In part four of the RMF Categorization podcast series, the SMEs discuss the various roles and responsibilities as well as the operating environment.
CS Digest Section: CSIAC ANNOUNCEMENTS
This webinar discusses the National Renewable Energy Laboratory's ongoing work to ensure energy security and resilience in today's interconnected and interdependent world. Software applications and internet-enabled devices have been integrated into most industrial control systems, delivering many benefits, but also increasing vulnerability. NREL's Virtual
In part three of the RMF Categorization podcast series, the SMEs discuss the process of aligning the security objectives. The security objectives provide a common understanding of the impact levels on the information types as well as a common viewpoint of a system compromise and its organizational impact. The security objectives allow the system owner to
In part two of the RMF Categorization podcast series, the SMEs discuss the process of accurately identifying information types. The identification of the information types establishes the foundation for the system security program. The information types serve as the baseline by which the mission owner as well as the adversary both measure success.
In part one of the RMF Categorization podcast series, the SMEs discuss what a security program is and why it is important. A security program defines the people, processes and technologies used to manage cybersecurity risk to the environment in which your system operates. This document serves as the blueprint for how your system operates and responds to the
Artificial intelligence (AI) has become the linchpin in a growing number of products, services, and research programs which are aimed at automating and enhancing the human decision-making process. However, there are still several application domains (satellites, wearables, wireless, etc.) that cannot afford the size, weight, and power (SWaP) overheads
Machine Learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the hood of a typical ML solution? And, why are so many problems suddenly becoming good ML candidates? This webinar explores non-mathematically the foundational aspects of ML and how they add up to a satisfactory
The DoD Cybersecurity Policy Chart has been updated on February 19, 2020. The chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.
This short video attempts to simplify a number of cybersecurity concepts and practices to help individuals prevent many common and avoidable cybersecurity pitfalls.
This webinar features research and details of the RTM Protocol, a new and promising treatment for post-traumatic stress disorder (PTSD) that requires no drugs and is completed in less than three sessions totaling five hours. Developed by the Research and Recognition Project, the protocol has been rigorously tested under strict scientific standards. Over 90%