This webinar will cover the Information Analysis Center program and the capabilities and mission of the Homeland Defense and Security Information Analysis Center. It will include an overview of Information Analysis Center activities, core functions, research and analysis capabilities, and a description of the services and products produced by the Homeland
CS Digest Section: CSIAC ANNOUNCEMENTS
The term cyber has been so broadly applied as to encompass virtually everything in the electronic domain. This webinar captures a consolidated DoD view on Cyber, delineates the layers of cyberspace, the implications of product and infrastructure focused cyber, introduces layered cybersecurity and begins to consider what is new and what we already know to
This webinar will provide an overview of the Air Force Research Lab (AFRL) Information Directorate's planned development of the new Open Innovation Campus (OIC) initiative. The groundbreaking OIC concept will establish a collaborative environment to support the investigation of cutting edge technologies to identify and develop potential solutions for
This webinar will present the vision for transforming DoD software acquisition into secure, responsive software factories. It will examine and explore the utilization of modern software development processes and tools to revolutionize the Department's ability to provide responsive, timely, and secure software capabilities for our warfighters. The focus of
DreamPort is a cyber innovation, collaboration, and prototyping facility located in Columbia, MD. It was created by the U.S. Cyber Command (USCYBERCOM) through a Partnership Intermediary Agreement (PIA) awarded to the Maryland Innovation and Security Institute (MISI) in May 2018. DreamPort is designed as an open facility which enables collaboration between
In this webinar Daksha Bhasker will provide an overview of the problem at hand, walk through the STIR/SHAKEN architecture, its components, and discuss security architecture considerations that will bolster the implementation. As international regulatory bodies move towards driving security measures against robocalling, this webinar will enable security
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks.
What is data manipulation? A misconception is that hackers always steal data, but this assumption is incorrect. Data manipulation attacks occur when an adversary does not take data, but instead makes subtle, stealthy tweaks to data for some type of gain or effect. These subtle modifications of data could be as crippling to organizations as data breaches.
This webinar will discuss a CSIAC-developed prototype for detecting and extracting PII from over a thousand binary file formats by leveraging the widely used open source Apache Tika toolkit. The prototype, called "BFAS - Binary File Application Scanner", integrates Tika through the implementation of a custom Powershell cmdlet which seamlessly injects a text
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. This edition of the