CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

Air Force servicemember testing out a flight simulator

2025 Department of the Air Force Modeling & Simulation Summit

The goal of the M&S Summit is to gather Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and to hear our technological leaders’ perspectives on how M&S can transition more training from the real world to digital. The 2025 DAF…

Read More...
Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

DoD CIO Cyber Workforce Summit

The DoD CIO will host the Inaugural Cyber Workforce Summit with support from AFCEA International and the National Defense University. In order to succeed in today’s environment, the Department of Defense must remain aggressive in its innovation and development of the Digital Workforce. This two-day conference will provide a forum where DoD CIO representatives will…

Read More...
Spectral interpretation of a city.

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions align with urban challenges. This spring, Smart Cities Connect Spring Conference & Expo will delve into the critical aspects, strategies, and…

Read More...
A night-time image of a city overlayed with hexagonal indicators.

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health, or safety. The Critical Infrastructure Protection and Resilience North America conference will again bring…

Read More...
Illustration of a globe overlayed with Cyber Security.

2025 DoD Cybersecurity & SAP IT Summit

WELCOME to the 2025 Department of Defense Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and shape the future for protecting the DoD’s information, networks, systems, and infrastructure. Navigating and succeeding in an era of ever evolving…

Read More...
AI Generated image of a holographic globe centered in a diagram of structures

Homeland Security Cybersecurity and Infrastructure Conference

The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military, and academic sectors. Today’s infrastructure is connected to many other infrastructure assets, systems, and networks for normal day-to-day operations. These…

Read More...
man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability CVE-2024-9474 Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability Users and administrators are also encouraged to review…

Read More...
Heidi Massey (left), chief of U.S. Army Sustainment Command’s G6 (Information Management) directorate’s Program Management Division, meets with an employee in her division. The Program Management Division is responsible for ensuring compliance... (Sarah Ridenour)

Effective, Efficient Communication Enables Logistics Capabilities for the Warfighter

ROCK ISLAND ARSENAL, Ill. – How many times a day do you join a video conference, take a phone call, send an instant message, or respond to an email? None of these communication capabilities would be possible for the U.S. Army Sustainment Command workforce without the G6 (Information Management) directorate. ASC provides soldiers across the…

Read More...
line of computer terminals

Everything You Always Wanted to Know About Large Language Models for Science (But Were Afraid to Ask)

Chat-GPT, DALL-E and other artificial intelligence (AI) tools based on large language models (LLMs) are causing seismic shifts in the way people create and communicate. Users can interact with these ​“chat bot” LLMs by asking or typing a question in plain language rather than by learning a complicated computer code. And the results come nearly…

Read More...
man with headphones on standing next to computer terminal

Standing Guard Against Network Invaders

Anyone who has flown on a commercial flight, crossed an international border, visited a government building, or attended a concert knows you’re not getting inside until you pass the security guards. Placing guards outside the gates is a centuries-old defense strategy used to protect people, places, and things from those who seek to do harm….

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"