CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead &…

Learn More

UPCOMING WEBINAR

What is the effect of collaborative gaming on team building, cohesion, and culture?

Read More...

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events as well as hands-on-keyboard events?

Read More...

Can use cases of intent-based networking (IBN) in U.S. Department of Defense tactical networks be provided?

Read More...

Can open standards applicable to zero trust implementation be provided?

Read More...

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies: (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development in the U.S. Department of Defense (DoD) since the late 1960s, it has continued to see major advancements in recent…

Read More...
image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood and can be mitigated early in design. As artificial intelligence (AI) and autonomous products are incorporated in military systems, mission…

Read More...

Serving the Digital Entrée

Last fall, the Army Acquisition Workforce (AAW) was introduced to the digital foundations pathway with Udemy—three online courses designed to digitally upskill workforce members in preparation for the digital transformation of the Army. (See “Serving the Digital Soup” in the Fall 2023 issue of Army AL&T.) The Army Director of Acquisition Career Management (DACM) Office spent…

Read More...

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure,…

Read More...

DoD Releases Online Cyber Resilient Weapon Systems Body of Knowledge Version 4.1 for Engineering Workforce

The U.S. Department of Defense released Version 4.1 of the Cyber Resilient Weapon Systems (CRWS) Body of Knowledge (BoK) on May 29. This free online resource assists public- and private-sector workforces in designing, engineering, and safeguarding CRWS. The Office of the Under Secretary of Defense’s System Security (SysSec) Office launched this resource for the system…

Read More...

U.S. Department of the Air Force Launches NIPRGPT

ARLINGTON, Va. (AFNS) —  As part of its ongoing modernization efforts, the U.S. Department of the Air Force (DAF) chief information officer, in partnership with the Air Force Research Laboratory, is accelerating initiatives to provide guardians, airmen, civilian employees, and contractors the ability to responsibly experiment with generative artificial intelligence (GenAI), with adequate safeguards in…

Read More...

UPCOMING EVENTS

2024 Cybersecurity and Technology Innovation Conference

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"