This webinar will provide an overview of the Air Force Research Lab (AFRL) Information Directorate's planned development of the new Open Innovation Campus (OIC) initiative. The groundbreaking OIC concept will establish a collaborative environment to support the investigation of cutting edge technologies to identify and develop potential solutions for
CS Digest Section: CSIAC ANNOUNCEMENTS
This webinar will present the vision for transforming DoD software acquisition into secure, responsive software factories. It will examine and explore the utilization of modern software development processes and tools to revolutionize the Department's ability to provide responsive, timely, and secure software capabilities for our warfighters. The focus of
DreamPort is a cyber innovation, collaboration, and prototyping facility located in Columbia, MD. It was created by the U.S. Cyber Command (USCYBERCOM) through a Partnership Intermediary Agreement (PIA) awarded to the Maryland Innovation and Security Institute (MISI) in May 2018. DreamPort is designed as an open facility which enables collaboration between
In this webinar Daksha Bhasker will provide an overview of the problem at hand, walk through the STIR/SHAKEN architecture, its components, and discuss security architecture considerations that will bolster the implementation. As international regulatory bodies move towards driving security measures against robocalling, this webinar will enable security
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks.
What is data manipulation? A misconception is that hackers always steal data, but this assumption is incorrect. Data manipulation attacks occur when an adversary does not take data, but instead makes subtle, stealthy tweaks to data for some type of gain or effect. These subtle modifications of data could be as crippling to organizations as data breaches.
This webinar will discuss a CSIAC-developed prototype for detecting and extracting PII from over a thousand binary file formats by leveraging the widely used open source Apache Tika toolkit. The prototype, called "BFAS - Binary File Application Scanner", integrates Tika through the implementation of a custom Powershell cmdlet which seamlessly injects a text
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. This edition of the
The Open Web Application Security Project (OWASP) Amass project was originally created when the project lead was showing organizations what they look like on the Internet. During this process, he noticed that the tools available were returning incomplete results relative to what could be discovered manually. With the identification of this gap in
This report details key concerns discussed during the JFAC/DAU/CSIAC Software Assurance (SwA) Cyber Experiment (CYBEX) on 7 Aug 2018. In addition to evaluating newly developed software SwA Program Manager and Developers guides, the exchange included addressing/bringing back foundational software/system engineering in order to address the root of fundamental