This webinar highlights recent success in demonstrating substantial improvements in the accuracy under control-flow and data-oriented attacks in Linux, including malicious code reuse, security bypass, and service abuse. The webinar also describes exciting future research directions on hardware-assisted fast tracing, anomaly-detection as a service, supporting domain experts for inter-disciplinary anomaly discovery, and standardizing evaluation.
Series: CSIAC Webinars
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
CryptoLocker is exploding and organizations large and small are being hit with ransomware attacks that hold their computers and networks hostage in exchange for ransom. Attacks have halted patient care and effectively stopped organizations in their tracks. Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data. Join us for an in-depth look at ransomware and how you can avoid being the next target.
This webinar will describe Comply to Connect (C2C), an automated Network Access Control (NAC) solution that verifies that an endpoint is authorized and meets security requirements before allowing access to the network (i.e. improving mission assurance; increased SA/traffic awareness in JIE; & risk mitigation).
NIST SP 800-171 was revised in December 2016. The revision has produced new requirements, added clarifications, and created many discussion points. This webinar will explain the revision, the impacts it has on your organization, and how you can continue to implement its IA guidelines.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the cyber-physical infrastructure upon which society depends. This webinar presents the challenges involved in securing IoT components and provides possible solutions by drawing inspiration from the past.
In this presentation, we present a novel approach to detection of bots on social networks in near real-time. Our approach comprises of computationally simple comparisons and calculations, as opposed to the all too common machine learning approach to this problem, or non-real-time approaches that involve network analysis which is both expensive and time-consuming.
One of the goals of the DoD Net Centric vision is to provide visibility into the Modeling & Simulation (M&S) resources across the DoD enterprise. In order to manage and employ M&S capabilities effectively, senior leaders and managers must have visibility into the DoD’s M&S portfolio; organizations supported by M&S need visibility into the tools, data, and services that meet their requirements; and M&S developers need access to what has already been created in order to capitalize on existing investments.
Cybersecurity is quickly becoming a top concern for every sector in our country. The worldwide reach of the internet means that cyber threats can come from hackers in the United States and from foreign countries. In this webinar, the head of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center will speak about the emerging cyber threats to the government sector and what steps they can take to minimize the risk and mitigate these threats.
What makes a good operator? There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced. This webinar will describe some of these SATs and how they differ between cyber operators, technical, and non-technical personnel based on preliminary research. In particular, we propose methods for identifying and measuring the most relevant SATs.
We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means. The ARC resilience concept is built on a modification of the Observe-Orient-Decide-Act (OODA) loop that is inward-focused. We call this the DRDA loop, or the Discover-Reason-Decide-Act loop. Through our projects, we are developing and bringing in technologies that address each quadrant and that will manipulate networks and systems. Components in this loop are relevant for non-resilience applications as well, including state-based sensors, awareness of complex systems, and decision support.