Loading Events

← Back to Events

Online Webinar

March 2016

Securing Your Company for Today’s Cyber War: A Three-Pronged Approach to a Comprehensive IT Security Strategy

March 30, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

In 2015, we continued to see more major cyber attacks than ever before which in turn put pressure on organizations in every industry to have the right measures in place to protect both themselves and their customers. While most organizations already have some sort of security practices in place, many do not have a complete security strategy for end-to-end coverage. In fact, a recent study found 80 percent of CISOs feel they are not properly prepared for today’s cyber war.…

Find out more »

April 2016

Managing Transformational Projects in a Military Setting

April 26, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

What is your project management style? Effective project management techniques are best learned via experience as opposed to in a book. This presentation will provide valuable “lessons learned” by examining both the mistakes and successes in managing and accomplishing "impossible" projects. This webinar will review a selection of project management principles and concepts. These include: understanding power and influence, listening, and working within the military decision-making process and environment. This briefing will describe an inclusive, collaborative approach to project management…

Find out more »

May 2016

Deep Dive into the Dark Web

May 25, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Fraud, crimeware, hacktivism, and even nation-state threats are plaguing the Internet daily with no relief in sight. Additionally, these incessant attacks almost always surprise, forcing us into a constant reactive mode and leaving us one step behind of our adversaries. This presentation will focus on gaining an understanding of the current and future trends we have observed from the Deep & Dark Web which can offer illuminating insights into how to remain in front of future threats.

Find out more »

June 2016

Secure Software Development Considerations

June 21, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Organizations are becoming increasingly aware of the importance of secure coding. Secure coding includes software development principles in an effort to minimize the introduction of vulnerabilities within software applications. One of the most common software vulnerabilities is insufficient input validation, which accounts for 50 percent of the most critical vulnerabilities reported to the National Vulnerability Database from 2011 to 2015. Poor input validation is a decades old challenge and to that point, is believed to have caused a glitch within…

Find out more »

July 2016

Next Generation Service Model Architectures

July 28, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Modern networked computing systems are becoming increasingly more complex. The recent explosion of the Internet of Things (IoT), ranging from mobile embedded devices to large scale Cloud-orchestrated services has added significant challenges to the standard administration tasks associated with securing and managing networked services. The underpinnings of traditional Cloud services such as infrastructure as a service (IaaS), Platform as a service (PaaS), and System as a Service (SaaS) has evolved through augmentation of layered virtualization technologies coupled with novel service…

Find out more »

August 2016

From Secure Coding to Secure Software- SEI Webinar

August 17, 2016 @ 13:30 - 14:30 EDT

Organized by: SEI

Systems exploits, intrusions, and stolen data are more prevalent than ever. It seems there are daily headlines related to system security and privacy. Many, if not most, of these incidents could be prevented with more secure coding practices. Software and systems are more connected than ever, often in ways that were not originally designed leading to unforeseen and unprotected attack vectors. The CERT Secure Coding Standards are lists of rules and recommendations for developing secure software. In this webinar, we…

Find out more »

Asymmetric Resilient Cybersecurity (ARC)

August 31, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

We will examine the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means. The ARC concept is built on a modification of the Observe-Orient-Decide-Act (OODA) loop that is inward-focused. We call this the DRDA loop, or the Discover-Reason-Decide-Act loop. Through our projects, we are developing and bringing in technologies that address each quadrant and that will manipulate networks…

Find out more »

September 2016

What Makes a Good Cyber Operator?

September 28, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

What makes a good operator? There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced. This webinar will describe some of these SATs and how they differ between cyber operators, technical, and non-technical personnel based on…

Find out more »

October 2016

Guidance for DISN Connection Approval Process

October 4, 2016
|Recurring Event (See all)
Every Two Weeks on Tuesday

Organized by: DISA

The Risk Adjudication and Connection Division offers both recorded and live training to Department of Defense (DOD) and non-DOD entities seeking to establish, re-accredit, or re-certify their connections to the Defense Information Systems Network (DISN). These training sessions are designed to reduce the frustrations and to provide support to those individuals who are tasked with completing the connection approval packages, as well as the ports, protocols and service management (PPSM) and cross domain solutions (CDS) registrations.

Find out more »

Cyber Threat Landscape: What can you do to mitigate the risks?

October 18, 2016 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Cybersecurity is quickly becoming a top concern for every sector in our country. The worldwide reach of the internet means that cyber threats can come from hackers in the United States and from foreign countries. In this webinar, the head of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center will speak about the emerging cyber threats to the government sector and what steps they can take to minimize the risk and mitigate these threats.

