CYBERSECURITY

& Information Systems Digest

5 NOVEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

social media icons with network grid on top
SOCOM Social Media Smart Cards

People can easily get information about you through your online presence with a quick internet search. It is important to know what information about you is publicly available, and then decide what to do about unwanted information.

The U.S. Special Operations Command (SOCOM) has released SOCOM Social Media Smart Cards, a guide to help you evaluate your social media accounts and available data aggregator websites to determine if unwanted information is out there about you. The guide includes best safety practices for social networking platforms, digital ecosystems, and devices (i.e., fitness apps, smart phones, and gaming systems.)

Click here to view the SOCOM Social Media Smart Cards guide:

https://www.socom.mil/documents/ussocomsocialmediasmartcards.pdf

FEATURED ARTICLE

The U.S. Army Research Laboratory uses the “Shaker” to conduct experiments in multiaxial vibrations and develop technology to mitigate the danger it could cause to vehicles and structures, Sept. 26, 2019.

DoD Simplifies Process for Defense Contractors to Comply With Cybersecurity Rules

The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which make it simpler for private sector companies to comply with the cybersecurity requirements that must be in place before they can bid on defense contracts. The Department’s cybersecurity maturity model certification program, also called CMMC,…

Read More...

Featured Notable Technical Inquiry

Current Landscape and Technologies of Binary Code Scanning Tools

This technical inquiry report provides information on the current landscape and technologies used to scan firmware samples for detection of cyber vulnerabilities.  The aim of this research is to identify and describe what binary code scanning (also called binary code analysis [BCA]) tools exist to scan firmware samples for the detection of cybervulnerabilities.  The Cybersecurity & Information Systems Information Analysis Center subject matter experts researched…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

shield

Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD

The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defense’s (DoD’s) AI ethical principles while capitalizing on opportunities for innovation.  It is intended to enable personnel working throughout an AI system’s life cycle to assess the system’s…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

Jeff West headshot
Jeff West

Solutions Architect Director, SAIC

Jeff West is a solutions architect director (SAIC’s Army Business Group) supporting the U.S. Army C5ISR Center’s Quick Reaction Capability and several C2 internal research and development efforts. He has supported several C5ISR ACAT I/II programs, as well as numerous RDT&E projects and programs, in requirements definition, developing technology roadmaps, onboarding new technologies, and implementing DevSecOps and Agile processes.

Want to be featured in our Digest?

Submit your "Voice From the Community"