& Information Systems Digest

22 NOVEMBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.


Featured Notable Technical Inquiry

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most pressing cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE) […]

Learn More
A padlock on a monitor with 0s and 1s surrounding it.

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware. Added to this complex mix are the opportunities afforded by artificial intelligence, and the risks that it brings. Gartner Security & Risk […]

Learn More

The Digital Ecosystem and Project Linchpin

This webinar will provide a Project Linchpin Overview – How we got here, who we are, what’s missing, and what we are doing.  The goal of Project Linchpin is to deliver trusted AI/ML (artificial intelligence/machine learning) capabilities to Program Executive Office (PEO) Intelligence, Electronic Warfare & Sensors (IEW&S) programs.  As a pre-program activity, the mission of Project Linchpin is to define technical and acquisition approaches […]

Learn More
Soldier points while detection equipment is mounted on their back.

The 92nd Military Operations Research Symposium

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the an opportunity for the national security community to exchange information, examine research and discuss critical national security topics. Held in notable locations, the Symposium gathers over 800 Operations Research (OR) professionals from military, government, industry and academic ranks to share best practices and enjoy a bit of peer-to-peer networking in a […]

Learn More

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, Maryland on Thursday, May 16th, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks during the event: Cyber Operations Readiness & Experiences (CORE), New Emerging Research & Development (NERD), and Growing Innovations in Tech (GIT). Key discussion points across these tracks will include: Discussions […]

Learn More

What is known about automated extraction of data and metadata from hand-written lab notebooks?

Learn More

What databases have geometry files for blue and red force aircraft and ground vehicle models in OBJ, 3DS, STL, or other formats?

Learn More

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Learn More

Airmen, Guardians Can Influence How Leaders Share Information Through Latest WAGGI Survey

WASHINGTON (AFNS) —  The U.S. Department of the Air Force will soon release the latest iteration of the “Where Airmen and Guardians Get Information” (WAGGI) survey to thousands of Airmen and Guardians. The survey, paired with focus groups later this year, gives Airmen, Guardians, and Department civilians a chance to tell senior leaders what kinds of information they care about and who should be communicating […]

Learn More

Understanding and Responding to Distributed Denial-of-Service Attacks

This joint guide, Understanding and Responding to Distributed Denial-of-Service (DDoS) Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: Volumetric – attacks aiming to consume available bandwidth. Protocol – attacks which exploit vulnerabilities in network protocols. Application – attacks targeting vulnerabilities in specific applications or running […]

Learn More


CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.



Simulation-Based Testing for DoD Software

The discipline of software testing is changing to align with the automated processes of Agile DevSecOps.  Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention.  With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…



GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

23rd Annual Bio IT World Conference & Expo

The Bio-IT World Conference & Expo event showcases the technologies and analytic approaches that solve problems, accelerate science, and drive the future of precision medicine. The event unites a community of life sciences, pharmaceutical, clinical,…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

Wilson_Art - Headshot
Art Wilson

Senior Vice President, Intelligence Programs at Owl Cyber Defense

Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.

Want to be featured in our Digest?

Submit your "Voice From the Community"