CYBERSECURITY

& Information Systems Digest

19 SEPTEMBER 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

How NETCOM Leads the Army to a Secure Network

FORT HUACHUCA, Ariz. — Zero-trust is a collection of concepts and ideas that assume no trust exists within a defined enterprise network. The Network Enterprise Technology Command (NETCOM) – Army Department of Defense Information Networks, or DoDIN-A, Cybersecurity Strategy uses zero-trust principles to protect critical data, applications, assets, and services. NETCOM is leading several continuous…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Modeling and Simulation on the Final Frontier With AFSIM

The Advanced Framework for Simulation, Integration, and Modeling (AFSIM) is a government-owned, military simulation framework that enables users to perform complex mission-level simulations for analysis and experimentation. Since 2016, AFSIM’s notional space capabilities have been expanded into a fully capable space simulation and delivered to hundreds of U.S. Department of Defense and industry organizations. An…

Read More...

UPCOMING EVENTS

ITEN Wired | TechNet CyberCoast Conference

Join us October 16-18, 2024 in beautiful Pensacola Beach, Florida for an event celebrating the southeast tech community. ITEN (innovation, technology, entrepreneurship, and network) WIRED |TechNet CyberCoast is the tech conference to connect, collaborate, and…

National Summit on Military Training, Modeling, & Simulation

Synthetic environments, integrating cutting-edge technologies such as virtual reality, augmented reality, mixed reality, and artificial intelligence, are reshaping traditional training methodologies, and offering a vital means to enhance readiness and resilience among military personnel. Against…

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 Department of Defense Intelligence Information System Worldwide Conference

The Defense Intelligence Agency (DIA) Chief Information Office (CIO) is excited to welcome participants to the 2024 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference at the Omaha Convention Center in Omaha, Nebraska, from…

2024 Defense Logistics & Support Conference

With the expertise of thought leaders from the US Department of Defense, industry, academia and allied nations, this conference dives deeper into contested logistics, assessing current challenges and strategies. The discussions will encompass technology shaping…

Voice From the Community

TimWatkins-4
Tim Watkins

Global Accounts Business Development Manager

Tim Watkins started his U.S. Marine Corps career in 1993. Following 20 years of U.S. Department of Defense experience as a network and cyber engineer, he is now a business development manager focusing on securing control systems and designing defendable architectures for system owners around the world. His work involves prioritizing network and cyber efforts, increasing resiliency, and maturing system owners’ plans, policies, and procedures.

Want to be featured in our Digest?

Submit your "Voice From the Community"