CYBERSECURITY

& Information Systems Digest

2 APRIL 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

AI SSC
STATE-OF-THE-ART REPORT (SOAR) PUBLISHED

CSIAC is pleased to announce the publication of our latest SOAR “Applications of Artificial Intelligence (AI) for Protecting Software Supply Chains (SSCs) in the Defense Industrial Base (DIB).”

To view and download this unique publication, please visit:  https://csiac.org/state-of-the-art-reports/applications-of-artificial-intelligencefor-protecting-software-supply-chainsin-the-defense-industrial-base/.

FEATURED ARTICLE

face

Deepfake Defense Tech Ready for Commercialization, Transition

The threat of manipulated media has steadily increased as automated manipulation technologies become more accessible and social media continues to provide a ripe environment for viral content sharing. The speed, scale, and breadth at which massive disinformation campaigns can unfold require computational defenses and automated algorithms to help humans discern what content is real and…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To manage these risks, organizations must ensure the integrity of their supply chain and its products and services. Addressing the most…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

dr fuzzy wells
Dr. David “Fuzzy” Wells, CMSP

Principal Cyber Simulationist, The MITRE Corporation

Dr. Wells is an event director for the National Cyber Range Complex and the former director of U.S. Indo-Pacific Command’s Cyber War Innovation Center, where he built the first combatant command venue for cyber testing, training, and experimentation; managed the Command’s joint cyber innovation and experimentation portfolio; and executed cyber range testing and training events for service, joint, and coalition partners. He is currently working to operationalize an integrated cyber range/simulation/effects prototype for combatant command training and exercises.

Want to be featured in our Digest?

Submit your "Voice From the Community"