CYBERSECURITY

& Information Systems Digest

2 July 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DoD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful
colors fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to view and download the latest chart.

FEATURED ARTICLE

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure,…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum computer attacks. In this webinar, a novel quantum protocol addressing security and privacy issues in the current network environment will…

Read More...

UPCOMING EVENTS

Cybersecurity and Technology Innovation Conference 2024

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

chuckrogal
Chuck Rogal

BS Geology, University of Pittsburgh at Bradford MS Computer Science, SUNY-Binghamton

Chuck Rogal’s career path has been crooked. He began working in 1985 at Teledyne Brown Engineering. He worked on a communications upgrade for the Cheyenne Mountain Complex as an Independent Validation & Verification (IV&V) Engineer. This initial role provided a good look at the DOD acquisition process. The role also included work on some early warning radar programs. He then took on a Systems Engineering challenge by writing documents (Descriptions and an ICD) for the same program. A move into Software Engineering afforded him to design a model and teach others about programming in Ada. After some time, he became a Program Manager for an enterprise network design and installation at the Office of Naval Intelligence at Suitland, MD. He then moved to a start-up for the commercial telecom industry. From there, he returned back to Software Engineering writing code for an optical simulation. That work led back to doing commercial software development. The dot.com disaster in 2001 led to returning to DOD work as a Systems Engineer. He then moved back to Software Engineering at the same company which after several years culminated in a Software Architect position. A better opportunity came along so he moved on to a Systems Engineering role for an airborne optical application. He retired from that position in 2020. Since then, he has been a consulting MBSE Architect on two programs.

Want to be featured in our Digest?

Submit your "Voice From the Community"