CYBERSECURITY

& Information Systems Digest

31 OCTOBER 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA and CISA Advise on Top Ten Cybersecurity Misconfigurations

FORT MEADE, Md. – The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing a joint Cybersecurity Advisory (CSA) highlighting the top 10 most common cybersecurity misconfigurations found in large organizations’ networks. The CSA details tactics, techniques, and procedures (TTPs) that cyber actors could use to compromise these networks, as…

Read More...

Featured Notable Technical Inquiry

6G and Its Advancements Over 5G Networks

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and recognizing improvements to 6G networks compared to 5G.  The inquirer also wanted to know when 6G networks are expected to be deployed. CSIAC identified the differences in features and functionality between 6G and 5G networks, projected 6G network deployment timeframes, and potential future use cases for 6G technologies.

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Optimization Techniques:  Improving Effectiveness for Defense Simulation Models

When performing defense system analysis with simulation models, a great deal of time and effort are expended, creating representations of real-world scenarios in U.S. Department of Defense (DoD) simulation tools.  However, once these models have been created and validated, analysts rarely retrieve all the knowledge and insights that the models may yield.  Study sponsors often…

Read More...

UPCOMING EVENTS

ITEN Wired | TechNet CyberCoast Conference

Join us October 16-18, 2024 in beautiful Pensacola Beach, Florida for an event celebrating the southeast tech community. ITEN (innovation, technology, entrepreneurship, and network) WIRED |TechNet CyberCoast is the tech conference to connect, collaborate, and…

National Summit on Military Training, Modeling, & Simulation

Synthetic environments, integrating cutting-edge technologies such as virtual reality, augmented reality, mixed reality, and artificial intelligence, are reshaping traditional training methodologies, and offering a vital means to enhance readiness and resilience among military personnel. Against…

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 Department of Defense Intelligence Information System Worldwide Conference

The Defense Intelligence Agency (DIA) Chief Information Office (CIO) is excited to welcome participants to the 2024 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference at the Omaha Convention Center in Omaha, Nebraska, from…

2024 Defense Logistics & Support Conference

With the expertise of thought leaders from the US Department of Defense, industry, academia and allied nations, this conference dives deeper into contested logistics, assessing current challenges and strategies. The discussions will encompass technology shaping…

Voice From the Community

StefanJ20-Högupplöst
Stefan Jansson

Senior Cybersecurity Consultant

Stefan Jansson has a background in private and government work in the United States and Sweden. His current assignments include cybersecurity architecture support for a manufacturing company, compliance support for a pharmaceutical company, and a few National Institute of Standards and Technology-based holistic cybersecurity assessments. He is a problem solver who uses compliance, frameworks, audits and assessments to improve cybersecurity.

Want to be featured in our Digest?

Submit your "Voice From the Community"