CYBERSECURITY

& Information Systems Digest

4 FEBRUARY 2025

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

https://www.biometricupdate.com/202104/bio-key-biometric-access-control-deal-expands-as-large-organizations-secure-remote-workers
KNOWN EXPLOITED VULNERABILITIES (KEV) CATALOG
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—the Cybersecurity & Infrastructure Security Agency (CISA) maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.
​Click here to learn more:  ​https://www.cisa.gov/known-exploited-vulnerabilities-catalog.

FEATURED ARTICLE

CSI: Closing the Software Understanding Gap graphic

NSA Jointly Releases Recommendations for Closing the Software Understanding Gap

FORT MEADE, Md. – A report released by the National Security Agency (NSA), the Cybersecurity and Infrastructure Agency (CISA), the Defense Advanced Research Projects Agency (DARPA), and the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E) urges a national effort to better understand the behavior of software underpinning national security…

Read More...

Featured Notable Technical Inquiry

What is the operational system risk imposed by the infrastructure deployment pipeline workflow?

Real-time data monitoring of systems and system forensics is an essential aspect to keeping your data security platform safe when relying on the use of Infrastructure as Code (IaC) and the potential vulnerabilities associated with its continuous deployment (CD). Many organizations are facing an information overload and are inadequately prepared for understanding and designing a cyber incident response plan with near-real-time monitoring, including detection, analysis…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies:  (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development in the U.S. Department of Defense (DoD) since the late 1960s, it has continued to see major advancements in recent…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

Dave_Pekala_Headshot
David Pekala, MBA, PMP, GCIH, GSEC

Technical Director, NextGen Federal Systems, LLC

Dave Pekala supports the Army Analytics Solution to Establish Real-Time Operational Information Dominance Unified Data Reference Architecture effort as a data and Zero Trust subject matter expert. His focus is on information domination, digital transformation with DevSecOps, the StratusML platform for artificial intelligence, and Army intelligence systems.
ractices with digital engineering, including advanced modeling and simulation services supporting Joint Simulation Environment for weather effects.

Want to be featured in our Digest?

Submit your "Voice From the Community"