Cyber and Technical Terms of Reference for U.S. Department of Defense (DoD) and Service-Level Policy
Does a cyber and technical terms of reference exist that syncs with DoD- and service-level policy? If not, could you help us generate one?
Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
Does a cyber and technical terms of reference exist that syncs with DoD- and service-level policy? If not, could you help us generate one?
What are the requirements and guidelines (e.g., STIGs) for an IL4 environment in Azure?
What is the latest guidance on cybersecurity supply chain risk management?
FORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the Army’s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding General…
How can we glean useful insights from databases containing confidential information while protecting the privacy of the individuals whose data is contained within? Differential privacy, a way of defining privacy in a mathematically rigorous manner,…
WASHINGTON – The U.S. Army has released its Army Unified Network Plan (AUNP) 2.0. While the first AUNP, published in 2021, focused mainly on the first phase of the plan – to unifying the network…
The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…
In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…
Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…
The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military,…