CYBERSECURITY

& Information Systems Digest

22 NOVEMBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Featured Notable Technical Inquiry

Serving the Digital Entrée

Last fall, the Army Acquisition Workforce (AAW) was introduced to the digital foundations pathway with Udemy—three online courses designed to digitally upskill workforce members in preparation for the digital transformation of the Army. (See “Serving the Digital Soup” in the Fall 2023 issue of Army AL&T.) The Army Director of Acquisition Career Management (DACM) Office spent the last few months improving that pathway. Those three online […]

Learn More

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure, private, and fair once deployed. The program comes shortly after […]

Learn More

DoD Releases Online Cyber Resilient Weapon Systems Body of Knowledge Version 4.1 for Engineering Workforce

The U.S. Department of Defense released Version 4.1 of the Cyber Resilient Weapon Systems (CRWS) Body of Knowledge (BoK) on May 29. This free online resource assists public- and private-sector workforces in designing, engineering, and safeguarding CRWS. The Office of the Under Secretary of Defense’s System Security (SysSec) Office launched this resource for the system security engineering and science and technology communities in May 2021 […]

Learn More

U.S. Department of the Air Force Launches NIPRGPT

ARLINGTON, Va. (AFNS) —  As part of its ongoing modernization efforts, the U.S. Department of the Air Force (DAF) chief information officer, in partnership with the Air Force Research Laboratory, is accelerating initiatives to provide guardians, airmen, civilian employees, and contractors the ability to responsibly experiment with generative artificial intelligence (GenAI), with adequate safeguards in place. DAF senior leaders are focused on maximizing competitive advantage, […]

Learn More

New “Overlays” Provide Guide on Path to Zero Trust

The Defense Department’s chief information officer today released the nearly 400-page “Zero Trust Overlays” document designed to serve as both a road map and guide for helping the department achieve goals set forth in a 2021 executive order signed by President Joe Biden. “The zero trust overlays are another tool in the department’s toolbox supporting components’ execution by providing clear guidance on which controls facilitate specific […]

Learn More

New Technique Could Help Build Quantum Computers of the Future

Quantum computers have the potential to solve complex problems in human health, drug discovery, and artificial intelligence millions of times faster than some of the world’s fastest supercomputers. A network of quantum computers could advance these discoveries even faster. But before that can happen, the computer industry will need a reliable way to string together billions of qubits – or quantum bits – with atomic […]

Learn More

Creating the AIQ Test: Mathematical Foundations for AI Evaluations

Relying on credible, concrete information is essential in high-stakes decision-making. So, how can society be sure generative artificial intelligence (AI) will be safe and effective for such applications? Over the past century, one of humanity’s most significant innovations has been the ability to move people and things quickly over large scales. Everything from bridges to jets and rockets uses mathematical foundations to understand the physical […]

Learn More

NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust

FORT MEADE, Md. – The National Security Agency (NSA) is releasing the Cybersecurity Information Sheet (CSI), “Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar,” which details the infrastructure, tools, data, and techniques of this cornerstone pillar of the Zero Trust (ZT) framework. Organizations are urged to utilize the guidance in the report to systematically mitigate risks and rapidly identify, detect, and respond to emerging cyber […]

Learn More

What integrated priority list needs have the combatant commands submitted for civilian harm mitigation and response capabilities?

Learn More

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making contractor information systems subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.” […]

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Simulation-Based Testing for DoD Software

The discipline of software testing is changing to align with the automated processes of Agile DevSecOps.  Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention.  With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…

Read More...

UPCOMING EVENTS

Cybersecurity and Technology Innovation Conference 2024

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

Wilson_Art - Headshot
Art Wilson

Senior Vice President, Intelligence Programs at Owl Cyber Defense

Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.

Want to be featured in our Digest?

Submit your "Voice From the Community"