CYBERSECURITY

& Information Systems Digest

3 SEPTEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DOD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful organizational scheme. The use of colors, fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to download the latest version.

FEATURED ARTICLE

CISA Releases Secure by Demand Guide

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the “Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem,” which helps organizations buying software better understand their software manufacturers approach to cybersecurity and ensure that secure by design is one of their core considerations….

Read More...

Featured Notable Technical Inquiry

Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

The Cybersecurity & Information Systems Information Analysis Center performed open-source research and obtained white papers and reports from numerous sources to include the Defense Technical Information Center Research and Engineering Gateway and Elsevier’s ScienceDirect.  Overall, the research showed that the best way to counter artificial intelligence (AI) offensive tools was with AI defensive tools.  The resulting research is described in detail.  This TI response report…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making contractor information systems subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171,…

Read More...

UPCOMING EVENTS

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 National Cyber Summit

National Cyber Summit is a three-day event that focuses on innovative cyber security technology, offering unique educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. The National Cyber Summit offers several different…

AI4SE & SE4AI Research and Application Workshop 2024

The fifth annual AI4SE and SE4AI workshop is sponsored and organized by the U.S. Army DEVCOM Armaments Center Systems Engineering Directorate and the Systems Engineering Research Center and will be hosted at the George Mason…

14th Annual Peak Cyber Symposium

The Information Systems Security Association (ISSA) – Colorado Springs Chapter is delighted to announce the return of the 14th Annual Peak Cyber Symposium at The Antlers Hotel, Colorado Springs, CO. The event days will be…

28th Annual IEEE High-Performance Extreme Computing Virtual Conference

The High-Performance Extreme Computing Virtual Conference (HPEC) is a large New England computing conference focusing on the convergence of high-performance and embedded computing. The HPEC community is interested in computing hardware, software, systems, and applications…

Voice From the Community

Tom Burns_headshot
Thomas Burns

Engineering Manager, Kawasaki Railcar, Inc.

Thomas Burns is an engineering manager in operational technology for Kawasaki Railcar, where he oversees cybersecurity in the global supply chain. He acquires embedded software within the systems for integration into fleets of passenger railcars and tests electromagnetic interference/compatibility. He also manages software requirement compliance and ensures best practices are followed as outlined by the Software Engineering Institute and the Information Systems Audit and Control Association’s Capability Maturity Model Integration framework.

Want to be featured in our Digest?

Submit your "Voice From the Community"