CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

State-of-the-Art Use Cases for Augmented/Virtual/Extended Reality in Aviation Maintenance

Learn More
Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

2024 DAF Modeling and Simulation Summit

The theme of the 2024 Department of the Air Force (DAF) Modeling & Simulation (M&S) Summit is “Training in a Digital World”, which highlights the Department of the Air Force’s drive to upskill personnel through digital training. The goal of the M&S Summit is to gather Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services…

Learn More
A graphic shows the watch floor of Navy Fleet Cyber Command.

GITEC Conference 2024

The Government Information Technology Executive Council (GITEC) Conference is an entity focused on fostering professional development and collaborative platforms for the federal government, academia, and industry to address and overcome emerging technology challenges. This year’s conference focuses on the perspective federal leaders have in integrating artificial intelligence and cybersecurity practices into their agencies, as well as the inclusion of quantum encryption in federal networks.

Learn More
Hacker

CISA, U.S., and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC), United Kingdom’s National Cyber Security Centre (NCSC), Canadian Centre for Cyber Security (Cyber Centre), a part of the Communications Security Establishment, and New Zealand’s National Cyber Security Centre (NCSC-NZ) and Computer Emergency Response Team (CERT-NZ)…

Learn More
CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

FORT MEADE, Md. – The National Security Agency (NSA) has joined the Federal Bureau of Investigation (FBI) and other co-sealers to publish a Cybersecurity Advisory (CSA), “Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations,” outlining observed tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations for EdgeRouter users and other network defenders.

Learn More
AFIMSC spearheads AI innovation at industry forum

AFIMSC Spearheads AI Innovation at Industry Forum

SAN ANTONIO, Texas – More than 120 industry, academic, and government officials gathered Feb. 20-21 at the University of Texas at San Antonio Downtown Campus for the Air Force Installation and Mission Support Center Artificial Intelligence Industry Forum. The event, hosted by AFIMSC and AFWERX, aimed to foster collaboration and find artificial intelligence (AI) and machine learning solutions to challenges facing the Air Force installation…

Learn More
niobium

Resurrecting Niobium for Quantum Science

For years, niobium was considered an underperformer when it came to superconducting qubits. Now scientists supported by Q-NEXT have found a way to engineer a high-performing niobium-based qubit and take advantage of niobium’s superior qualities. When it comes to quantum technology, niobium is making a comeback. For the past 15 years, niobium has been sitting on the bench after experiencing a few mediocre at-bats as…

Learn More
Winning paper for the 11th annual Best Scientific Cybersecurity Paper Competition Graphic

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests:  Analyzing the Identity and Behavior of Certificate Transparency Bots,” as the winner of its 11th Annual Best Scientific Cybersecurity Paper Competition. The winning paper, authored by Stony Brook University researchers Brian Kondracki, Johnny So, and professor Nick Nikiforakis, examined a study of automated attacks on new webservers and explored how a web browser can trust…

Learn More
JFHQ DODIN

JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program

Following a successful nine-month pilot, Joint Force Headquarters — Department of Defense Information Network (JFHQ-DODIN) is officially launching its Cyber Operational Readiness Assessment program. Over the past four years, JFHQ-DODIN has made significant changes to the Defense Department Command Cyber Readiness Inspection program, transforming mindsets from an inspection compliance to an operational readiness underpinning mission assurance. To enunciate this significant shift, the program has been…

Learn More

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

Sunshine Cyber Conference

Cyber Florida is pleased to announce the return of our popular annual conference, now called the Sunshine Cyber Conference. Save the date for 27-28 March 2024 at the newly renovated Tampa Convention Center. Designed to…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

IMPACT 2024

Every year, CybSafe hosts IMPACT—a free conference that puts the latest research on the human aspect of cybersecurity on center stage. Like its predecessors, the first USA IMPACT will bring researchers together to share knowledge…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"