Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Tracking Device Detection

What are the TRL-9 available capabilities that can detect common tracking devices?

Risk Management Framework Requirements

Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?

Overarching Wireless Technology Program for the U.S. Air Force

Is there an overarching Wi-Fi program for the U.S. Air Force?

Articles

F
graphic of soldiers walking toward a mountain in the background with digital lines going past them

ARCYBER Data Management and Analytics Directorate

FORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the Army’s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding General…

F

NIST Finalizes Guidelines for Evaluating “Differential Privacy” Guarantees to De-identify Data

How can we glean useful insights from databases containing confidential information while protecting the privacy of the individuals whose data is contained within? Differential privacy, a way of defining privacy in a mathematically rigorous manner,…

F

Army Releases Version 2.0 of Its Unified Network Plan

WASHINGTON – The U.S. Army has released its Army Unified Network Plan (AUNP) 2.0. While the first AUNP, published in 2021, focused mainly on the first phase of the plan – to unifying the network…

Webinars

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

hand writing on screen with AI written on it

A Multilayered Defense Strategy Against Adversarial AI Attack

In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Events

training flyer

Cyber Training Range Course

COURSE REGISTRATION TO INCLUDE THE WAITLIST IS NOW COMPLETELY FULL. CSIAC is pleased to announce it is partnering with the Defense Acquisition University to offer the federal government and their contractors a Cyber Training Range…

A night-time image of a city overlayed with hexagonal indicators.

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…

Illustration of a globe overlayed with Cyber Security.

2025 DoD Cybersecurity & SAP IT Summit

Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…