The Department of Defense Cyber Strategy
Best Practice/Reference Document

The Department of Defense Cyber Strategy

The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three ...

A Proven Resource for Maximizing DoD Dollars
Report

A Proven Resource for Maximizing DoD Dollars

The DoD Information Analysis Centers (IACs) serve as an essential resource to affordably deliver technical data and analyses in support of current operations. The Pentagon has recognized the DoD IACs' ability to maximize ...

Updated DoD Cybersecurity Policy Chart
Best Practice/Reference Document

Updated DoD Cybersecurity Policy Chart

An updated version of the DoD cybersecurity policy chart is available. Updated April 24. 

  1. Newest Content
  2. Popular Today
  3. Recent Discussion
  4. Most Commented
  • CSIAC Admin
    10/25/2013 - 10:19am by CSIAC Admin
    1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE) deployments. The security architecture of 4G LTE may...
  • CSIAC Admin
    JFAST - 2 views(s) today
    11/18/2014 - 1:57pm by CSIAC Admin
    Joint Flow and Analysis System for Transportation
  • CSIAC Admin
    DAR - 2 views(s) today
    11/18/2014 - 2:33pm by CSIAC Admin
    Defense Acquisition RADAR
  • CSIAC Admin
    E3 - 2 views(s) today
    11/18/2014 - 2:39pm by CSIAC Admin
    Electromagnetic Environmental Effects
  • CSIAC Admin
    11/19/2014 - 11:01am by CSIAC Admin
    Presented by Dr. Paul Losiewicz.
  • CSIAC Admin
    Cyber Defense Summit & Training - 2 views(s) today
    08/05/2014 - 3:35pm by CSIAC Admin
    The SANS Institute's Cyber Defense Summit will be paired with intensive pre-summit hands-on information security training (August 13-18). This event marks the first time that SANS will conduct a...