Simulation-Based Testing for DoD Software
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe Department of Homeland Security Science and Technology (DHS S&T) cyber community of interest (COI) and the Networking and Information Technology Research and Development (NITRD) Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) are excited to once again co-host the workshop on protecting the software and hardware supply chain. This year’s focus is on methods to measure and/or demonstrate improvements to software and […]
Learn MoreThe Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and providing information on open standards applicable to zero trust implementation. CSIAC identified various open standards being used today that support and uphold the implementation of the zero trust architecture within the U.S. Department of Defense.
Learn MoreCOMING SOON – EXACT DATE AND TIME TBD. This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related policies and procedures. The publication “Advancing Risk Management Capability Using the OCTAVE FORTE Process” helps gain an understanding of the framework and underpinnings of this discussion. This presentation allows the […]
Learn MoreAs more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to share. Engineers are employing artificial intelligence to dynamically manage the available wireless spectrum, with an eye toward reducing latency and boosting performance. But most AI methods for classifying and processing […]
Learn MoreWhile breakthrough results over the past few years have garnered headlines proclaiming the dawn of quantum supremacy, they have also masked a nagging problem that researchers have been staring at for decades: Demonstrating the advantages of a quantum computer is only half the battle; verifying that it has produced the right answer is just as important. Now, researchers at JQI and the University of Maryland […]
Learn MoreIn today’s hyperconnected world, wireless communication faces a critical challenge known as the “spectrum crunch.” Spectrum crunch results from more devices vying for limited frequencies, creating an overcrowded radio frequency spectrum — a bottleneck that disrupts communication. Spectrum crunch threatens not only everyday conveniences like cellphone connectivity but also essential services, such as emergency response times, global positioning systems, and military operations. When Hussein Moradi […]
Learn MoreThe Defense Advanced Research Projects Agency announced a Resilient Software Systems Accelerator program to kick-start the widespread adoption of math-based software development practices to make military systems inherently more secure against cyberthreats. During the Resilient Software Systems Colloquium held in Arlington, Virginia, leaders from the Defense Department, DARPA, and industry spoke about aging IT infrastructure, security standards, and software tools and techniques known as “formal […]
Learn MoreImagine deploying a secure, compliant Cloud environment in weeks, not months. That’s the reality for the 60 customers now using the Defense Information Systems Agency’s Department of Defense Cloud Infrastructure as Code (IaC). The DISA J-9 Hosting and Compute team is leading the effort and celebrates this milestone as a major leap forward in simplifying and accelerating cloud adoption across the Department. DoD Cloud IaC […]
Learn MoreCSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention. With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…
Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…
National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…
ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…
CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…
The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…
Senior Vice President, Intelligence Programs at Owl Cyber Defense
Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.
The latest releases from the Cybersecurity & Information Systems Information Analysis Center (CSIAC).
Submit your "Voice From the Community"