CYBERSECURITY

& Information Systems Digest

2 NOVEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

U.S. Air Force and University Scientists Share Their Vision for Unconventional Computing

Conventional computing hardware represents information as ones and zeros, depending on the state of electronic transistors. This creates artificial bottlenecks in the flow of information processing by first requiring that environmental loads be converted into an electronic state and second by routing the information to centralized computers for processing. Researchers from Wright-Patterson’s Air Force Research…

Read More...

Featured Notable Technical Inquiry

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

In response to the repeated attacks on the U.S. Department of Defense (DoD) supply chain, the release of the Cybersecurity Maturity Model Certification (CMMC) introduces a verification mechanism that will ensure the necessary security mechanisms are in place to better protect Controlled Unclassified Information (CUI) and other sensitive data made available to contractor organizations. CMMC was developed from the contributions of multiple organizations and entities,…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

The Case for a National Cybersecurity Safety Board

In the wake of a series of destabilizing and damaging cyberattacks, there has been a growing call for the U.S. government to establish an analogue of the National Transportation Safety Board (NTSB) to investigate cyberattacks. As we recently argued in a letter to the Wall Street Journal, we think that it is past time for…

Read More...

UPCOMING EVENTS

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 National Cyber Summit

National Cyber Summit is a three-day event that focuses on innovative cyber security technology, offering unique educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. The National Cyber Summit offers several different…

AI4SE & SE4AI Research and Application Workshop 2024

The fifth annual AI4SE and SE4AI workshop is sponsored and organized by the U.S. Army DEVCOM Armaments Center Systems Engineering Directorate and the Systems Engineering Research Center and will be hosted at the George Mason…

14th Annual Peak Cyber Symposium

The Information Systems Security Association (ISSA) – Colorado Springs Chapter is delighted to announce the return of the 14th Annual Peak Cyber Symposium at The Antlers Hotel, Colorado Springs, CO. The event days will be…

28th Annual IEEE High-Performance Extreme Computing Virtual Conference

The High-Performance Extreme Computing Virtual Conference (HPEC) is a large New England computing conference focusing on the convergence of high-performance and embedded computing. The HPEC community is interested in computing hardware, software, systems, and applications…

Voice From the Community

Glyn Gowing-1
Glyn Gowing

Professor, LeTourneau University

Dr. Gowing is a full-time professor at LeTourneau University, having earned his Ph.D. in computer information systems and specializing in cybersecurity, at Nova Southeastern University. His research interests and experience include malware, penetration testing, reverse-engineering, and forensics. He has experience with multiple processor architectures and
operating systems and is currently researching ways to take control of remotely piloted aircraft to protect U.S. troops and our borders from hostile actors. He is a Federal Aviation Administration-certificated commercial drone pilot.

Want to be featured in our Digest?

Submit your "Voice From the Community"