CYBERSECURITY

& Information Systems Digest

3 SEPTEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

red lock on computer board
THE DOD CYBERSECURITY POLICY CHART

The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous scope of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful organizational scheme. The use of colors, fonts, and hyperlinks is designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems, and data.

Click HERE to download the latest version.

FEATURED ARTICLE

CISA Releases Secure by Demand Guide

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the “Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem,” which helps organizations buying software better understand their software manufacturers approach to cybersecurity and ensure that secure by design is one of their core considerations….

Read More...

Featured Notable Technical Inquiry

Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

The Cybersecurity & Information Systems Information Analysis Center performed open-source research and obtained white papers and reports from numerous sources to include the Defense Technical Information Center Research and Engineering Gateway and Elsevier’s ScienceDirect.  Overall, the research showed that the best way to counter artificial intelligence (AI) offensive tools was with AI defensive tools.  The resulting research is described in detail.  This TI response report…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making contractor information systems subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171,…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

DoD Cyber Workforce Summit

The DoD CIO will host the Inaugural Cyber Workforce Summit with support from AFCEA International and the National Defense University. To succeed in today’s environment, the U.S. Department of Defense must remain aggressive in its…

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Voice From the Community

Tom Burns_headshot
Thomas Burns

Engineering Manager, Kawasaki Railcar, Inc.

Thomas Burns is an engineering manager in operational technology for Kawasaki Railcar, where he oversees cybersecurity in the global supply chain. He acquires embedded software within the systems for integration into fleets of passenger railcars and tests electromagnetic interference/compatibility. He also manages software requirement compliance and ensures best practices are followed as outlined by the Software Engineering Institute and the Information Systems Audit and Control Association’s Capability Maturity Model Integration framework.

Want to be featured in our Digest?

Submit your "Voice From the Community"