Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these…

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

In response to the repeated attacks on the U.S. Department of Defense (DoD) supply chain, the release of the Cybersecurity Maturity Model Certification (CMMC) introduces a verification mechanism that will ensure the necessary security mechanisms…

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

A privacy impact assessment (PIA) is an essential element for effective privacy by design. It enables privacy leaders to be assured that the privacy controls implementation satisfies regulations and organizational requirements and is key to…

Webinars

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA)…

Cyber Resilient Weapon Systems Body of Knowledge (CRWS-BoK)

The Resilient Systems (RS) Directorate in the Strategic Technology Protection and Exploitation Office, under the Office of the Under Secretary of Defense for Research and Engineering, launched the Cyber Resilient Weapons Systems Body of Knowledge…

What is Digital Twin Technology All About, Anyway?

A Digital Twin (DT) is a real-time, virtual representation (a digital equivalent) of real-world objects such as devices, systems, places, business processes, and people. The core ideas surrounding DT use have been in existence for…

Events

DVIDS

25th Colloquium: Challenges in Teaching Cybersecurity

As the senior and premier conference on cybersecurity education, the 25th year of the Cybersecurity Colloquium will feature representatives from education, industry, and government interested in conducting productive conversations, presenting new ideas, and improving the…

Critical Infrastructure Security Summit

Cyber attacks can costs Americans billions of dollars each year. With the increase of external attacks, American industry is at risk of shutting down. While such blackouts might only be temporary, losing these capabilities for…

DoDIIS Worldwide

Join experts and innovators from across the U.S. Department of Defense, intelligence community, industry, and academia to share unique insights on this year’s conference theme:  Foresight 20/20:  Building a New Digital Ecosystem. This theme emphasizes…