This webinar will explain in detail the changes contained in SP 800-171 revision 1 and various FAR/DFAR hooks into the document, impacts it has on your organization, and how you can continue to implement its IA guidelines.
CS Digest Section: CSIAC ANNOUNCEMENTS
What is the difference between a Virus, a Worm, and a Trojan? Don’t know? Find out in this short video.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. Given
Handling classified information is a serious responsibility. Are you aware of your obligations in regard to need-to-know information?
In this presentation, we present a novel approach to detection of bots on social networks in near real-time. Our approach comprises of computationally simple comparisons and calculations, as opposed to the all too common machine learning approach to this problem, or non-real-time approaches that involve network analysis which is both expensive and
One goal of the DoD Net Centric vision is to provide visibility into the M&S resources across the DoD enterprise. The Defense M&S Catalog was established to support the visibility component of the net centric data strategy and to provide an avenue for M&S organizations to make resources available for reuse. This presentation will provide an
Cybersecurity is quickly becoming a top concern for every sector in our country. The worldwide reach of the internet means that cyber threats can come from hackers in the United States and from foreign countries. In this webinar, the head of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center will speak about the emerging cyber
Mobile security continues to be in the cybersecurity spotlight. This follow-up focuses on mobile security trends, how the attack landscape has evolved, and what the average individual or organization can do to avoid the common pitfalls.
CSIAC organized and hosted an invitation-only workshop at George Mason University. The workshop brought together personnel from the Department of Defense DOD), academia and industry. The goal was to facilitate a discussion and exploration of the technical challenges, research directions, and practical approaches to the utilization of cyber modeling and
There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced. This webinar will describe