CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

Chetan_Honnenahalli headshot

Chetan Honnenahalli

Learn More
The Dashboard uses continually updated metrics, combined with colors indicating the level of readiness, to give detailed information as well as the big picture.

What free or low-cost enterprise data solutions with AI/ML are available and used in the DoD?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify U.S. Department of Defense (DoD) enterprise data solutions that have artificial intelligence/machine-learning (AI/ML) capabilities; can support data analytics for decision making, train on previously observed data, display aggregations of data on demand through a dashboard or new views, and be deployed at multiple classification levels (unclassified, CUI, secret, etc.); and are free…

Learn More

What is the latest technology for flying ad-hoc networks?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on flying ad-hoc networks (FANETs) relating to scalability, connection strength, distance, and flight control software. Entities that can provide research and development support related to robust and reliable FANETs are of particular interest.   If you have expertise or points of contact related to this inquiry, please contact Joseph Friar (joseph.m.friar.ctr@mail.mil), the CSIAC analyst…

Learn More

What are some AI/ML tools that can analyze a wide range of data for the RAVEn Platform?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on artificial intelligence/machine-learning (AI/ML) tools that can analyze a range of data through large language models and generative AI capabilities. The tool will be used to enhance entity resolution and better streamline data insights on the Repository for Analytics in a Virtualized Environment (RAVEn) platform. If you have expertise or points of contact related…

Learn More
A hand overlayed by a virtual padlock and the words "Cyber security".

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and industry come together to tackle security challenges facing the U.S. homeland. Recent developments have highlighted the need for technology, strategies, and approaches to bolster the homeland security efforts of the…

Learn More
AI generated image of warfighter figures operating on a circuit.

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging the gap between the key stakeholders, encouraging collaborative partnerships, and providing access to unique expertise. EDT for Defense will bring together senior leaders from the US DoD and partners from…

Learn More
Soldiers from the 94th Army Air and Missile Defense Command, track an unmanned aerial systems (UAS) threat during a scenario as part of Black Dart 18 on Muscatatuck Urban Training Center, Indiana.

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders for troop buildups through ISR in peacetime or denying vital data and information to their enemy through electronic attack during high-intensity conflict, superiority in the electromagnetic spectrum will be a…

Learn More
Military Personnel operating computer next to military aircraft

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness, and homeland defense facing our nation. The theme this year is “Securing the Future:  Cyber Capabilities, All-Domain Superiority, and Strategic Advantage.”…

Learn More
Silhouette of a person observing multiple monitors with generic imagery

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms. People have new expectations of what work is and are looking for skills to help navigate the practices that are needed for success. Gartner IT Infrastructure, Operations & Cloud Strategies…

Learn More
CSA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations Graphic

Iranian Cyber Actors Access Critical Infrastructure Networks

FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and others in releasing a Cybersecurity Advisory (CSA), “Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations,” to warn network defenders of malicious activity that can enable persistent access in sensitive systems. Since October 2023, Iranian cyber…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

Government Cybersecurity Roadshow Texas

The State of Texas has been leading the way in cybersecurity solutions. This has been an ongoing driving force for collaboration and dynamic change in the state. Many acknowledge the serious threats that cyberattacks pose…

Big Data for Intelligence Symposium

Defense Strategies Institute’s (DSI’s) 12th Annual Big Data for Intelligence Symposium will convene senior leaders from across the intelligence community, Department of Defense, federal government, academia, and industry to discuss the prioritization of data as…

9th Annual Cyber Southwest Symposium

The National Defense Industrial Association (NDIA) – Southwest Chapter, Arizona InfraGard/Arizona Cyber Threat Response Alliance (ACTRA), AFCEA – Tucson, and the AZ Cyber Initiative are collaborating to organize the 9th Annual Cyber Southwest (CSW) Symposium….

IAEM Annual Conference & EMEX 2024

The Annual International Association of Emergency Managers (IAEM) conference & EMEX is tailored toward first responder and emergency management organizations to inform on best practices and lessons learned with Big Data, modeling and simulation capabilities,…

C4ISR USA 2024

C4ISR USA 2024 is focused on shaping the future of military readiness and navigating today’s cyber challenges. The landscape of modern warfare is evolving with an accelerated tempo, increasing complexity, and the need for decentralized…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"