TOs are designed to support research and development studies and analyses or prototyping requirements. They are intended to be work efforts completed in 12 months or less for less than $1M.
Task Orders (TOs)
TOs are externally funded analysis services that extend beyond the free 4-hour technical inquiry research service. They come in two categories, depending on the size of the work efforts: task orders and IAC multiple award contract (MAC) task orders.
Task Orders
IAC MAC Task Orders
IAC MAC TOs support high-dollar research and development projects that provide studies, complex analysis, engineering, and technical services. They are intended to be work efforts with up to a 5-year period of performance and no ceiling minimum or maximum.
Notable Task Orders
Notable TOs are summaries of the most recent and impactful works done by CSIAC.
Entity Resolution for the Cyber Domain
The foundational level of situation awareness lies in perception of the surrounding environment. In cyberspace, this relates to an ability to enumerate and identify elements of the cyber terrain, particularly, network-connected devices that are employed…
Securing the Soft Underbelly of a Supercomputer With BPF Probes
With the evolution of modern technology, many organizations are now embracing big data solutions to drive decision-making by uncovering patterns, trends, and correlations in a massive amount of raw data. Subsequently, the adoption of big…
Joint Software Assurance (SwA) Cyber Experiment (CYBEX)
This report details key concerns discussed during the JFAC/DAU/CSIAC Software Assurance (SwA) Cyber Experiment (CYBEX) on 7 August 2018. In addition to evaluating newly developed SwA guides for program managers and developers, the exchange included…
Defense Acquisition University Secure Systems Design Course Experiment
The Cybersecurity and Information Systems Information Analysis Center (CSIAC) developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team which was executed on 17-18 May 2017. The goal of this exercise was…
Wireless Wide Area Network (WWAN) Security
Over the past few years, the use of wireless data devices, such as the BlackBerry unit by Research In Motion (RIM), has greatly increased within the federal government. The need for accessing email remotely has…