CYBERSECURITY

& Information Systems Digest

1 APRIL 2025

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Free image on Freepik stock image website
JOIN US FOR A BROWN BAG
CSIAC offers “brown bag” sessions to provide greater insight into our services​. These informal meetings last about 30 minutes and can be held virtually. We can host meetings for any size team and cater topics to your specific areas of interest. Most of our services are free to military personnel, federal government users, and supporting academia and industry partners.

 

Contact us at contact@csiac.org to learn more and schedule your brown bag today.​

FEATURED ARTICLE

NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption

Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike. Encryption protects sensitive electronic…

Read More...

Featured Notable Technical Inquiry

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

A privacy impact assessment (PIA) is an essential element for effective privacy by design. It enables privacy leaders to be assured that the privacy controls’ implementation satisfies regulations and organizational requirements and is key to determining what steps must be taken to manage privacy risk for the organization. The standard ISO 29134 (Guidelines for Privacy Impact Assessment, June 2017) defines a PIA as the overall…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective and innovative policy approaches to inform global standards. The countries assessed are Australia, Germany, Japan, Singapore, South Korea, the United…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

Joshua_Sipper_1x1
Dr. Joshua A. Sipper

Assistant Professor of Military and Security Studies, U.S. Air Force Air Command and Staff College (ACSC)

Dr. Sipper has over 26 years of experience in intelligence, surveillance, and reconnaissance (ISR); electromagnetic warfare (EW); and cyber operations. He teaches Airpower Operations and Strategy and Contemporary and Emerging Warfare at ACSC. Additionally, he is the co-director of the Cyber Advanced Operations and Strategy Seminar (CAOSS), teaching ISR and Cyberspace and Cyber and EW. Dr. Sipper is the author of numerous articles and book chapters concerning cyber operations, ISR, and EW. He is also the author of several books including his most recent title, “The Cyber Meta-reality: Beyond the Metaverse.”

Want to be featured in our Digest?

Submit your "Voice From the Community"