Threat intelligence, coupled with the latest advancements in intelligent and self-protecting data technology, provides visibility into the latest threats, which can help you avoid becoming a backdoor in the next big data breach. This webinar covers important building blocks to establish, maintain, and manage a threat intelligence program at your organization.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
In this webinar, Professor James Giordano of Georgetown University describes the uses and value of big data and cyber-capabilities in bioscience and biotechnology; addresses the national security, intelligence, and defense applications of these tools and methods; illustrates vulnerabilities in these systems' infrastructures and functions, and posits the importance and necessity of bio-cybersecurity as a multi-organizational posture and enterprise.
This webinar provides an overview of Adversarial Machine Learning (AML), its relationship to Generative (Deep) Learning, and ways to view AML as a potential enabler for deploying more comprehensive system-level Machine Learning capabilities. The basic ideas driving AML and the system-level architecture needs of an effective integrated ML capability are compared to find areas of commonality and future utility beyond single-shot, algorithm-by-algorithm approaches to AML and remediation techniques.
Cyberphysical security challenges intersecting the Internet and the electricity grid – and therefore, all critical infrastructures – require multi-stakeholder public-private partnerships across the nation to protect against known clear and present dangers. Cyberphysical infrastructure testbeds must engage industry and the research community, address legacy complex system vulnerabilities, and integrate and test smart grid and mobility novel and known best practices.
Rust is a modern programming language that supports safe system programming with: compiler verified freedom from undefined behavior, support for building race-free multithreaded code, and ability to create abstractions needed for building large maintainable code bases. This presentation begins with a brief summary of Rust’s features and the needs that motivate them. It then focuses…
Hiring has always been a challenge, but the unique workload of software avionics, hardware integration, and cyber resiliency produce a unique situation that the U.S Air Force (USAF) has struggled with for years. In response to that growing need, the 76th Software Engineering Group (76 SWEG) responded with an approach to deliberately train a new hire to be cognizant of the vast USAF culture, dive deep into the technical facets of avionics and mission software development, and create the mentality to produce cyber-resilient products.
The SERA Method defines a systematic approach for evaluating cybersecurity risk in highly complex networked environments. This method uses a scenario-based approach to analyze how an attacker could leverage available attack vectors and technology vulnerabilities to compromise confidentiality, integrity, and availability of mission-critical data and impact operational mission success. SERA can be applied at any point in the lifecycle to construct cyber-risk scenarios that show how the technology within a system and its context including supply chains and trusted connections in a system-of-systems provides opportunities for attackers to disrupt mission execution. Analysis of the scenarios will determine what risks are critical and which controls are important to reduce mission impact.
This webinar discusses the National Renewable Energy Laboratory's ongoing work to ensure energy security and resilience in today's interconnected and interdependent world. Today, widely available software applications and internet-enabled devices have been integrated into most industrial control systems, delivering many benefits, but also increasing system vulnerability, thereby putting sectors of critical infrastructure at risk. NREL is working to incorporate intrinsic security in evolving technologies and is proposing evolutionary approaches to making energy and communications systems resilient to a disruption, no matter the cause, and having the ability to identify, detect, respond, and recover in large part on their own. Through NREL's Virtual Cyber Research Platform, researchers can evaluate the responses of interdependent and interconnected components in a multilayer emulated grid environment to better understand how to improve the security, resilience, and blackstart recovery of today's critical infrastructure. This capability allows researchers to safely launch attacks in a virtual world on both emulated and actual physical devices and evaluate how they would respond to an attack in the real world.
Artificial intelligence (AI) has become the linchpin in a growing number of products, services, and research programs which are aimed at automating and enhancing the human decision-making process. However, there are still several application domains (satellites, wearables, wireless, etc.) that cannot afford the size, weight, and power (SWaP) overheads associated with executing state-of-the-art AI algorithms. This webinar discusses previous and ongoing research to bridge the gap and enable AI in the most SWaP-constrained environments.
Machine Learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the hood of a typical ML solution? And, why are so many problems suddenly becoming good ML candidates? This webinar explores non-mathematically the foundational aspects of ML and how they add…