CYBERSECURITY

& Information Systems Digest

03 APRIL 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Hackers Could Try to Take Over a Military Aircraft; Can a Cyber Shuffle Stop Them?

ALBUQUERQUE, N.M. — A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner, or spacecraft, according to new research. However, the research also shows these defenses must be designed to counter increasingly sophisticated algorithms used to break them….

Read More...

Featured Notable Technical Inquiry

Microelectronics Overview

Cybersecurity and Information Systems Analysis Center subject matter experts, experienced with delivering presentations to senior leadership on technical topics, conducted open-source research for relevant information on microelectronics and its impact on the U.S. Department of Defense (DoD).  Per the inquirer’s request, they compiled the information into a PowerPoint presentation on several subtopics, including DoD importance, large figures in the industry, current challenges, and use cases.

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Cyber Survivability for Weapon System Mission Assurance

In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP).  The tasking was a response to the Director of Operational Test & Evaluation (OT&E) highlighting multiple weapon systems with the same “dirty dozen” high-risk vulnerabilities reported every year that should have been fixed prior to OT&E and would…

Read More...

UPCOMING EVENTS

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can…

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, MD, on Thursday, May 16, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks…

2024 DAF Modeling and Simulation Summit

The theme of the 2024 U.S. Department of the Air Force (DAF) Modeling & Simulation (M&S) Summit is “Training in a Digital World,” which highlights DAF’s drive to upskill personnel through digital training. The goal…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Voice From the Community

DC-Bio Pic_2023
Demetris Council

Principal Cybersecurity Architect/ Consultant

Mr. Council has over 21 years of experience and expertise in assessing, protecting, designing, implementing, and troubleshooting network infrastructure. He consults with enterprise customers to design and implement cybersecurity and zero trust solutions for large and complex organizations. His information security specialties include the following domains: zero trust strategy, Windows server hardening, active directory security, cloud security, M365, Intune, PKI, and others. He also worked as a Microsoft cybersecurity architect and CompTIA advanced security practitioner subject matter expert.

Want to be featured in our Digest?

Submit your "Voice From the Community"