CYBERSECURITY

& Information Systems Digest

18 JULY 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

AFWERX Integrates Uncrewed Traffic Management to Enhance Safety and Security

WRIGHT-PATTERSON AIR FORCE BASE, Ohio (AFRL) – AFWERX and the U.S. Air Force Research Laboratory’s Information Directorate have installed an Uncrewed Aircraft System Traffic Management (UTM) at Eglin Air Force Base, Florida. Equipping Eglin’s Duke Field with the Collaborative Low-Altitude UAS Integration Effort (CLUE) is the next step in AFWERX verifying that current air traffic…

Read More...

Featured Notable Technical Inquiry

The State of 5G Technology and Applications to the U.S. Department of Defense (DoD) and Military

The fifth-generation wireless communication technology, abbreviated “5G,” has the potential to transform communication systems.  The 5G mobile network will deliver higher speeds, lower latency, increased reliability, more network capacity, and increased interconnectivity.  With the deployment, modernization, and implementation of 5G technology into both preexisting and new systems, immense improvements are expected.  In recent years, there has been exponential growth in investments and interest in 5G…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Emerging Developments in Cyberlaw

Information security professionals increasingly need to be familiar with developments in cyberlaw to ensure they comport their actions within the contours of the law.  Unfortunately, with technology changing far faster than the statutes, judges are increasingly being called upon to fill in the gaps.  In this interactive session, facts from actual cases will be presented…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

RonM
Ron McFarland, Ph.D., CISSP

Senior Cybersecurity Consultant

Ron McFarland is a cybersecurity consultant supporting the defense manufacturing industry and California’s supply chain. He has over 30 years of experience in the information technology/computing sectors and STEM (science, technology, engineering, and mathematics). He has led numerous database, systems engineering, and cybersecurity development projects for the financial services, nuclear power services, and defense manufacturing sectors. He has also worked with large and medium-sized organizations to ensure secure software development processes and effective network and software security practices.

Want to be featured in our Digest?

Submit your "Voice From the Community"