Find out more »

November 2016

DoD Modeling and Simulation (M&S) Catalog

November 15, 2016 @ 12:00 - 13:00 EST

Organized by: CSIAC

One of the goals of the DoD Net Centric vision is to provide visibility into the Modeling & Simulation (M&S) resources across the DoD enterprise. In order to manage and employ M&S capabilities effectively, senior leaders and managers must have visibility into the DoD's M&S portfolio; organizations supported by M&S need visibility into the tools, data, and services that meet their requirements; and M&S developers need access to what has already been created in order to capitalize on existing investments.…

Find out more »

December 2016

A Faster Method for Bot Detection on Social Networks That Eliminates the Need for Expensive Algorithms

December 20, 2016 @ 12:00 - 13:00 EST

Organized by: CSIAC

In this presentation, we present a novel approach to detection of bots on social networks in near real-time. Our approach comprises of computationally simple comparisons and calculations, as opposed to the all too common machine learning approach to this problem, or non-real-time approaches that involve network analysis which is both expensive and time-consuming. The subset of bots this method focuses on, are those that can evade most, if not all, current detection methods. This is simply because they have little…

Find out more »

January 2017

Certified Security by Design for the Internet of Things

January 12, 2017 @ 12:00 - 13:00 EST

Organized by: CSIAC

Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the cyber-physical infrastructure upon which society depends. This webinar presents the challenges involved in securing IoT components and provides possible solutions by drawing inspiration from the past.

Find out more »

February 2017

Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations

February 21, 2017 @ 12:00 - 13:00 EST

Organized by: CSIAC

Attention DoD contractors: NIST’s SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations was revised in December 2016. The revision has produced new requirements, added clarifications, and created many discussion points. This webinar will explain in detail the changes contained in SP 800-171 revision 1 and various FAR/DFAR hooks into the document, impacts it has on your organization, and how you can continue to implement its IA guidelines. Join the Discussion and Ask a Question about the revision …

Find out more »

March 2017

Comply to Connect (C2C)

March 23, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

The challenging era of the Joint Information Environment (JIE) and Internet of Things (IoT) will require increased situational awareness and better control over the traffic flowing across networks. This webinar will describe Comply to Connect (C2C), an automated Network Access Control (NAC) solution that verifies that an endpoint is authorized and meets security requirements before allowing access to the network (i.e. improving mission assurance; increased SA/traffic awareness in JIE; & risk mitigation). These solutions take a standards-based approach to security…

Find out more »

April 2017

CryptoLocker: Surviving a Ransomware Attack

April 19, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

CryptoLocker is exploding and organizations large and small are being hit with ransomware attacks that hold their computers and networks hostage in exchange for ransom. Attacks have halted patient care and effectively stopped organizations in their tracks. Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data. Join us for an in-depth look at ransomware and how you can avoid being the next target.

Find out more »

May 2017

Democratize Anomaly Detection Technologies: Challenges, Advances, and Opportunities

May 16, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

This webinar will highlight recent success in demonstrating substantial improvements in the accuracy under control-flow and data-oriented attacks in Linux, including malicious code reuse, security bypass, and service abuse. One of our technical enablers is the in-depth integration of static program analysis with dynamic learning methods (e.g., HMM) on system-, library-, and function-call traces. The webinar will also describe exciting future research directions on hardware-assisted fast tracing, anomaly-detection as a service, supporting domain experts for inter-disciplinary anomaly discovery, and standardizing evaluation.

Find out more »

June 2017

eMASS, the True Story

June 29, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

This session will cover the realities of the Enterprise Mission Assurance Support Service (eMass): what works well, what does not work, and how to best make it work for you.

Find out more »

July 2017

Standards Based Cyber Risk Assessment Framework

July 27, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Embedded devices are increasingly connected to network resources for additional functionality with the ultimate goal of greater mission capability. Recently, security of connected devices is being scrutinized with highly publicized vulnerabilities of various consumer devices. While several domains are starting to publish new guidelines for cybersecurity there is not a standardized risk assessment framework for organizations to utilize. Furthermore, many domains have not published any cybersecurity guidelines at all. This webinar will talk about some of the industry guidelines that…

Find out more »

August 2017

Free

DISA Weekly Meetings: LGS Innovations

August 2, 2017 @ 08:00 - 17:00 EDT

Organized by: DISA

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. LGS Innovations – a network operations company – Aug. 18 at 9 a.m. “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies to collaborate with…

Find out more »
Free

DISA Weekly Meetings: PacketViper

August 4, 2017 @ 09:00 - 11:00 EDT

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. PacketViper – a cybersecurity security software company 9am to 11 AM $ Aug 2017 “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies to collaborate…

Find out more »
Free

DISA Weekly Meetings: QbitLogic

August 4, 2017 @ 11:00 - 13:00 EDT

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. QbitLogic – a network operations company – Aug. 4 at 11 a.m. “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies to collaborate with industry…

