Cybersecurity and Information Systems Digest

12 OCTOBER 21

Featured Technical Inquiry

Challenges in Applying the Law of Armed Conflict to Cyberwar

On June 17, 2010, a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1,000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency (IAEA) [1]. While the identity of the perpetrators […]

Learn More
Michael Williams

Voice From the Community

MIchael G. Williams

Lead Senior Security Engineer, Joint Environment Toolset (JET), Raytheon Intelligence & Space

I am a technical staff member subject matter expert with nearly 25 years of expertise in systems, network, and security life cycle engineering and architecture. As a senior security engineer, I have supported several large infrastructure and system engineering and deployment projects, including engineering, deploying, and implementing all the security tools for a new DoD facility and engineering and deploying several security tools for a DoD on-prem private cloud solution. My background is in management information systems, telecommunications, and information assurance. I am an expert with several security tools, security techniques, risk assessments, accreditation, compliance, and Internet of Things security. I hold a Ph.D. in computer engineering.

Featured News

New Online Tool to Improve Stakeholder Engagement with Security and Privacy Controls

NIST has improved the usability of their most downloaded NIST publication, Special Publication (SP) 800-53. NIST has now made it available in additional data formats (e.g., CSV, XML, OSCAL, and online) and has improved the overall accessibility of the document. In response to suggestions (and in the spirit of the NIST publication development principles), NIST has also developed a new online tool to allow stakeholders […]

Learn More

Recent News

NIST Releases 2020 Cybersecurity and Privacy Program Annual Report

NIST just released Special Publication (SP) 800-214, 2020 Cybersecurity and Privacy Program Annual Report, which details the Information Technology Laboratory (ITL) Cybersecurity and Privacy Program’s responses to numerous challenges and opportunities in security and privacy….

Franklin & House Colleagues Introduce Bipartisan Bill to Support American Businesses in the Creation of Global Standards for Artificial Intelligence

Rep. Scott Franklin (FL-15) today announced the introduction of legislation that will support small businesses with financial backing so they can participate in setting global standards for artificial intelligence (AI). Original co-sponsors of this bill…

New Method Accelerates AI Decision-Making

A new solution compresses and offloads critical data from battlefield machines more efficiently, enabling faster AI processing and decision-making on the battlefield. Researchers from the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army…

NSA, CISA Release Guidance on Selecting and Hardening Remote Access VPNs

The National Security Agency (NSA) and CISA have released the cybersecurity information sheet “Selecting and Hardening Standards-Based Remote Access VPN Solutions” to address the potential security risks associated with using virtual private networks (VPNs). Remote-access…

DoD Publishes Federal Register Notice for Input on Supply Chain Vulnerabilities and Opportunities

As part of the department’s one-year response to Executive Order (EO) 14017, America’s Supply Chains, the Department of Defense published a Federal Register Notice (FRN) soliciting comments from industry on key supply chain challenges and…

AFRL Updates Advanced Computing Tech BAA

On August 5, the U.S. Air Force Research Laboratory (AFRL) posted an updated broad agency announcement (BAA) for Advancing Computing Technology and Applications (BAA NUMBER: FA8750-19-S-7010). This announcement is for an Open, 2-Step BAA, which…

Want to be featured in our biweekly digest?

Submit your "Voice From the Community"

Upcoming Events

Space Cybersecurity Symposium II: Applied Cybersecurity for Space

The Department of Commerce (DOC) and the Department of Homeland Security (DHS) invite you to their second jointly hosted space cybersecurity symposium. This will be an applied cyber event, looking at cyber standards, the standards…

DoDIIS Worldwide

Join experts and innovators from across the U.S. Department of Defense, intelligence community, industry, and academia to share unique insights on this year’s conference theme:  Foresight 20/20:  Building a New Digital Ecosystem. This theme emphasizes…

I/ITSEC 2021

The annual Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) is the world’s largest modeling, simulation, and training event. It features peer-reviewed paper presentations, tutorials, special events, professional workshops, a commercial exhibit hall, a serious games…

Cybersecurity Symposium for Smart Cities 2021

This symposium will showcase success stories of California cities and communities that have maximized digital opportunities during the COVID-19 era. It will also discuss ways to digitally maximize the recent Infrastructure Bill.

MORS Emerging Techniques Forum

This year’s theme of “Digital Transformation” focuses on advances in computing tools, technologies, and techniques that revolutionize analysis at scale to enhance awareness and understanding, from strategic decisions to the tactical edge. This conference will…

(ISC)² 2021 Security Congress

The 2021 Security Congress is the first hybrid (ISC)² Security Congress. The purpose of this event is to help provide cybersecurity professionals with security best practices, processes, and procedures in combatting the latest cybersecurity challenges….

IEEE Secure Development Conference

SecDev is a venue for presenting ideas, research, and experience about how to develop secure systems. It focuses on theory, techniques, and tools to “build security in” to existing and new computing systems, not just…