CYBERSECURITY

& Information Systems Digest

2 July 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DoD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful
colors fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to view and download the latest chart.

FEATURED ARTICLE

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure,…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum computer attacks. In this webinar, a novel quantum protocol addressing security and privacy issues in the current network environment will…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

chuckrogal
Chuck Rogal

BS Geology, University of Pittsburgh at Bradford MS Computer Science, SUNY-Binghamton

Chuck Rogal’s career path has been crooked. He began working in 1985 at Teledyne Brown Engineering. He worked on a communications upgrade for the Cheyenne Mountain Complex as an Independent Validation & Verification (IV&V) Engineer. This initial role provided a good look at the DOD acquisition process. The role also included work on some early warning radar programs. He then took on a Systems Engineering challenge by writing documents (Descriptions and an ICD) for the same program. A move into Software Engineering afforded him to design a model and teach others about programming in Ada. After some time, he became a Program Manager for an enterprise network design and installation at the Office of Naval Intelligence at Suitland, MD. He then moved to a start-up for the commercial telecom industry. From there, he returned back to Software Engineering writing code for an optical simulation. That work led back to doing commercial software development. The dot.com disaster in 2001 led to returning to DOD work as a Systems Engineer. He then moved back to Software Engineering at the same company which after several years culminated in a Software Architect position. A better opportunity came along so he moved on to a Systems Engineering role for an airborne optical application. He retired from that position in 2020. Since then, he has been a consulting MBSE Architect on two programs.

Want to be featured in our Digest?

Submit your "Voice From the Community"