CYBERSECURITY

& Information Systems Digest

28 JUNE 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Wanted: Artificial Intelligence (AI) and Machine Autonomy Algorithms for Military Command and Control

U.S. military researchers are asking industry to develop reliable and trusted artificial intelligence (AI), machine learning, and systems autonomy technologies for future command and control, surveillance, and logistics systems. Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., issued a broad agency announcement (HR001122S0039) last week for the Assured Neuro Symbolic…

Read More...

Featured Notable Technical Inquiry

Solutions for Labeling Independent Zeek Logs for Attacks and Exploits

Zeek, formerly known as Bro Network Security Monitor, is a powerful open-source intrusion detection system. There was a requirement to know whether an individual record should be marked as anomalous or not, assuming attacks are anomalies.  The inquirer was interested in finding possible solutions to automatically label network events/sessions based on time and IP addresses of known attacks using Zeek logs. CSIAC subject matter experts…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Explainable, Do-It-Yourself Artificial Intelligence Supporting the DoD and the Intelligence Community

Although artificial intelligence (AI) continues to make rapid advances in the automation of many analysis and operations tasks, the development and training of AI models typically require detailed AI engineering or research expertise. Once a model is created, it can be difficult to interpret or predict its behavior, leading to reduced trust or a reluctance…

Read More...

UPCOMING EVENTS

Sunshine Cyber Conference

Cyber Florida is pleased to announce the return of our popular annual conference, now called the Sunshine Cyber Conference. Save the date for 27-28 March 2024 at the newly renovated Tampa Convention Center. Designed to…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

IMPACT 2024

Every year, CybSafe hosts IMPACT—a free conference that puts the latest research on the human aspect of cybersecurity on center stage. Like its predecessors, the first USA IMPACT will bring researchers together to share knowledge…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

Kelvin Bouldin_SURVICE Pic
Kelvin Bouldin

Demonstrated Master Logistician, Security+, Network+, Cybersecurity Test & Evaluation Analyst, SURVICE Engineering Company

Mr. Bouldin has 20+ years of experience in managing and testing cybersecurity, logistics, and various electronics communications programs for the U.S. Department of Defense (DoD). While serving in the U.S. Army, he provided maintenance, logistics support, and testing for aircraft survivability systems, explosive ordnance disposal, chemical detection, and various tactical communications networks. Kelvin currently supports the Survivability Evaluation Directorate at the U.S. Army Test & Evaluation Command, where he conducts cyber-resiliency tests and evaluations of 11 defensive cybersecurity operation systems programs for the DoD

Want to be featured in our Digest?

Submit your "Voice From the Community"