CYBERSECURITY

& Information Systems Digest

12 OCTOBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

New Online Tool to Improve Stakeholder Engagement with Security and Privacy Controls

NIST has improved the usability of their most downloaded NIST publication, Special Publication (SP) 800-53. NIST has now made it available in additional data formats (e.g., CSV, XML, OSCAL, and online) and has improved the overall accessibility of the document. In response to suggestions (and in the spirit of the NIST publication development principles), NIST…

Read More...

Featured Notable Technical Inquiry

Challenges in Applying the Law of Armed Conflict to Cyberwar

On June 17, 2010, a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1,000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency (IAEA) [1]. While the identity of the perpetrators…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

President’s Cup Cybersecurity Competition: Building a Competition Across the Federal Workforce

In 2019, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) held the first cybersecurity competition for the federal workforce. The goal of the President’s Cup Cybersecurity Competition is “to identify, challenge, and reward the United States government’s best cybersecurity practitioners and teams across offensive and defensive cybersecurity disciplines.” To be able to…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

Michael Williams
MIchael G. Williams

Lead Senior Security Engineer, Joint Environment Toolset (JET), Raytheon Intelligence & Space

I am a technical staff member subject matter expert with nearly 25 years of expertise in systems, network, and security life cycle engineering and architecture. As a senior security engineer, I have supported several large infrastructure and system engineering and deployment projects, including engineering, deploying, and implementing all the security tools for a new DoD facility and engineering and deploying several security tools for a DoD on-prem private cloud solution. My background is in management information systems, telecommunications, and information assurance. I am an expert with several security tools, security techniques, risk assessments, accreditation, compliance, and Internet of Things security. I hold a Ph.D. in computer engineering.

Want to be featured in our Digest?

Submit your "Voice From the Community"