Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Can CSIAC provide information on threat criticality and threat analysis tools to support a security assistance assessment visit?

Can information be provided on threat criticality and threat analysis tools to support a security assistance assessment visit?

Are there any secured options for domains or applications to serve as a controlled unclassified information data repository/processing node for programming tools?

Are there any secured options for domains or applications to serve as a controlled unclassified information data repository/processing node for programming tools?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

Articles

F
Satellites

Cyberspace Security – Low Earth Orbit

As satellites become increasingly integral to global communication, navigation, and surveillance, targeting their vulnerabilities by malicious actors to disrupt services or gain sensitive information will be imminent to maintain cyberspace security.

F
virtual road to CMMC

The CMMC Transition and Its Cybersecurity Implications

This article provides information on the U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) program and where it originates.

F
poison apple feeding into AI

AI Hacking: Deceptive Behaviors as Cyber Weapons

In the perpetually evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force, promising unparalleled advancements across a spectrum of military applications.

Webinars

Deceptive AI: Understanding and Defending Against the Next Generation of Cyber Weapons

In the evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force and new frontier of vulnerabilities. This presentation provides a critical analysis of the deceptive behaviors used to turn AI…

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring…

Events

graphic of soldier holding digital world

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

A hand overlayed by a virtual padlock and the words "Cyber security".

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

AI Generated image of a holographic globe centered in a diagram of structures

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…