The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
CSIAC ANNOUNCEMENTS:
In Case You Missed It: CSIAC Podcast and Report – Privacy Impact Assessment: The Foundation for Managing Privacy Risk - CSIAC
Privacy Impact Assessments (PIA) analyze how a unit collects, uses, shares, and maintains individually identifiable information. In this podcast and companion article titled "Privacy Impact Assessment: The Foundation for Managing Privacy Risk," Mr. William Stallings delivers insightful and practical guidance on understanding and identifying the range of threats to privacy in information collection, storage, processing, access, dissemination and protecting privacy
Identity Theft Awareness Week - CSIAC
Feb. 1-6 is Identity Theft Awareness Week. This observance is meant to raise awareness about identity theft and highlight methods consumers can use to protect their identities. View resources to help you improve your data security by CSIAC, the Federal Trade Commission (FTC), the Cybersecurity & Infrastructure Security Agency (CISA) and the Identity Theft Resource Center.
In Case You Missed It: CSIAC Podcast and Report – Assessing the Operational Risk Imposed by the Infrastructure Deployment Pipeline - CSIAC
This podcast also describes the benefits of Infrastructure as Code, and how to leverage the capabilities in support of DevOps (combined Development and Operations) initiatives. Infrastructure as Code is an emerging and evolving concept for automating the provisioning of infrastructure services and for managing infrastructure platforms such as virtual machines, networks, load balancers, and connection topology. The practice of Infrastructure as Code could be used as a catalyst/tools to increase organizations' abilities to deliver applications and services at a high velocity.
RECENT HEADLINES:
CISA Takes the Next Step in Advancing Emergency Communications Next Generation Priority Services - CISA
WASHINGTON- The Cybersecurity and Infrastructure Security Agency (CISA) announced today it will pilot a new technology in support of the Next Generation Network Priority Service (NGN-PS) Phase 2 program, which provides first responders and emergency managers with priority voice, data, and video communications during emergencies and widespread outages. This pilot is part of CISA s ongoing development of priority services for voice over Internet Protocol (VoIP)-based networks. The pilot uses a technology known as Comm, which employs multimodal mesh network technology to breakdown barriers to connectivity between different platforms and protocols.
Tags: Emergency Communications, First Responders
CISA Partners with Cactus League for Security Tabletop Exercise to Protect Spring Training Fans - CISA
PHOENIX The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) joined the Cactus League, its teams and spring training facilities, and state and local partners Tuesday for a virtual tabletop exercise to review pre-incident preparedness measures and response plans at stadiums during spring training. While several of the teams and stadiums regularly review plans and conduct drills, for the second year in a row, a leaguewide exercise was held to allow everyone to share best practices and discuss coordination should an incident affect more than one venue. The exercise scenario included an information and intelligence sharing piece among public and private sectors, and an active threat at a ballpark. Tuesday's exercise was held virtually due to COVID-19 restrictions and was not in a response to any specific threat.
Tags: Infrastructure Security
Artificial Intelligence Is a Work in Progress, Official Says - Department of Defense (DoD)
Expectations are high that artificial intelligence will be a game changer for the military - and it is, in fact, one of the Defense Department's top priorities.
Tags: Artificial Intelligence (AI), Department of Defense (DoD)
DOD Incorporating AI Ethics Into Systems Engineering, Official Says - Department of Defense (DoD)
Artificial intelligence is one of the Defense Department's top technology modernization priorities.
Tags: AI Ethics, Artificial Intelligence (AI), Department of Defense (DoD), Systems Engineering
Defense Official Discusses Unmanned Aircraft Systems, Human Decision-Making, AI - Department of Defense (DoD)
Defeating a swarm of small unmanned aircraft systems may one day require faster decision making than what a single human being can provide, and may mean the use of artificial intelligence to make those decisions. Right now, though, rules of engagement still require a human in the loop.
Tags: Artificial Intelligence (AI), Department of Defense (DoD), Unmanned Aircraft Systems
CISA Launches Campaign to Reduce the Risk of Ransomware - CISA
WASHINGTON The Cybersecurity and Infrastructure Security Agency (CISA) announced the Reduce the Risk of Ransomware Campaign today, a focused, coordinated and sustained effort to encourage public and private sector organizations to implement best practices, tools and resources that can help them mitigate this cybersecurity risk and threat.
Tags: Cybersecurity
CSIAC Supported Communities
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
Technical Resources, Policy and Guidance
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.