CYBERSECURITY

& Information Systems Digest

23 NOVEMBER 2021

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Historic Deployment of Cyber Forces With Bomber Task Force Europe

In a historic deployment, a U.S. Cyber Command Cyber Protection Team (CPT) defended critical data on B-1B Lancers assigned to Dyess Air Force Base’s 9th Expeditionary Bomb Squadron during the Bomber Task Force Europe mission within U.S. European Command’s theater starting October 6, 2021. The CPT’s support to the Bomber Task Force is a first…

Read More...

Featured Notable Technical Inquiry

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

A privacy impact assessment (PIA) is an essential element for effective privacy by design. It enables privacy leaders to be assured that the privacy controls implementation satisfies regulations and organizational requirements and is key to determining what steps must be taken to manage privacy risk for the organization. The standard ISO 29134 (Guidelines for Privacy Impact Assessment, June 2017) defines a PIA as the overall…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Action Bias and the Two Most Dangerous Words in Cybersecurity

Most cybersecurity professionals acknowledge that achieving perfect security is impossible. Yet, they nobly strive for perfection as the ultimate goal and feel loss, failure, and regret when incidents inevitably occur. Human instinct, especially in reaction to crisis or catastrophe, is to react and respond forcefully and immediately. In this session, we will talk about action…

Read More...

UPCOMING EVENTS

GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

23rd Annual Bio IT World Conference & Expo

The Bio-IT World Conference & Expo event showcases the technologies and analytic approaches that solve problems, accelerate science, and drive the future of precision medicine. The event unites a community of life sciences, pharmaceutical, clinical,…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

John-Aron-scaled
John Aron

Owner, Aronetics LLC

John Aron has evaluative offensive and defensive experiences across multiple architectures since 1994. As a teenager, he was a SysAdmin in charge of 2,500 persons across seven cities in Ohio. His last job was at FedEx Kinko’s making copies before founding Aronetics in March 2017. In June 2017 he almost died with a severe traumatic brain injury that took three years to recover from. In the fall of 2018, he assessed holes in the evaluative experiences with intrusions assaulting private and public organizations to protect our U.S. institutions.

Want to be featured in our Digest?

Submit your "Voice From the Community"