CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of cyberthreats and attacks. This presentation examines the critical cybersecurity challenges facing satellite networks, from ground stations to onboard systems. It will highlight vulnerabilities, case studies, and best practices for securing…

Learn More

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring the guidebook’s core principles using a hypothetical system (Emergency Enterprise System) focusing on: The crucial role of the Cyber Working Group How to start planning for iterative cyber DT&E using…

Learn More

Jason Scott Kurtz

Learn More
U.S. Air Force Col. Jonathan Zall, Advanced Battle Management System Cross-Functional Team Capability Integration chief, center, answers participating industry partners questions during the Department of the Air Force’s first Decision Advantage Sprint for Human-Machine Teaming, or DASH, experiment, at the Howard Hughes Operations, or H2O, Center in Las Vegas, Nev., April 8, 2025. This two-week event brought together operational warfighters and industry and Shadow Operations Center-Nellis software developers to prototype microservices aimed at accelerating and improving decision-making in high-tempo battle management scenarios framed by the Transformational Model. (The image has been cropped to focus on the subjects.) (U.S. Air Force photo)

Air Force DASH Sprint Pioneers Human-Machine Teaming for Faster Battle Management Decisions

LAS VEGAS, Nev. – The Department of the Air Force took a bold step toward future command and control capabilities with the successful completion of its first Decision Advantage Sprint for Human-Machine Teaming, or DASH, experiment, recently held at the Howard Hughes Operations Center, or H2O, in Las Vegas, NV. “The DASH experiment showed how machine support can dramatically reduce decision time and improve decision…

Learn More
Members of the team who created the CURBy quantum random number generator. From left to right, Jasper Palfree (University of Colorado Boulder), Gautam Kavuri (NIST) and Krister Shalm (NIST). Credit: NIST

NIST and Partners Use Quantum Mechanics to Make a Factory for Random Numbers

Randomness is incredibly useful. People often draw straws, throw dice, or flip coins to make fair choices. Random numbers can enable auditors to make completely unbiased selections. Randomness is also key in security; if a password or code is an unguessable string of numbers, it’s harder to crack. Many of our cryptographic systems today use random number generators to produce secure keys. But how do…

Learn More
U.S. Cyber Command operators participate in Cyber Guard 25-2 exercise on June 3, 2025, at Fort George G. Meade, MD. The exercise, in coordination with the Joint Staff, simulates scenarios that test response protocols and defensive and offensive techniques across geographic areas of responsibility.

USCYBERCOM Demonstrates Global Cyber Superiority With Cyber Guard 25-2

FORT MEADE, Md. — U.S. Cyber Command launched its annual training exercise Cyber Guard 25-2 on June 2, bringing together elite cyber professionals from across the U.S. Department of Defense to project lethality in cyberspace. Cyber Guard 25-2 focuses on offensive and defensive cyber operations, bringing together military units, government agencies, and allied partners to conduct multidomain, globally coordinated cyber missions. The training emphasizes threat…

Learn More
In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li traced a sweeping arc in visual intelligence and AI — a narrative she hopes ultimately leads to a more human-centered future.

Stanford Professor Discusses Future of Visually Intelligent Machines and Human-AI Collaboration

In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li traced a sweeping arc in visual intelligence and AI — a narrative she hopes ultimately leads to a more human-centered future. Part of the Director’s Distinguished Lecturer Series, the Stanford computer scientist went beyond technical milestones from her two-decade career into her philosophy of intelligence,…

Learn More
OASIC seeks to vastly reduce the cost, set-up time, and support equipment overhead of large quantum research laboratories (pictured) with chipscale technologies (inset) in modular, quickly reconfigurable facilities. Source: Inset image: MIT Lincoln Laboratory; Atomic Physics Laboratory image: Mukund Vengalattore

Small Business Accelerates Transition of Quantum Tech From Lab to Market

Breakthroughs in quantum technologies for computing, sensing, and communications can take decades to transition from laboratory to real-world use. This is, in part, due to the need for extensive laboratory setups to maintain the highly delicate quantum states of atoms, which very quickly lose coherence (i.e., their “quantumness”) when disturbed by the slightest interference of sound, heat, or light. Advances in chip-scale electronics — such…

Learn More
data dots and waves

AI Research to Improve How We Find and Use Critical Information

The University of Maryland Applied Research Laboratory for Intelligence and Security (ARLIS), through its INSURE academic consortium, is supporting a research project to develop context-aware multimodal information retrieval systems – a next-generation capability that could transform how intelligence and security professionals access and analyze complex data. The project, led by Dr. Alan McMillan at the University of Wisconsin and supported by Dr. Michael Brundage at…

Learn More
This is a complicated hybrid network with multiple vulnerabilities, and you can’t just protect it with a simple firewall the way you would if all your assets were inside the Head Office. Zero trust architectures can help. (Credit: N. Hanacek/NIST)

NIST Offers 19 Ways to Build Zero Trust Architectures

If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days when you could keep all your electronic assets inside a single building and construct a firewall between them and the wider internet. Now you have remote workers logging in from distant cities and Cloud-based software applications running elsewhere in a data center. You’ve heard that…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"