This webinar describes the Cyber Security Game (CSG). CSG is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber
CS Digest Section: CSIAC ANNOUNCEMENTS
The purpose of this article is to make the case for increased research and development of autonomous control machine learning approaches in the cyber domain. In it, we discuss emerging autonomous machine learning technologies and their recent successes, technical and non-technical challenges that still need to be overcome for practical autonomous
In this episode of the CSIAC Podcast, SMEs discuss Tricking Neural Networks, CIA Impersonation, International Data Privacy, and Encrypted Malware Detection.
In this webinar, Neil Fitzpatrick, Senior Knowledge Manager at Quanterion Solutions Inc., uses the analogy of the construction of a Greek temple to identify the components and processes involved in the development of an efficient and effective organizational data to decision model.
This presentation will review various Cybersecurity for Energy Delivery Systems (CEDS) R&D projects in which Schweitzer Engineering Laboratories (SEL) has been involved including an overview of Operational Technology-Software Defined Networking (OT-SDN).
In this episode of The CSIAC Podcast, Sean Bird talks with James Rice, a Cybersecurity Instructor at Mohawk Valley Community College (MVCC) and the Lead Instructor for the GenCyber cybersecurity summer camp at MVCC.
Security concerns are at the forefront due to the reliance on mobile devices for both business and personal use, along with the ever-increasing data usage. This video podcast and companion article will give you an overview of the current threats to mobile device security and what you can do to mitigate them.
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in Cyberlaw, policy, standards, court cases and industry legal frameworks. These slides focus emerging issues from cloud data storage, the scope of 3rd Part Doctrine, encryption, warrents for electronic
This quarter's CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase "Cyber Is Hard", usually associated with gnashing of teeth and exasperated sighs.
This webinar describes the benefits of machine learning based approaches for autonomous control in the cyber domain. We discuss emerging autonomous machine learning technologies and their recent successes, technical and non-technical challenges to overcome, and potential near-term applications to cyber security.