CYBERSECURITY

& Information Systems Digest

22 NOVEMBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Featured Notable Technical Inquiry

A hand overlayed by a virtual padlock and the words "Cyber security".

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and industry come together to tackle security challenges facing the US Homeland. Recent developments have highlighted the need for technology, strategies, and approaches to bolster the homeland security efforts of the […]

Learn More
AI generated image of warfighter figures operating on a circuit.

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging the gap between the key stakeholders, encouraging collaborative partnerships, and providing access to unique expertise. EDT for Defense will bring together senior leaders from the US DoD and partners from […]

Learn More
Soldiers from the 94th Army Air and Missile Defense Command, track an unmanned aerial systems (UAS) threat during a scenario as part of Black Dart 18 on Muscatatuck Urban Training Center, Indiana.

61st Annual AOC International Symposium & Convention

From the Wars in Ukraine and Gaza, to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation state is monitoring borders for troop buildups through ISR in peacetime or denying vital data and information to their enemy through electronic attack during high-intensity conflict, superiority in the electromagnetic spectrum will be […]

Learn More
Military Personnel operating computer next to military aircraft

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness and homeland defense facing our nation. The theme this year is “Securing the Future: Cyber Capabilities, All-Domain Superiority, and Strategic Advantage.” […]

Learn More
Silhouette of a person observing multiple monitors with generic imagery

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as Generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms. People have new expectations of what work is and are looking for skills to help navigate the practices that are needed for success. Gartner IT Infrastructure, Operations & Cloud Strategies […]

Learn More
CSA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations Graphic

Iranian Cyber Actors Access Critical Infrastructure Networks

FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and others in releasing a Cybersecurity Advisory (CSA), “Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations,” to warn network defenders of malicious activity that can enable persistent access in sensitive systems. Since October 2023, Iranian cyber […]

Learn More
DARPA’s Provably Weird Network Deployment and Detection (PWND2) logo with network connection graphics

A New Kind of Hidden Networking Science

Authoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate freely with each other. In response, the internet freedom and national security communities manually design hidden networks with ad hoc techniques, empirically validate them, and then deploy them in the hope that users are not discovered. Over the years, Congress has consistently allocated funds for […]

Learn More
cyber red X

CISA and FBI Release Product Security Bad Practices for Public Comment

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad Practices for public comment today. This catalog outlines practices that are deemed exceptionally risky and provides recommendations for software manufacturers to mitigate these risks. It urges software manufacturers to avoid these bad practices, especially those who produce software used in service of critical infrastructure or […]

Learn More
green outlines of circles interconnected with green squares

Army Announces Effort to Help Small Business Meet Cybersecurity Requirements

The Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts as part of its Cybersecurity Maturity Model Certification program, or CMMC. The first contracts with those requirements built in are expected sometime in 2025. But for small businesses who might not have the resources to meet stringent cybersecurity requirements on their own, the Army is […]

Learn More
DHS Artificial Intelligence Roadmap 2024. Photo credit: DHS.

Feature Article: Leveraging AI to Enhance the Nation’s Cybersecurity

When you hear about AI in the news, it sounds as if the robots of science fiction will be taking over soon. What isn’t as commonly covered is how much potential it has to make things safer from a cybersecurity perspective. The sheer volume of data it can process in a compressed period of time and then, contextualizing that data using ML, have vast implications […]

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Simulation-Based Testing for DoD Software

The discipline of software testing is changing to align with the automated processes of Agile DevSecOps.  Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention.  With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…

Read More...

UPCOMING EVENTS

Government Cybersecurity Roadshow Texas

The State of Texas has been leading the way in cybersecurity solutions. This has been an ongoing driving force for collaboration and dynamic change in the state. Many acknowledge the serious threats that cyberattacks pose…

Big Data for Intelligence Symposium

Defense Strategies Institute’s (DSI’s) 12th Annual Big Data for Intelligence Symposium will convene senior leaders from across the intelligence community, Department of Defense, federal government, academia, and industry to discuss the prioritization of data as…

9th Annual Cyber Southwest Symposium

The National Defense Industrial Association (NDIA) – Southwest Chapter, Arizona InfraGard/Arizona Cyber Threat Response Alliance (ACTRA), AFCEA – Tucson, and the AZ Cyber Initiative are collaborating to organize the 9th Annual Cyber Southwest (CSW) Symposium….

IAEM Annual Conference & EMEX 2024

The Annual International Association of Emergency Managers (IAEM) conference & EMEX is tailored toward first responder and emergency management organizations to inform on best practices and lessons learned with Big Data, modeling and simulation capabilities,…

C4ISR USA 2024

C4ISR USA 2024 is focused on shaping the future of military readiness and navigating today’s cyber challenges. The landscape of modern warfare is evolving with an accelerated tempo, increasing complexity, and the need for decentralized…

Voice From the Community

Wilson_Art - Headshot
Art Wilson

Senior Vice President, Intelligence Programs at Owl Cyber Defense

Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.

Want to be featured in our Digest?

Submit your "Voice From the Community"