CYBERSECURITY

& Information Systems Digest

5 NOVEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

social media icons with network grid on top
SOCOM Social Media Smart Cards

People can easily get information about you through your online presence with a quick internet search. It is important to know what information about you is publicly available, and then decide what to do about unwanted information.

The U.S. Special Operations Command (SOCOM) has released SOCOM Social Media Smart Cards, a guide to help you evaluate your social media accounts and available data aggregator websites to determine if unwanted information is out there about you. The guide includes best safety practices for social networking platforms, digital ecosystems, and devices (i.e., fitness apps, smart phones, and gaming systems.)

Click here to view the SOCOM Social Media Smart Cards guide:

https://www.socom.mil/documents/ussocomsocialmediasmartcards.pdf

FEATURED ARTICLE

The U.S. Army Research Laboratory uses the “Shaker” to conduct experiments in multiaxial vibrations and develop technology to mitigate the danger it could cause to vehicles and structures, Sept. 26, 2019.

DoD Simplifies Process for Defense Contractors to Comply With Cybersecurity Rules

The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which make it simpler for private sector companies to comply with the cybersecurity requirements that must be in place before they can bid on defense contracts. The Department’s cybersecurity maturity model certification program, also called CMMC,…

Read More...

Featured Notable Technical Inquiry

Current Landscape and Technologies of Binary Code Scanning Tools

This technical inquiry report provides information on the current landscape and technologies used to scan firmware samples for detection of cyber vulnerabilities.  The aim of this research is to identify and describe what binary code scanning (also called binary code analysis [BCA]) tools exist to scan firmware samples for the detection of cybervulnerabilities.  The Cybersecurity & Information Systems Information Analysis Center subject matter experts researched…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

shield

Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD

The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defense’s (DoD’s) AI ethical principles while capitalizing on opportunities for innovation.  It is intended to enable personnel working throughout an AI system’s life cycle to assess the system’s…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

Jeff West headshot
Jeff West

Solutions Architect Director, SAIC

Jeff West is a solutions architect director (SAIC’s Army Business Group) supporting the U.S. Army C5ISR Center’s Quick Reaction Capability and several C2 internal research and development efforts. He has supported several C5ISR ACAT I/II programs, as well as numerous RDT&E projects and programs, in requirements definition, developing technology roadmaps, onboarding new technologies, and implementing DevSecOps and Agile processes.

Want to be featured in our Digest?

Submit your "Voice From the Community"