A major challenge for cybersecurity comes from new technology approaches that focus primarily on the benefits of implementation rather than on defining the governance and risk management changes necessary to establish and enforce appropriate protections. This challenge is especially important for the adoption of technology that impacts critical infrastructure and shared services, such as voting and defense. Researchers examined the challenges and the effective cybersecurity options facing Department of Defense (DoD) programs delivering cyber-physical systems and adopting DevSecOps.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
The objectives of this presentation are to provide an introduction to the topic of Software Assurance (SwA) - what it is and why it is needed - as well as an overview of the Missile Defense Agency's (MDA) approach to implementing SwA. The MDA has holistically integrated key aspects of software assurance into its business and engineering practices to bring order to disparate issues. This process includes incorporating SwA throughout the MDA software development and systems engineering lifecycle.
Modeling and simulation (M&S) is critical to the success of the Department of Defense. It is utilized both as a predictive tool and as part of an iterative design process. Everyone can agree that M&S capabilities should be planned and resourced early, and that characterizing the capabilities and limitations of the M&S in relation to its specific intended use is essential. The problem many practitioners face is the ability to find M&S to support their requirements and a lack of incentives to encourage information sharing.
This webinar will provide an overview of the current capabilities of the Defense M&S Catalog, a look “under the hood” of the Catalog into the technologies that power discovery and contribution capabilities, and a discussion of the evolution of the Catalog’s capabilities.
This webinar presents modern deep learning (DL) techniques for radio frequency (RF) imagery and signals (i.e., Synthetic Aperture Radar/SAR data, communication signals) classification. First, Dr. Majumder provides a short overview of machine learning (ML) /DL theory and an understanding of SAR imagery and RF signals. Then he demonstrates detailed algorithmic implementation and performance of DL algorithms on classifying SAR data and RF signals. Dr. Majumder presents recent research results, technical challenges, and directions of DL-based object classification for RF sensing. Finally, he covers adversarial attacks and mitigation techniques involving DL-based RF object recognition.
The objective of the DoD's Digital Engineering Strategy, released in June 2018, is to promote the use of models to digitally represent systems and components along with digital artifacts as a technical means of communication across a diverse set of stakeholders. The strategy addresses a range of disciplines involved in the acquisition and procurement of national defense systems. It encourages innovation in modernizing the way we build, test, field, and sustain our national defense systems and how we train and shape the workforce to use these practices.
Future military conflicts will take place in contested environments where remote sensors deployed in the field will employ advanced artificial intelligence and machine learning technology to reason about the battlespace in the absence of connectivity to manned ground stations. The Air Force Research Laboratory has developed Agile Condor, a flexible airborne testbed used to demonstrate and validate advanced high-performance computing hardware and software configurations. This webinar will discuss Agile Condor’s successful demonstration of state-of-the-art machine learning (ML) software. The embedded ML software algorithms successfully implemented “supercomputing at the edge” through the detection and classification of several ground-based objects and signals.
Established in 2016 by the Secretary of Defense, and born out of Hack The Pentagon, the Vulnerability Disclosure Program (VDP) operates to strengthen the security of the Department of Defense (DoD) Information Network (DoDIN) by crowdsourcing the discovery of cyber-based vulnerabilities.
Cyber monitoring: you cannot monitor what you cannot measure. In the world of computer communications, monitoring takes on two distinct forms: performance measuring and monitoring physical parameters, and security monitoring of network traffic and computer processes.
Over the past several years, FDA has undertaken a significant and diverse set of efforts aimed at improving not only medical device cybersecurity, but cybersecurity across the healthcare sector. The agency has worked internally on efforts such as updated guidance with respect to satisfying regulatory requirements for cybersecurity within medical devices, the development of a playbook related to regional response, “boot camps” for threat modeling, and others. FDA has also supported the development of vulnerability scoring system specifically targeted at medical devices.
This presentation will share the vision of software bill of materials (SBOM) from an international open process that brought together open source, commercial software developers, the embedded systems and ICS community, and enterprise customers, demonstrating the value of supply chain transparency at each step of the supply chain. It will cover the basics of SBOM, how you can begin implementing it today, and what we might expect in the coming years for software supply chain and software assurance.