CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

What is Cybersecurity Maturity Model Certification (CMMC)?

The CMMC framework builds upon existing regulations like National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 but introduces a certification requirement to validate compliance. CMMC applies to any organization in the DoD supply chain and helps protect against cyberthreats by enforcing stricter cybersecurity controls. CMMC consists of different levels that define the cybersecurity maturity of an organization: Level 1 (Foundational) Who It…

Learn More

What is the Internet of Things (IoT)?

Interconnected devices in an IoT collect, share, and process data without direct human intervention [1]. These smart systems use sensors, artificial-intelligence (AI)-driven analytics, and secure communication channels to automate decision-making and improve operational efficiency. While IoT is widely used in industries like healthcare, transportation, and smart cities, its role in military operations and national security is rapidly expanding. The U.S. Department of Defense (DoD) is…

Learn More

What are behavioral biometrics?

Behavioral biometrics are considered by many to be more appealing than standard security methods due to continuous authentication. Continuous authentication makes it unnecessary for users to constantly enter the same passwords or present physical means of validation, further improving efficiency and security. Data quality is a key part of ensuring accuracy and reliability in behavioral biometric systems. The incorporation of artificial intelligence and blockchain into…

Learn More

What is a distributed denial-of-service (DDoS) attack?

Types of DDoS Attacks Volumetric Attacks:  Send a high volume of traffic to a specific target to consume its bandwidth and impede the victim’s internet access [2]. Application Attacks:  Intentionally exhaust server resources by sending an overwhelming amount of hypertext transfer protocol (HTTP) requests to a server during a short amount of time, which can compromise the functionality of an application. Each HTTP request asks…

Learn More
AI cyberspace internet defense soldier

Agentic Artificial Intelligence: Strategic Adoption in the U.S. Department of Defense

Agentic artificial intelligence (AI) is emerging as a transformative capability for the U.S. Department of Defense (DoD). Agentic AI systems can execute complex tasks independently. Unlike traditional AI, these agents can proactively analyze data, make decisions, and act with minimal human intervention. Within the DoD, the concept of agentic warfare reflects a growing shift from isolated AI tools to integrated systems designed for strategic, operational,…

Learn More

Has the Defense Modeling and Simulation (M&S) catalog been updated since 2018, and is this an effort that the Defense M&S Coordination Office is still updating/overseeing?

Learn More

How can someone access Defense Technical Information Center manuscripts in batches at a speed usable for training embedders for use with large language models?

Learn More
Long-term goals for the Communications-Electronics Command (CECOM) Software Engineering Center (SEC) include incorporating Zero Trust further into Army and DOD systems and developing workforce training programs around the organization’s methodology.

Open Standards That Support Zero Trust Implementation

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and providing information on open standards applicable to zero trust implementation. CSIAC identified various open standards being used today that support and uphold the implementation of the zero trust architecture within the U.S. Department of Defense.

Learn More
avoid risk reduce transfer

Cyber Risk Management: Program Development for Risk-Based Decision-Making

This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related policies and procedures.  The publication “Advancing Risk Management Capability Using the OCTAVE FORTE Process” helps gain an understanding of the framework and underpinnings of this discussion.  This presentation allows the following: Interactive discussion for delivering training materials…

Learn More
Artist's interpretation of new optical processor for an edge device, developed by NIT researchers, that performs machine learning computations at the speed of light, classifying wireless signals in a matter of nanoseconds. (Image credit: Sampson Wilcox, Research Laboratory of Electronics)

Photonic Processor Could Streamline 6G Wireless Signal Processing

As more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to share. Engineers are employing artificial intelligence to dynamically manage the available wireless spectrum, with an eye toward reducing latency and boosting performance. But most AI methods for classifying and processing…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"