Critical Infrastructure Linkage and Dependency Modeling for Homeland Defense
What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?
Upcoming Scheduled Maintenance: Thursday, May 19, 2022, at 20:00 (9:00 PM) EDT until Thursday, May 19, 2022, at 21:00 (10:00 PM) EDT. For urgent requests during this period, including technical inquiries and other account-related features, please send an email to contact@csiac.org.
Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?
Relating to requirement 3.10 in NIST 800-171r1, is it sufficient to have an audit log of physical access with entry events but not exit events?
How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?
Driven by the rapidly changing space segment, satellite ground networks are in the midst of evolutionary change called the digital transformation. The digital transformation will enable the satellite communications (SATCOM) to realize benefits in speed…
A new class of technology promises to combine the security of an “air gap” with the connectivity needed to efficiently manage both modern and legacy operational technology (OT) systems. In September 2021, the Department of…
Most cybersecurity professionals acknowledge that achieving perfect security is impossible. Yet, they nobly strive for perfection as the ultimate goal and feel loss, failure, and regret when incidents inevitably occur. Human instinct, especially in reaction…
Now in its 25th year, Black Hat USA’s annual conference will be a hybrid experience, offering the cybersecurity community a choice in how they wish to participate. Black Hat USA 2022 will open with four…
This event is designed specifically for Chief Information Security Officers and other high level cyber professionals. Attendance is limited to invitation-only, though the invitations may be requested from the website. The theme for the D.C….
Join industry leaders as they provide best practices and solutions in overcoming automotive cybersecurity pain points with presentations centered on countering zero-day vulnerabilities, utilizing and securing OTA updates, methods to achieving time & cost-effective vulnerability…