Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. Given
Series: CSIAC Webinars
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing. This podcast series is all the webinars that have been recorded.
In this presentation, we present a novel approach to detection of bots on social networks in near real-time. Our approach comprises of computationally simple comparisons and calculations, as opposed to the all too common machine learning approach to this problem, or non-real-time approaches that involve network analysis which is both expensive and
One of the goals of the DoD Net Centric vision is to provide visibility into the Modeling & Simulation (M&S) resources across the DoD enterprise. In order to manage and employ M&S capabilities effectively, senior leaders and managers must have visibility into the DoD's M&S portfolio; organizations supported by M&S need visibility into
Cybersecurity is quickly becoming a top concern for every sector in our country. The worldwide reach of the internet means that cyber threats can come from hackers in the United States and from foreign countries. In this webinar, the head of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center will speak about the emerging cyber
What makes a good operator? There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced.
We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means. The ARC resilience concept is built on a modification of the Observe-Orient-Decide-Act (OODA) loop that is
Modern networked computing systems are becoming increasingly more complex. The recent explosion of the Internet of Things (IoT), ranging from mobile embedded devices to large scale Cloud-orchestrated services has added significant challenges to the standard administration tasks associated with securing and managing networked services. The underpinnings of
Organizations are becoming increasingly aware of the importance of secure coding. Secure coding includes software development principles in an effort to minimize the introduction of vulnerabilities within software applications. One of the most common software vulnerabilities is insufficient input validation, which accounts for 50 percent of the most critical
Fraud, crimeware, hacktivism, and even nation-state threats are plaguing the Internet daily with no relief in sight. Additionally, these incessant attacks almost always surprise, forcing us into a constant reactive mode and leaving us one step behind of our adversaries. This presentation will focus on gaining an understanding of the current and future trends
What is your project management style? Effective project management techniques are best learned via experience as opposed to in a book. This presentation will provide valuable “lessons learned” by examining both the mistakes and successes in managing and accomplishing “impossible” projects. This webinar will review a selection of project management princip