CYBERSECURITY

& Information Systems Digest

2 July 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DoD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful
colors fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to view and download the latest chart.

FEATURED ARTICLE

NIST Launches ARIA, a New Program to Advance Sociotechnical Testing and Evaluation for AI

The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation, and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Risks and Impacts of AI (ARIA) aims to help organizations and individuals determine whether a given AI technology will be valid, reliable, safe, secure,…

Read More...

Featured Notable Technical Inquiry

Artificial Intelligence (AI)/Machine-Learning (ML) Transition Timetable

Cybersecurity and Information Systems Information Analysis Center (CSIAC) subject matter experts from BluePath Labs (BPL) attempted to answer how fast the PRC can transition AI/ML technologies from the lab to the field. Although information was difficult to obtain using open sources, they found that the speed of transition depended on sector and technology.   According to a news article from June 2021 [1], the general…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum computer attacks. In this webinar, a novel quantum protocol addressing security and privacy issues in the current network environment will…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

DoD Cyber Workforce Summit

The DoD CIO will host the Inaugural Cyber Workforce Summit with support from AFCEA International and the National Defense University. To succeed in today’s environment, the U.S. Department of Defense must remain aggressive in its…

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Voice From the Community

chuckrogal
Chuck Rogal

BS Geology, University of Pittsburgh at Bradford MS Computer Science, SUNY-Binghamton

Chuck Rogal’s career path has been crooked. He began working in 1985 at Teledyne Brown Engineering. He worked on a communications upgrade for the Cheyenne Mountain Complex as an Independent Validation & Verification (IV&V) Engineer. This initial role provided a good look at the DOD acquisition process. The role also included work on some early warning radar programs. He then took on a Systems Engineering challenge by writing documents (Descriptions and an ICD) for the same program. A move into Software Engineering afforded him to design a model and teach others about programming in Ada. After some time, he became a Program Manager for an enterprise network design and installation at the Office of Naval Intelligence at Suitland, MD. He then moved to a start-up for the commercial telecom industry. From there, he returned back to Software Engineering writing code for an optical simulation. That work led back to doing commercial software development. The dot.com disaster in 2001 led to returning to DOD work as a Systems Engineer. He then moved back to Software Engineering at the same company which after several years culminated in a Software Architect position. A better opportunity came along so he moved on to a Systems Engineering role for an airborne optical application. He retired from that position in 2020. Since then, he has been a consulting MBSE Architect on two programs.

Want to be featured in our Digest?

Submit your "Voice From the Community"