Cybersecurity and Information Systems Digest

22 FEBRUAURY 2022

Featured Technical Inquiry

Banking Security Framework

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) was asked to identify which cybersecurity risk assessment framework is best suited for the financial industry and provide examples of such frameworks.  CSIAC identified the National Institute of Standards and Technology (NIST) Cybersecurity Framework as the most applicable and provided examples of other industry-specific implementation guidance.  A presentation specific to the financial services sector was also […]

Learn More
BioPicHighDef

Voice From the Community

Juan Deaton

Research Scientist

Dr. Juan Deaton is a research scientist at Envistacom, where he builds virtualized SATCOM systems. His 20 years of telecom research and experience include anti-jam waveforms, satellite channel models, spectrum optimization and modeling, emergency communications, and developing LDPC codes for Versa FEC 2. He received the 2005 CDMA Quality Award for developing hands-on training for CDMA cellular equipment deployments. His patented and published work involves spectrum sharing in 4G wireless networks, wireless airborne emergency communications, and mobile advertising.

Want to be featured in our digest?

Submit your "Voice From the Community"

Featured News

NIST Retires SHA-1 Cryptographic Algorithm

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). The agency is now recommending that IT professionals replace SHA-1, in the limited situations where it is still used, with newer algorithms that are more secure.

Learn More

Recent News

NSA Releases Series on Protecting DoD Microelectronics From Adversary Influence

FORT MEADE, Md. — The National Security Agency’s Joint Federated Assurance Center (JFAC) Hardware Assurance Lab publicly released four Cybersecurity technical reports to help the U.S. Department of Defense protect field-programmable gate array (FPGA)-based systems…

DoD Contributes to Registered Cybersecurity Apprenticeship Program

Under the U.S. Department of Defense’s (DoD’s) United Services Military Apprenticeship Program umbrella, the Department of Labor (DOL) has established several cybersecurity trades to support the goals of the National Cyber Security Registered Apprenticeship Program…

NIST Drafts Revised Guidelines for Digital Identification in Federal Systems

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has drafted updated guidelines to help the nation combat fraud and cybercrime while fostering equity and preserving fundamental human rights. The guidelines support…

ESF Members NSA and CISA Provide Threat Assessment, Best Practices for 5G Network Slicing

FORT MEADE, Md. — Enduring Security Framework (ESF) partners, along with experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), published their assessment of potential threats associated with 5G network…

CIO Recognizes Top Tech, Cyber Performers Across Defense Department

The U.S. Department of Defense’s Chief Information Officer (CIO) and the Commander of the U.S. Cyber Command teamed up today to recognize more than two dozen individuals and teams who contributed to the advancement of…

AFRL Announces Airlift Challenge, AI-Based Planning Competition

The U.S. Air Force Research Laboratory, or AFRL, will host an Airlift Challenge competition from January 23 through February 27, 2023, in an online event that seeks to advance state-of-the-art planning algorithms for executing airlift…

Upcoming Events

Cybersecurity Expo

This event is designed to keep the IT professional at the forefront of cybersecurity practices in order to protect themselves and their clients. More information will be available closer to the beginning of the conference.

Zero Trust World ’23

For the third year in a row, ThreatLocker will bring cybersecurity professionals and other special industry guests together. This two-and-a-half-day event will provide hands-on exercises, live hacking demonstrations, and valuable insights into how you can…

Enabling Distributed C2 Symposium

The AFCEA Pacific Northwest Chapter invites you to attend the 1st Distributed C2 Symposium, set to take place at the American Lake Conference Center – JBLM North on Wednesday, February 1, and Thursday, February 2,…

MODSIM World 2023

MODSIM World will bring together modeling and simulation (M&S) leaders focused on novel solutions and applications designed to innovate our future world. This unique, multidisciplinary, and international conference and exposition features three presentation tracks, focusing…

Global Cyber Innovation Summit

Cyberspace is a global digital domain with no geographic boundaries, no enforceable rules, and near-limitless potential for abuse.  And when things go wrong, they do so at the speed of light. This rapidly evolving cyberthreat landscape,…

18th International Conference on Cyber Warfare and Security (ICCWS)

ICCWS uniquely addresses cybersecurity, cyberwarfare, and information warfare. For the past 18 years, ICCWS has attracted academics, military professionals, and practitioners from around the world to present their research findings in the form of empirical…