CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most pressing cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE)…

Learn More
A padlock on a monitor with 0s and 1s surrounding it.

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware. Added to this complex mix are the opportunities afforded by artificial intelligence, and the risks that it brings. Gartner Security & Risk…

Learn More

The Digital Ecosystem and Project Linchpin

This webinar will provide a Project Linchpin Overview – How we got here, who we are, what’s missing, and what we are doing.  The goal of Project Linchpin is to deliver trusted AI/ML (artificial intelligence/machine learning) capabilities to Program Executive Office (PEO) Intelligence, Electronic Warfare & Sensors (IEW&S) programs.  As a pre-program activity, the mission of Project Linchpin is to define technical and acquisition approaches…

Learn More
Soldier points while detection equipment is mounted on their back.

The 92nd Military Operations Research Symposium

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the an opportunity for the national security community to exchange information, examine research and discuss critical national security topics. Held in notable locations, the Symposium gathers over 800 Operations Research (OR) professionals from military, government, industry and academic ranks to share best practices and enjoy a bit of peer-to-peer networking in a…

Learn More

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, Maryland on Thursday, May 16th, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks during the event: Cyber Operations Readiness & Experiences (CORE), New Emerging Research & Development (NERD), and Growing Innovations in Tech (GIT). Key discussion points across these tracks will include: Discussions…

Learn More

What is known about automated extraction of data and metadata from hand-written lab notebooks?

Learn More

What databases have geometry files for blue and red force aircraft and ground vehicle models in OBJ, 3DS, STL, or other formats?

Learn More

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Learn More
USSF

Airmen, Guardians Can Influence How Leaders Share Information Through Latest WAGGI Survey

WASHINGTON (AFNS) —  The U.S. Department of the Air Force will soon release the latest iteration of the “Where Airmen and Guardians Get Information” (WAGGI) survey to thousands of Airmen and Guardians. The survey, paired with focus groups later this year, gives Airmen, Guardians, and Department civilians a chance to tell senior leaders what kinds of information they care about and who should be communicating…

Learn More

Understanding and Responding to Distributed Denial-of-Service Attacks

This joint guide, Understanding and Responding to Distributed Denial-of-Service (DDoS) Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: Volumetric – attacks aiming to consume available bandwidth. Protocol – attacks which exploit vulnerabilities in network protocols. Application – attacks targeting vulnerabilities in specific applications or running…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

23rd Annual Bio IT World Conference & Expo

The Bio-IT World Conference & Expo event showcases the technologies and analytic approaches that solve problems, accelerate science, and drive the future of precision medicine. The event unites a community of life sciences, pharmaceutical, clinical,…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"