CYBERSECURITY

& Information Systems Digest

7 MAY 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

The,Profile,Of,A,Thoughtful,Young,Man,,The,Concept,Of
Systems Thinking Training (July 9, 2024 - July 11, 2024)

Cybersecurity professionals know that the human element is a wild card in even the best-designed systems. As a complex socio-technical system with both human and engineered components, cybersecurity requires systemic approaches that can uncover recurring behavior patterns that drive key performance outcomes.

Creating effective cybersecurity approaches requires an understanding of how people—both intended users and adversaries—will perceive and interact with the various features of the system. Systems thinking offers tools and approaches to manage this complexity and understand related problems.

FEATURED ARTICLE

DoD CIO Establishes Cybersecurity Training Provider Marketplace

The Defense Acquisition University (DAU) is now represented in the new DoD 8140 Cyber Workforce (DCWF) Qualification Provider Marketplace online. Intended for DCWF personnel, the Marketplace is a time-saving platform that utilizes a simplified search to find preapproved cyber training products. It includes a sophisticated but simple-to-use search engine that can search by role code…

Read More...

Featured Notable Technical Inquiry

Microelectronics Overview

Cybersecurity and Information Systems Analysis Center subject matter experts, experienced with delivering presentations to senior leadership on technical topics, conducted open-source research for relevant information on microelectronics and its impact on the U.S. Department of Defense (DoD).  Per the inquirer’s request, they compiled the information into a PowerPoint presentation on several subtopics, including DoD importance, large figures in the industry, current challenges, and use cases.

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most…

Read More...

UPCOMING EVENTS

2024 Cybersecurity and Technology Innovation Conference

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

download
Ed Smith

Information Security Manager, SSCP, MITRE PTM, MITRE CTI, CC, MTA, MOS,

With twenty years of dedicated service in the US Navy, Edward Smith currently serves on active duty, holding roles as a data/sensor network operator/instructor, Knowledge Manager, Database Administrator, and SharePoint Collection Administrator. He actively mentors through ISC2 Seattle Chapter & ISSA Puget Sound. Pursuing a Ph.D. in Cybersecurity with a focus on Secure Cloud Computing, his expertise and background includes M.S. in Aeronautics, M.S. in Unmanned Systems specializing in Space Operations, and a B.S. in Interdisciplinary Studies with a minor in Cybersecurity Application and Management, reflecting a disciplined approach to modern security challenges.

Want to be featured in our Digest?

Submit your "Voice From the Community"