CYBERSECURITY

& Information Systems Digest

17 MAY 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

CISA Releases Secure Cloud Business Applications (SCuBA) Guidance Documents for Public Comment

CISA has released draft versions of two guidance documents—along with a request for comment (RFC)—that are a part of the recently launched Secure Cloud Business Applications (SCuBA) project: SCuBA Technical Reference Architecture (TRA) Extensible Visibility Reference Framework (eVRF) Program Guidebook The public comment period for the RFC guidance documents closes on May 19, 2022.

Read More...

Featured Notable Technical Inquiry

Commercially Available Firewalls

This report provides an index of firewall tools as of May 2, 2011. It summarizes pertinent information and provides users with a brief description of available firewall tools and contact information. The written descriptions are based solely on vendors’ claims and intended only to highlight the capabilities and features of over 60 firewall products. Sources of available product evaluations are also identified.

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Evaluating the Resiliency of Artificial Intelligence (AI) Systems: An Overview of Adversarial AI

As highlighted in the Summary of the 2018 Department of Defense (DoD) AI Strategy, the DoD is committed to leading in military ethics and AI safety. As a focal point of the strategy, the DoD seeks to ensure that developed and deployed AI systems are resilient (i.e., secure and robust). This webinar will provide an…

Read More...

UPCOMING EVENTS

ITEN Wired | TechNet CyberCoast Conference

Join us October 16-18, 2024 in beautiful Pensacola Beach, Florida for an event celebrating the southeast tech community. ITEN (innovation, technology, entrepreneurship, and network) WIRED |TechNet CyberCoast is the tech conference to connect, collaborate, and…

National Summit on Military Training, Modeling, & Simulation

Synthetic environments, integrating cutting-edge technologies such as virtual reality, augmented reality, mixed reality, and artificial intelligence, are reshaping traditional training methodologies, and offering a vital means to enhance readiness and resilience among military personnel. Against…

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 Department of Defense Intelligence Information System Worldwide Conference

The Defense Intelligence Agency (DIA) Chief Information Office (CIO) is excited to welcome participants to the 2024 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference at the Omaha Convention Center in Omaha, Nebraska, from…

2024 Defense Logistics & Support Conference

With the expertise of thought leaders from the US Department of Defense, industry, academia and allied nations, this conference dives deeper into contested logistics, assessing current challenges and strategies. The discussions will encompass technology shaping…

Voice From the Community

Jesse Storey
Jesse Storey III, M.E., CISSP, PMP

Technical Program Manager, Product Security Assurance Division of the CISO Office, Google

Mr. Storey has 15 years of experience in cybersecurity, program management, and executive leadership. He spent some time at the Pentagon leading the consolidation of the U.S. Marine Corps and Navy Court Martial Case Management System. Shortly thereafter, he joined the Department of Homeland Security, where he led a team of cybersecurity professionals to implement Ongoing Authorization and the Continuous Diagnosis Monitoring Systems programs.

Want to be featured in our Digest?

Submit your "Voice From the Community"