Notable Technical Inquiries (TIs)

Notable TIs are findings and/or summaries of responses to the most recent and impactful technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Security-Conscious Password Behavior From the End-User’s Perspective

How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

What are the major requirements of the Cybersecurity Maturity Model Certification for DoD contractors and subcontractors?

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

What is the industry standard for performing a privacy impact assessment?

Assessing the Operational System Risk Imposed by the Infrastructure Deployment Pipeline Workflow

What is the operational system risk imposed by the infrastructure deployment pipeline workflow?

Smart Cities, Smart Bases, and Secure Cloud Architecture for Resiliency by Design

How can the smart city concept be applied to military bases, and what security concerns would need to be assessed?

Challenges in Applying the Law of Armed Conflict to Cyberwar

Given the United States-Russian bilateral recommendation from the 47th Munich Security Conference, what are some of the foreseen challenges in applying the law of armed conflict to cyberwar?

Ready to submit a technical inquiry?

Receive free information research on technical topics