CYBERSECURITY

& Information Systems Digest

12 MARCH 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

CSIAC Journal cover page
NEW CSIAC JOURNAL

CSIAC is excited to announce the release of our new CSIAC Journal. This journal features exclusive articles on dark net usage, post-quantum cryptography, software supply chain security, and more.

To view and download this unique publication, visit: https://csiac.org/journals/csiac-2024-volume-8-issue-1/

FEATURED ARTICLE

JFHQ DODIN

JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program

Following a successful nine-month pilot, Joint Force Headquarters — Department of Defense Information Network (JFHQ-DODIN) is officially launching its Cyber Operational Readiness Assessment program. Over the past four years, JFHQ-DODIN has made significant changes to the Defense Department Command Cyber Readiness Inspection program, transforming mindsets from an inspection compliance to an operational readiness underpinning mission…

Read More...

Featured Notable Technical Inquiry

Overarching Wireless Technology Program for the U.S. Air Force

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) was tasked with researching and identifying an all-encompassing wireless technology program for wireless communications on flight lines used by the United States Air Force (USAF). CSIAC identified wireless standards provided by the U.S. Department of Defense (DoD) that should be followed by all DoD programs, employees, and contractors. CSIAC also identified various modern wireless technologies used…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Cyber Security and Digital Data Protection Concept

Uncomfortable Truths About Cybersecurity

In this webinar, participants will drill into the history of cybersecurity and computer science and consider some first principles. Decisions made in the 1970s by the founders of both career fields have not been revisited since, ultimately resulting in the rampant risks faced today. While those with experience may understand these risks – sometimes only…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

Chadi Saliby
Chadi Saliby

Cybersecurity Architect, CISSP, SSCP, CASP+, CySA+, CIGE

Chadi Saliby is an accredited cybersecurity architect and established security strategist and leader who has designed and engineered complex cyber solutions for major private enterprises and government agencies. He has worked with diverse organizations to ensure the protection of sensitive data and uplift their cybersecurity posture by identifying and implementing cybersecurity controls like threat and vulnerability management, incident response, Digital Forensics Incident Response capabilities, and cyber threat hunting and intelligence.

Want to be featured in our Digest?

Submit your "Voice From the Community"