Cyber Security Ventures, the world's largest research firm on cyber crime, estimates that cyber crime will be a $6T business by 2021. That is more than the economy of the United Kingdom. This presentation reviews the history of computer viruses and the corresponding cyber defenses employed. It is the gap between the technologies used to infect vs the
CS Digest Section: CSIAC ANNOUNCEMENTS
Medical simulations are an integral part of the military health system, providing opportunities for skills development and performance assessment of both individual and team-level medical-related tasks. This Special Edition of the Journal "Launching Innovation through Medical Modeling and Simulation Technologies" will provide a glimpse into current efforts
This presentation provides an overview of two quantitative studies conducted at the Pacific Northwest National Laboratory (PNNL) in 2017. These studies were designed to explore psychological and contextual variables that influence users confronted with cybersecurity challenges and their propensity to comply with policies under those conditions. From these
This podcast is a breakdown episode where the CSIAC discusses current topics in further depth. CSIAC tries to breakdown the complexity of the topic.
The Defense M&S Catalog was established by Defense Modeling & Simulation Coordination Office to support the visibility component of the DoD data strategy and to provide an avenue for M&S organizations to make resources available for reuse. The Catalog is a collection point for enterprise discovery and actively seeks contribution of resources from M&S
This issue of the Journal of Cyber Security & Information Systems explores how managing fast adoption modern-based system has more to do with understanding capabilities, interdependency between systems and effectively operating in the new paradigm than it has to do with differentiating product features. The link between the effective use of new integrated
This webinar describes cyber risk assessment for operational technology. It argues that a risk management approach to cybersecurity includes the integration of key activities: Cyber Workforce Development and training; Public-Private Partnerships; Operational Technology Risk Management Supply Chain cybersecurity; and cyber threats.
The 15th annual NCSAM is coming to a close, and we hope you'll join in to promote a safer, more secure and more trusted Internet for these last few days of the month. CSIAC will continue to emphasize the importance of securing our critical infrastructure as we transition into November's Critical Infrastructure Security and Resilience Month (CISRM), which is
This webinar describes a cyber risk assessment approach for operational technology. It argues that a risk management approach to cybersecurity includes the integration of key activities: Cyber Workforce Development and training; Public-Private Partnerships; Operational Technology Risk Management Supply Chain cybersecurity; and cyber threats.
This webinar describes the Cyber Security Game (CSG). CSG is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber