CYBERSECURITY

& Information Systems Digest

4 FEBRUARY 2025

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

https://www.biometricupdate.com/202104/bio-key-biometric-access-control-deal-expands-as-large-organizations-secure-remote-workers
KNOWN EXPLOITED VULNERABILITIES (KEV) CATALOG
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—the Cybersecurity & Infrastructure Security Agency (CISA) maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.
​Click here to learn more:  ​https://www.cisa.gov/known-exploited-vulnerabilities-catalog.

FEATURED ARTICLE

CSI: Closing the Software Understanding Gap graphic

NSA Jointly Releases Recommendations for Closing the Software Understanding Gap

FORT MEADE, Md. – A report released by the National Security Agency (NSA), the Cybersecurity and Infrastructure Agency (CISA), the Defense Advanced Research Projects Agency (DARPA), and the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E) urges a national effort to better understand the behavior of software underpinning national security…

Read More...

Featured Notable Technical Inquiry

What is the operational system risk imposed by the infrastructure deployment pipeline workflow?

Real-time data monitoring of systems and system forensics is an essential aspect to keeping your data security platform safe when relying on the use of Infrastructure as Code (IaC) and the potential vulnerabilities associated with its continuous deployment (CD). Many organizations are facing an information overload and are inadequately prepared for understanding and designing a cyber incident response plan with near-real-time monitoring, including detection, analysis…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies:  (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development in the U.S. Department of Defense (DoD) since the late 1960s, it has continued to see major advancements in recent…

Read More...

UPCOMING EVENTS

DoD Cyber Workforce Summit

The DoD CIO will host the Inaugural Cyber Workforce Summit with support from AFCEA International and the National Defense University. To succeed in today’s environment, the U.S. Department of Defense must remain aggressive in its…

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…

2025 DoD Cybersecurity & SAP IT Summit

Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…

Homeland Security Cybersecurity and Infrastructure Conference

The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military,…

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Voice From the Community

Dave_Pekala_Headshot
David Pekala, MBA, PMP, GCIH, GSEC

Technical Director, NextGen Federal Systems, LLC

Dave Pekala supports the Army Analytics Solution to Establish Real-Time Operational Information Dominance Unified Data Reference Architecture effort as a data and Zero Trust subject matter expert. His focus is on information domination, digital transformation with DevSecOps, the StratusML platform for artificial intelligence, and Army intelligence systems.
ractices with digital engineering, including advanced modeling and simulation services supporting Joint Simulation Environment for weather effects.

Want to be featured in our Digest?

Submit your "Voice From the Community"