CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead &…

Learn More

UPCOMING WEBINAR

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most…

Read More...
A padlock on a monitor with 0s and 1s surrounding it.

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware. Added to this complex mix are the opportunities afforded by artificial intelligence,…

Read More...

The Digital Ecosystem and Project Linchpin

This webinar will provide a Project Linchpin Overview – How we got here, who we are, what’s missing, and what we are doing.  The goal of Project Linchpin is to deliver trusted AI/ML (artificial intelligence/machine learning) capabilities to Program Executive Office (PEO) Intelligence, Electronic Warfare & Sensors (IEW&S) programs.  As a pre-program activity, the mission…

Read More...
Soldier points while detection equipment is mounted on their back.

The 92nd Military Operations Research Symposium

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the an opportunity for the national security community to exchange information, examine research and discuss critical national security topics. Held in notable locations, the Symposium gathers over 800 Operations Research (OR) professionals from military, government, industry and academic ranks to share best…

Read More...

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, Maryland on Thursday, May 16th, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks during the event: Cyber Operations Readiness & Experiences (CORE), New Emerging Research & Development (NERD), and Growing Innovations in Tech…

Read More...

What is known about automated extraction of data and metadata from hand-written lab notebooks?

Read More...

What databases have geometry files for blue and red force aircraft and ground vehicle models in OBJ, 3DS, STL, or other formats?

Read More...

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Read More...
USSF

Airmen, Guardians Can Influence How Leaders Share Information Through Latest WAGGI Survey

WASHINGTON (AFNS) —  The U.S. Department of the Air Force will soon release the latest iteration of the “Where Airmen and Guardians Get Information” (WAGGI) survey to thousands of Airmen and Guardians. The survey, paired with focus groups later this year, gives Airmen, Guardians, and Department civilians a chance to tell senior leaders what kinds…

Read More...

Understanding and Responding to Distributed Denial-of-Service Attacks

This joint guide, Understanding and Responding to Distributed Denial-of-Service (DDoS) Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: Volumetric – attacks aiming to consume available bandwidth. Protocol – attacks which exploit vulnerabilities in network protocols….

Read More...

UPCOMING EVENTS

GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

23rd Annual Bio IT World Conference & Expo

The Bio-IT World Conference & Expo event showcases the technologies and analytic approaches that solve problems, accelerate science, and drive the future of precision medicine. The event unites a community of life sciences, pharmaceutical, clinical,…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"