CYBERSECURITY

& Information Systems Digest

31 OCTOBER 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA and CISA Advise on Top Ten Cybersecurity Misconfigurations

FORT MEADE, Md. – The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing a joint Cybersecurity Advisory (CSA) highlighting the top 10 most common cybersecurity misconfigurations found in large organizations’ networks. The CSA details tactics, techniques, and procedures (TTPs) that cyber actors could use to compromise these networks, as…

Read More...

Featured Notable Technical Inquiry

6G and Its Advancements Over 5G Networks

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and recognizing improvements to 6G networks compared to 5G.  The inquirer also wanted to know when 6G networks are expected to be deployed. CSIAC identified the differences in features and functionality between 6G and 5G networks, projected 6G network deployment timeframes, and potential future use cases for 6G technologies. 1.0  TI Request…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Optimization Techniques:  Improving Effectiveness for Defense Simulation Models

When performing defense system analysis with simulation models, a great deal of time and effort are expended, creating representations of real-world scenarios in U.S. Department of Defense (DoD) simulation tools.  However, once these models have been created and validated, analysts rarely retrieve all the knowledge and insights that the models may yield.  Study sponsors often…

Read More...

UPCOMING EVENTS

Systems Thinking Training

REGISTRATION IS NOW CLOSED.  THIS CLASS IS COMPLETELY FULL. Cybersecurity professionals know that the human element is a wild card in even the best-designed systems. As a complex socio-technical system with human and engineered components,…

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can…

The 92nd Military Operations Research Symposium (MORS)

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the opportunity for the national security community to exchange information, examine research, and discuss critical national security topics. Held in notable locations,…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

StefanJ20-Högupplöst
Stefan Jansson

Senior Cybersecurity Consultant

Stefan Jansson has a background in private and government work in the United States and Sweden. His current assignments include cybersecurity architecture support for a manufacturing company, compliance support for a pharmaceutical company, and a few National Institute of Standards and Technology-based holistic cybersecurity assessments. He is a problem solver who uses compliance, frameworks, audits and assessments to improve cybersecurity.

Want to be featured in our Digest?

Submit your "Voice From the Community"