Cybersecurity and Information Systems Digest

31 AUGUST 21

Featured Technical Inquiry

Solutions for Labeling Independent Zeek Logs for Attacks and Exploits

Zeek, formerly known as Bro Network Security Monitor, is a powerful open-source intrusion detection system. There was a requirement to know whether an individual record should be marked as anomalous or not, assuming attacks are anomalies.  The inquirer was interested in finding possible solutions to automatically label network events/sessions based on time and IP addresses of known attacks using Zeek logs. CSIAC subject matter experts […]

Learn More

Voice From the Community

Keven Hendricks

Detective, Cybercrime Examiner, & Investigator, New Brunswick, NJ, Police Department

Even Hendricks is a 14-year veteran detective with a municipal police department and has served as a Task Force Officer for two separate federal agencies. He is a published author with the FBI Law Enforcement Bulletin and is currently working as an instructor for Street Cop Training, teaching a class for law enforcement on dark web and cybercrime investigations. He is a Certified Cyber Crime Examiner (3CE) and Certified Cyber Crime Investigator (3CI) by the National White Collar Crime
Center (NW3C).

Want to be featured in our digest?

Submit your "Voice From the Community"

Featured News

Wanted: Artificial Intelligence (AI) and Machine Autonomy Algorithms for Military Command and Control

U.S. military researchers are asking industry to develop reliable and trusted artificial intelligence (AI), machine learning, and systems autonomy technologies for future command and control, surveillance, and logistics systems. Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., issued a broad agency announcement (HR001122S0039) last week for the Assured Neuro Symbolic Learning and Reasoning (ANSR) project. The ANSR program seeks breakthrough […]

Learn More

Recent News

U.S. National Guard Defends the Cyber Front

ARLINGTON, Va. – The U.S. National Guard is the nation’s oldest military service, yet uniquely adaptable to a relatively new warfighting domain:  cyberwarfare. “The cyber skills that many members of the National Guard bring to…

CISA Now Accepting Nominations for First Cyber Innovation Fellows Cohort

WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA) is proud to announce the launch of the Cyber Innovation Fellows initiative to leverage private sector expertise to contribute directly to the nation’s cyber defense…

CISA Challenges Partners and Public to Push for “More Than a Password” in New Social Media Campaign

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) is announcing a collaborative effort with industry to dramatically increase adoption of multifactor authentication (MFA) and ensure widespread understanding of why it is one of the…

NSA, CISA, and FBI Expose PRC State-Sponsored Exploitation of Network Providers, Devices

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory (CSA) today, “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices.”…

2023 Spark Tank Open for Submissions

U.S. Air Force Materiel Command (AFMC) uniformed and civilian Airmen are invited to submit innovative, game-changing ideas to compete in the 2023 Air Force Spark Tank competition now, with preliminary rounds open from June 1…

DoD and National Spectrum Consortium Team for Open RAN Acceleration

The National Spectrum Consortium, with support from the U.S. Department of Defense (DoD), recently announced the release of a “Call for Whitepapers” to their membership requesting feedback and ideas from industry and academia that could…

Upcoming Events

Cyber Technology for National Security Workshop

MIT Lincoln Laboratory is hosting the second Cyber Technology for National Security (CTNS) Workshop on Tuesday, June 28, and Wednesday, June 29, 2022. CTNS will be an in-person event to discuss the threats and opportunities…

Black Hat USA

Now in its 25th year, Black Hat USA’s annual conference will be a hybrid experience offering the cybersecurity community a choice in how they wish to participate. Black Hat USA 2022 will open with four…

CISO Exchange

This event is designed specifically for chief information security officers and other high-level cyber professionals. Attendance is limited to invitation only, though invitations may be requested from the website. The theme for the D.C. edition…

Automotive Cybersecurity 2022

Join industry leaders as they provide best practices and solutions in overcoming automotive cybersecurity pain points with presentations centered on countering zero-day vulnerabilities, utilizing and securing OTA updates, methods to achieving time & cost-effective vulnerability…

Intelligent Automation Exchange

This event is on an invitation-only basis, though invitations may be requested through the website. It is designed for senior intelligent automation executives and will be attended by a number of Fortune 500 companies. The…