
A tale of failed physical security. Read More
Cyber Security and Information Systems Information Analysis Center
A tale of failed physical security. Read More
What is skimming? Read More
| Presenter: Karen Miller | Leave a Comment
What is your project management style? Effective project management techniques are best learned via experience as opposed to in a book. This presentation will provide valuable “lessons learned” by examining both the mistakes and successes in managing and accomplishing “impossible” projects. This webinar will review a selection of project management Read More
Published in Journal of Cyber Security and Information Systems
Volume: 2 Number: 1 - Knowledge Management
Author: Michael Weir
| Leave a Comment
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the Bring Your Own Device realm are highlighted, with some commentary on strategies that can help. In a January 2013 blog post from Microsoft TechNet regarding excessive iOS6.1 logging on a Microsoft Exchange Server1, Read More
Published in Journal of Cyber Security and Information Systems
Volume: 2 Number: 1 - Knowledge Management
Author: Dr. Mark Addleson
| Leave a Comment
It can be difficult to navigate your way around the field of knowledge management (KM). Whether you are just starting out and thinking about putting ideas about KM into practice, or you work in a organization that has had a KM initiative in place for years, at times it may be hard to see what KM is about, what people are doing, and why and how they are doing Read More
| Presenter: Mr. Wade Kastorff | Leave a Comment
Attention DoD contractors: NIST’s latest publication released in August 2015 provides direction on implementing an information assurance framework for Non-federal information systems. This is important as there are a few new DoD designators for unclassified information that REQUIRE protection. The good news is that this framework reduces the burden on the Read More
Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already starting to make that leap. Read More
| Presenters: Michael Weir, Thomas “TJ” Vestal, Bruce Gabrielson, Matthew Sweeney, Randy Trzeciak, James Henderson | Leave a Comment
Trends in Insider Threat practice – what are the insider threat actors trying to do now? Trends in Insider Threat defense – what are the defenders trying to do now? Moderator: Michael Weir, Quanterion Solutions Incorporated Panelists: Thomas "TJ" Vestal, AFRL/Rome Bruce Gabrielson, CACI Matthew Sweeney, SRC Randy Trzeciak, Director CMU Insider Threat Read More
| Presenter: Richard Cook | 1 Comment
Presentation by Richard Cook on Next Generation Insider Threat. Read More
| Presenter: Trent Brunson | Leave a Comment
Presentation by Trent Brunson on Localized Encryption Groups (LEG). Read More
The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More
Phone: | 800-214-7921 |
Email: | info@csiac.org |
Address: | 266 Genesee St. Utica, NY 13502 |
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.