CYBERSECURITY

& Information Systems Digest

03 APRIL 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Hackers Could Try to Take Over a Military Aircraft; Can a Cyber Shuffle Stop Them?

ALBUQUERQUE, N.M. — A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner, or spacecraft, according to new research. However, the research also shows these defenses must be designed to counter increasingly sophisticated algorithms used to break them….

Read More...

Featured Notable Technical Inquiry

Microelectronics Overview

Cybersecurity and Information Systems Analysis Center subject matter experts, experienced with delivering presentations to senior leadership on technical topics, conducted open-source research for relevant information on microelectronics and its impact on the U.S. Department of Defense (DoD).  Per the inquirer’s request, they compiled the information into a PowerPoint presentation on several subtopics, including DoD importance, large figures in the industry, current challenges, and use cases.

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Cyber Survivability for Weapon System Mission Assurance

In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP).  The tasking was a response to the Director of Operational Test & Evaluation (OT&E) highlighting multiple weapon systems with the same “dirty dozen” high-risk vulnerabilities reported every year that should have been fixed prior to OT&E and would…

Read More...

UPCOMING EVENTS

GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

23rd Annual Bio IT World Conference & Expo

The Bio-IT World Conference & Expo event showcases the technologies and analytic approaches that solve problems, accelerate science, and drive the future of precision medicine. The event unites a community of life sciences, pharmaceutical, clinical,…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

DC-Bio Pic_2023
Demetris Council

Principal Cybersecurity Architect/ Consultant

Mr. Council has over 21 years of experience and expertise in assessing, protecting, designing, implementing, and troubleshooting network infrastructure. He consults with enterprise customers to design and implement cybersecurity and zero trust solutions for large and complex organizations. His information security specialties include the following domains: zero trust strategy, Windows server hardening, active directory security, cloud security, M365, Intune, PKI, and others. He also worked as a Microsoft cybersecurity architect and CompTIA advanced security practitioner subject matter expert.

Want to be featured in our Digest?

Submit your "Voice From the Community"