Cybersecurity is quickly becoming a top concern for every sector in our country. The worldwide reach of the internet means that cyber threats can come from hackers in the United States and from foreign countries. In this webinar, the head of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center will speak about the emerging cyber
CS Digest Section: CSIAC ANNOUNCEMENTS
Mobile security continues to be in the cybersecurity spotlight. This follow-up focuses on mobile security trends, how the attack landscape has evolved, and what the average individual or organization can do to avoid the common pitfalls.
CSIAC organized and hosted an invitation-only workshop at George Mason University. The workshop brought together personnel from the Department of Defense DOD), academia and industry. The goal was to facilitate a discussion and exploration of the technical challenges, research directions, and practical approaches to the utilization of cyber modeling and
There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced. This webinar will describe
To assist organizations’ Information Awareness training programs, the CSIAC has created a series of videos designed to introduce several fundamental IA concepts. This fast, free, and easy-to-watch video series describes current information security threats and protections for government, industry and academia.
Join the CSIAC and Subject Matter Experts in discussing the recently released NIST guidelines SP 800-171. Topics include what impact it has on your organization, and how you can begin to implement its IA guidelines.
This webinar will showcase an input validation failure by demonstrating a known command injection vulnerability within an open-source firewall application. It will then discuss methods of input validation, while demonstrating techniques to reduce the likelihood of this critical vulnerability.
This presentation will focus on gaining an understanding of the current and future trends we have observed from the Deep & Dark Web which can offer illuminating insights into how to remain in front of future threats.
To assist organizations’ Information Awareness training programs, the CSIAC has created a series of videos designed to introduce several fundamental IA concepts. This fast, free, and easy-to-watch video series describes current information security threats and protections for government, industry and academia. Stay tuned for the release!
Free hardcopy publications available at the CSIAC store!