CYBERSECURITY

& Information Systems Digest

18 JULY 2023

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

AFWERX Integrates Uncrewed Traffic Management to Enhance Safety and Security

WRIGHT-PATTERSON AIR FORCE BASE, Ohio (AFRL) – AFWERX and the U.S. Air Force Research Laboratory’s Information Directorate have installed an Uncrewed Aircraft System Traffic Management (UTM) at Eglin Air Force Base, Florida. Equipping Eglin’s Duke Field with the Collaborative Low-Altitude UAS Integration Effort (CLUE) is the next step in AFWERX verifying that current air traffic…

Read More...

Featured Notable Technical Inquiry

The State of 5G Technology and Applications to the U.S. Department of Defense (DoD) and Military

The fifth-generation wireless communication technology, abbreviated “5G,” has the potential to transform communication systems.  The 5G mobile network will deliver higher speeds, lower latency, increased reliability, more network capacity, and increased interconnectivity.  With the deployment, modernization, and implementation of 5G technology into both preexisting and new systems, immense improvements are expected.  In recent years, there has been exponential growth in investments and interest in 5G…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Emerging Developments in Cyberlaw

Information security professionals increasingly need to be familiar with developments in cyberlaw to ensure they comport their actions within the contours of the law.  Unfortunately, with technology changing far faster than the statutes, judges are increasingly being called upon to fill in the gaps.  In this interactive session, facts from actual cases will be presented…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

RonM
Ron McFarland, Ph.D., CISSP

Senior Cybersecurity Consultant

Ron McFarland is a cybersecurity consultant supporting the defense manufacturing industry and California’s supply chain. He has over 30 years of experience in the information technology/computing sectors and STEM (science, technology, engineering, and mathematics). He has led numerous database, systems engineering, and cybersecurity development projects for the financial services, nuclear power services, and defense manufacturing sectors. He has also worked with large and medium-sized organizations to ensure secure software development processes and effective network and software security practices.

Want to be featured in our Digest?

Submit your "Voice From the Community"