CYBERSECURITY

& Information Systems Digest

3 SEPTEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DOD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful organizational scheme. The use of colors, fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to download the latest version.

FEATURED ARTICLE

CISA Releases Secure by Demand Guide

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the “Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem,” which helps organizations buying software better understand their software manufacturers approach to cybersecurity and ensure that secure by design is one of their core considerations….

Read More...

Featured Notable Technical Inquiry

Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

The Cybersecurity & Information Systems Information Analysis Center performed open-source research and obtained white papers and reports from numerous sources to include the Defense Technical Information Center Research and Engineering Gateway and Elsevier’s ScienceDirect.  Overall, the research showed that the best way to counter artificial intelligence (AI) offensive tools was with AI defensive tools.  The resulting research is described in detail.  This TI response report…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making contractor information systems subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171,…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

Tom Burns_headshot
Thomas Burns

Engineering Manager, Kawasaki Railcar, Inc.

Thomas Burns is an engineering manager in operational technology for Kawasaki Railcar, where he oversees cybersecurity in the global supply chain. He acquires embedded software within the systems for integration into fleets of passenger railcars and tests electromagnetic interference/compatibility. He also manages software requirement compliance and ensures best practices are followed as outlined by the Software Engineering Institute and the Information Systems Audit and Control Association’s Capability Maturity Model Integration framework.

Want to be featured in our Digest?

Submit your "Voice From the Community"