CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies: (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development in the U.S. Department of Defense (DoD) since the late 1960s, it has continued to see major advancements in recent years. This transformative technology has already made an impact across…

Learn More
image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood and can be mitigated early in design. As artificial intelligence (AI) and autonomous products are incorporated in military systems, mission completion also depends on the system’s robustness and resiliency in…

Learn More

Serving the Digital Entrée

Last fall, the Army Acquisition Workforce (AAW) was introduced to the digital foundations pathway with Udemy—three online courses designed to digitally upskill workforce members in preparation for the digital transformation of the Army. (See “Serving the Digital Soup” in the Fall 2023 issue of Army AL&T.) The Army Director of Acquisition Career Management (DACM) Office spent the last few months improving that pathway. Those three online…

Learn More

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure, private, and fair once deployed. The program comes shortly after…

Learn More

DoD Releases Online Cyber Resilient Weapon Systems Body of Knowledge Version 4.1 for Engineering Workforce

The U.S. Department of Defense released Version 4.1 of the Cyber Resilient Weapon Systems (CRWS) Body of Knowledge (BoK) on May 29. This free online resource assists public- and private-sector workforces in designing, engineering, and safeguarding CRWS. The Office of the Under Secretary of Defense’s System Security (SysSec) Office launched this resource for the system security engineering and science and technology communities in May 2021…

Learn More

U.S. Department of the Air Force Launches NIPRGPT

ARLINGTON, Va. (AFNS) —  As part of its ongoing modernization efforts, the U.S. Department of the Air Force (DAF) chief information officer, in partnership with the Air Force Research Laboratory, is accelerating initiatives to provide guardians, airmen, civilian employees, and contractors the ability to responsibly experiment with generative artificial intelligence (GenAI), with adequate safeguards in place. DAF senior leaders are focused on maximizing competitive advantage,…

Learn More

New “Overlays” Provide Guide on Path to Zero Trust

The Defense Department’s chief information officer today released the nearly 400-page “Zero Trust Overlays” document designed to serve as both a road map and guide for helping the department achieve goals set forth in a 2021 executive order signed by President Joe Biden. “The zero trust overlays are another tool in the department’s toolbox supporting components’ execution by providing clear guidance on which controls facilitate specific…

Learn More

New Technique Could Help Build Quantum Computers of the Future

Quantum computers have the potential to solve complex problems in human health, drug discovery, and artificial intelligence millions of times faster than some of the world’s fastest supercomputers. A network of quantum computers could advance these discoveries even faster. But before that can happen, the computer industry will need a reliable way to string together billions of qubits – or quantum bits – with atomic…

Learn More

Creating the AIQ Test: Mathematical Foundations for AI Evaluations

Relying on credible, concrete information is essential in high-stakes decision-making. So, how can society be sure generative artificial intelligence (AI) will be safe and effective for such applications? Over the past century, one of humanity’s most significant innovations has been the ability to move people and things quickly over large scales. Everything from bridges to jets and rockets uses mathematical foundations to understand the physical…

Learn More

NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust

FORT MEADE, Md. – The National Security Agency (NSA) is releasing the Cybersecurity Information Sheet (CSI), “Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar,” which details the infrastructure, tools, data, and techniques of this cornerstone pillar of the Zero Trust (ZT) framework. Organizations are urged to utilize the guidance in the report to systematically mitigate risks and rapidly identify, detect, and respond to emerging cyber…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

Cybersecurity and Technology Innovation Conference 2024

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…

Graph Exploitation Symposium 2024

The symposium brings together leading experts from universities, industry, and government to explore the state of the art and define a future roadmap in network science. The themes of this year’s symposium are domain-informed models…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"