Convention Center in Omaha, Nebraska, from…

2024 Defense Logistics & Support Conference

With the expertise of thought leaders from the US Department of Defense, industry, academia and allied nations, this conference dives deeper into contested logistics, assessing current challenges and strategies. The discussions will encompass technology shaping…

Voice From the Community

chuckrogal
Chuck Rogal

BS Geology, University of Pittsburgh at Bradford MS Computer Science, SUNY-Binghamton

Chuck Rogal’s career path has been crooked. He began working in 1985 at Teledyne Brown Engineering. He worked on a communications upgrade for the Cheyenne Mountain Complex as an Independent Validation & Verification (IV&V) Engineer. This initial role provided a good look at the DOD acquisition process. The role also included work on some early warning radar programs. He then took on a Systems Engineering challenge by writing documents (Descriptions and an ICD) for the same program. A move into Software Engineering afforded him to design a model and teach others about programming in Ada. After some time, he became a Program Manager for an enterprise network design and installation at the Office of Naval Intelligence at Suitland, MD. He then moved to a start-up for the commercial telecom industry. From there, he returned back to Software Engineering writing code for an optical simulation. That work led back to doing commercial software development. The dot.com disaster in 2001 led to returning to DOD work as a Systems Engineer. He then moved back to Software Engineering at the same company which after several years culminated in a Software Architect position. A better opportunity came along so he moved on to a Systems Engineering role for an airborne optical application. He retired from that position in 2020. Since then, he has been a consulting MBSE Architect on two programs.

Want to be featured in our Digest?

Submit your "Voice From the Community"