Simulation-Based Testing for DoD Software
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmWe just completed updates to our IT systems which restricts your access to our member portal. For more information about the changes, please visit this page. Should you experience any issues or have any questions, you can reach us at contact@csiac.org.
Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and industry come together to tackle security challenges facing the US Homeland. Recent developments have highlighted the need for technology, strategies, and approaches to bolster the homeland security efforts of the […]
Learn MoreModernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging the gap between the key stakeholders, encouraging collaborative partnerships, and providing access to unique expertise. EDT for Defense will bring together senior leaders from the US DoD and partners from […]
Learn MoreFrom the Wars in Ukraine and Gaza, to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation state is monitoring borders for troop buildups through ISR in peacetime or denying vital data and information to their enemy through electronic attack during high-intensity conflict, superiority in the electromagnetic spectrum will be […]
Learn MoreWelcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness and homeland defense facing our nation. The theme this year is “Securing the Future: Cyber Capabilities, All-Domain Superiority, and Strategic Advantage.” […]
Learn MoreThe future is being built at an ever-accelerating rate, as Generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms. People have new expectations of what work is and are looking for skills to help navigate the practices that are needed for success. Gartner IT Infrastructure, Operations & Cloud Strategies […]
Learn MoreFORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and others in releasing a Cybersecurity Advisory (CSA), “Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations,” to warn network defenders of malicious activity that can enable persistent access in sensitive systems. Since October 2023, Iranian cyber […]
Learn MoreAuthoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate freely with each other. In response, the internet freedom and national security communities manually design hidden networks with ad hoc techniques, empirically validate them, and then deploy them in the hope that users are not discovered. Over the years, Congress has consistently allocated funds for […]
Learn MoreWASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad Practices for public comment today. This catalog outlines practices that are deemed exceptionally risky and provides recommendations for software manufacturers to mitigate these risks. It urges software manufacturers to avoid these bad practices, especially those who produce software used in service of critical infrastructure or […]
Learn MoreThe Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts as part of its Cybersecurity Maturity Model Certification program, or CMMC. The first contracts with those requirements built in are expected sometime in 2025. But for small businesses who might not have the resources to meet stringent cybersecurity requirements on their own, the Army is […]
Learn MoreWhen you hear about AI in the news, it sounds as if the robots of science fiction will be taking over soon. What isn’t as commonly covered is how much potential it has to make things safer from a cybersecurity perspective. The sheer volume of data it can process in a compressed period of time and then, contextualizing that data using ML, have vast implications […]
Learn MoreCSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention. With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…
The State of Texas has been leading the way in cybersecurity solutions. This has been an ongoing driving force for collaboration and dynamic change in the state. Many acknowledge the serious threats that cyberattacks pose…
Defense Strategies Institute’s (DSI’s) 12th Annual Big Data for Intelligence Symposium will convene senior leaders from across the intelligence community, Department of Defense, federal government, academia, and industry to discuss the prioritization of data as…
The National Defense Industrial Association (NDIA) – Southwest Chapter, Arizona InfraGard/Arizona Cyber Threat Response Alliance (ACTRA), AFCEA – Tucson, and the AZ Cyber Initiative are collaborating to organize the 9th Annual Cyber Southwest (CSW) Symposium….
The Annual International Association of Emergency Managers (IAEM) conference & EMEX is tailored toward first responder and emergency management organizations to inform on best practices and lessons learned with Big Data, modeling and simulation capabilities,…
C4ISR USA 2024 is focused on shaping the future of military readiness and navigating today’s cyber challenges. The landscape of modern warfare is evolving with an accelerated tempo, increasing complexity, and the need for decentralized…
Senior Vice President, Intelligence Programs at Owl Cyber Defense
Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.
The latest releases from the Cybersecurity & Information Systems Information Analysis Center (CSIAC).
Submit your "Voice From the Community"