CYBERSECURITY

& Information Systems Digest

2 APRIL 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

AI SSC
STATE-OF-THE-ART REPORT (SOAR) PUBLISHED

CSIAC is pleased to announce the publication of our latest SOAR “Applications of Artificial Intelligence (AI) for Protecting Software Supply Chains (SSCs) in the Defense Industrial Base (DIB).”

To view and download this unique publication, please visit:  https://csiac.org/state-of-the-art-reports/applications-of-artificial-intelligencefor-protecting-software-supply-chainsin-the-defense-industrial-base/.

FEATURED ARTICLE

face

Deepfake Defense Tech Ready for Commercialization, Transition

The threat of manipulated media has steadily increased as automated manipulation technologies become more accessible and social media continues to provide a ripe environment for viral content sharing. The speed, scale, and breadth at which massive disinformation campaigns can unfold require computational defenses and automated algorithms to help humans discern what content is real and…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most…

Read More...

UPCOMING EVENTS

Cybersecurity and Technology Innovation Conference 2024

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

dr fuzzy wells
Dr. David “Fuzzy” Wells, CMSP

Principal Cyber Simulationist, The MITRE Corporation

Dr. Wells is an event director for the National Cyber Range Complex and the former director of U.S. Indo-Pacific Command’s Cyber War Innovation Center, where he built the first combatant command venue for cyber testing, training, and experimentation; managed the Command’s joint cyber innovation and experimentation portfolio; and executed cyber range testing and training events for service, joint, and coalition partners. He is currently working to operationalize an integrated cyber range/simulation/effects prototype for combatant command training and exercises.

Want to be featured in our Digest?

Submit your "Voice From the Community"