Simulation-Based Testing for DoD Software
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThis webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber Operational Readiness Assessment (CORA) data into actionable insights via MITRE ATT&CK Navigator heatmaps, providing users with comprehensive statistical processing for easy gap identification and security hardening. Building upon CRISP’s foundational […]
Learn MoreThe Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on agentic artificial intelligence systems being implemented within the U.S. Department of Defense. CSIAC is looking to understand the current state of knowledge regarding the design, capabilities, deployment, and oversight of these systems. If you have expertise or points of contact related to this inquiry, please contact Joseph Friar (joseph.m.friar.ctr@mail.mil), the CSIAC analyst […]
Learn MoreCOURSE REGISTRATION TO INCLUDE THE WAITLIST IS NOW COMPLETELY FULL. CSIAC is pleased to announce it is partnering with the Defense Acquisition University to offer the federal government and their contractors a Cyber Training Range (CTR) course from July 22 to July 24, 2025. This FREE, virtual, instructor-led training course provides hands-on laboratory exploration of adversarial cyber threats to U.S. Department of Defense (DoD) networks […]
Learn MoreThe Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on collaboration and survey tools accessible to common access card (CAC) and non-CAC team members. This includes identifying tools that support secure document sharing, real-time collaboration, and survey distribution for mixed access teams. Examples of interest include SurveyMonkey, Zoho, and Notion. The goal is to facilitate collaboration between individuals working across CAC-enabled and […]
Learn MoreThe Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify secure options for domains or applications to serve as a closed data repository that can be used to develop analysis programs from deposited data and as a data library capable of handling controlled unclassified information (CUI). Commercial and noncommercial solutions that can be accessed online via Defense Department computers, commercial computers, or […]
Learn MoreQuantum information scientists at the Department of Energy’s Oak Ridge National Laboratory successfully demonstrated a device that combines key quantum photonic capabilities on a single chip for the first time. The study published in Optica Quantum focused on a type of quantum computing that relies on light particles, or photons, to build qubits and to store and transmit information. Qubits, unlike the binary bits used […]
Learn MoreWaveforms like Wi-Fi, 4G/5G, and Bluetooth satisfy the general population’s basic wireless communication and information sharing needs, but the static nature of these fixed waveforms is vulnerable to instability. Decades often pass between updated versions of wireless protocols. The ability to quickly conduct point-to-point communications across dynamic environments – from secure facilities to “the wild” – is integral to the national security mission. While U.S. […]
Learn MoreFor the first time, U.S. Army Engineer Research and Development Center (ERDC) personnel are working with Army boat pilots to enhance virtual reality and simulation software to take training and mission planning for critical river crossings to the next level. Recently, soldiers with the 74th Multi-Role Bridging Company at Fort Cavazos, Texas, spent three days working with the team at the U.S. Army Watercraft and […]
Learn MoreDARPA has entered a cooperative research and development agreement with the Digital Safety Research Institute (DSRI) of UL Research Institutes to continue advancing the research of detection, attribution, and characterization of AI-generated media. The threat of manipulated media – audio, images, video, and text – has grown recently as automated manipulation technologies become more accessible, and social media continues to provide a ripe environment for […]
Learn MoreFORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the Army’s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding General of ARCYBER, appointed Deputy to the Commanding General Jeff Jones as the Command Chief Data and Analytics Officer (C2DAO). In alignment with the ARCYBER Command Plan 27, the Technical Warfare […]
Learn MoreCSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention. With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…
The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…
Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…
Senior Vice President, Intelligence Programs at Owl Cyber Defense
Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.
The latest releases from the Cybersecurity & Information Systems Information Analysis Center (CSIAC).
Submit your "Voice From the Community"