Find out more »
Free

Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability

August 9, 2017 @ 13:00 - 14:30 EDT

During this webinar, Dr. Shannon will examine the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability. He will describe how such “ensurance” can be sustained now and for the long run, and how to weave a stronger fabric of trust in IT operations. What Attendees Will Learn How security, privacy, resilience, and accountability work together to build TRUST The meaning of ENSURE, how…

Find out more »
Free

DISA Weekly Meetings: Nexsan

August 11, 2017 @ 09:00 - 11:00 EDT

Organized by: DISA

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. Nexsan – a computer and storage company – Aug. 11 at 9 a.m. “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies to collaborate with…

Find out more »
Free

DISA Weekly Meetings: Hadean

August 11, 2017 @ 11:00 - 13:00 EDT

Organized by: DISA

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. Hadean – a computer and storage company – Aug. 11 at 11 a.m. “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies to collaborate with…

Find out more »
Free

DISA Weekly Meetings: BeaKen Systems & Technologies Solutions, Inc

August 18, 2017 @ 09:00 - 11:00 EDT

Organized by: DISA

The main goal of these meetings, which are co-hosted by the Defense Information Systems Agency and the DOD Office of the Chief Information Officer (CIO), is to exchange technical information regarding current and emerging technologies, while increasing participants’ knowledge of emerging technical solutions, leveraging best practices, and discussing lessons learned. BeaKen Systems & Technologies Solutions, Inc. – a cybersecurity company – Aug. 18 at 11 a.m. “The Technical Exchange Meetings are an exceptional opportunity for DISA and other federal agencies…

Find out more »

October 2017

Applying the 20 Critical Controls for Risk Assessment

October 26, 2017 @ 12:00 - 13:00 EDT

Organized by: CSIAC

This webinar will introduce attendees to the Center for Internet Security (CIS) Top 20 Critical Security Controls. Tools and techniques to implement the controls will be discussed. With the uncertainty and risks associated with the Internet of Things (IoT), it is essential to understand how to assess a system or a business network and implement controls to eliminate, minimize, mitigate or manage risk. The “Top 20” is an industry accepted framework for cyber security managers to address all elements within…

Find out more »

November 2017

Software Defined WAN (SD-WAN): Security Implications and Design Solutions

November 15, 2017 @ 12:00 - 17:00 EST

Organized by: CSIAC

Software Defined WAN (SD-WAN) is transforming Wide Area Networks (WANs) by providing a highly available Secure WAN Transport combined with Direct Internet Access in the branches. With SD-WAN, Enterprises can mix WAN service offerings from multiple providers (MPLS, Internet, Carrier Ethernet, 3G/4G, ...) to optimize their bandwidth costs and dynamically balance applications across the various links. This session will discuss the security implications of this new architecture. SD-WAN can be implemented either using a tunnel transport centralized security method which…

Find out more »

December 2017

Blockchain: Applications, Security Promises and Internals

December 19, 2017 @ 12:00 - 13:00 EST

Organized by: CSIAC

The Blockchain application started in cryptocurrency and has been surging recently. Blockchain has been rapidly expanding to other fields in finance and beyond and is in the process of revolutionizing our society. In this webinar, Blockchain technology will be introduced from the perspectives of applications, extensible interfaces, security promises and internal mechanisms. Blockchain supports the secure storage of transactions and honestly runs smart contracts. Blockchain’s internal mechanisms are sophisticated and can be viewed from different angles. This webinar will present…

Find out more »

January 2018

CSIAC Webinar – Meeting DFARS Controlled Unclassified Information (CUI) Compliance Standards for Federal Contractors

January 30, 2018 @ 12:00 - 13:00 EST

Organized by: CSIAC

This webinar will detail the steps to become compliant including following the National Institute of Standards (NIST) procedures for Protecting Controlled Unclassified Information in Nonfederal Systems, and Organizations, Special Publication 800-171. Although the deadline is past, many companies still have much work to do to be fully compliant. This webinar will walk through the background of CUI, what organizations have done to become compliant, and outline where the CUI program is headed.

Find out more »

March 2018

CSIAC Webinars – Autonomic Cyber Security (ACS)

March 22, 2018 @ 12:00 - 13:00 EDT

Organized by: CSIAC

This webinar will provide an overview of cutting-edge research efforts being conducted at the University of Arizona’s National Science Foundation (NSF) Cloud and Autonomic Computing Center (CAC) along with one of their affiliate members, AVIRTEK Inc. The CAC mission is to advance the state-of-the-art in the design of cloud-based and autonomic computing systems that are capable of self-healing, self-protecting, and self-optimizing themselves with minimal involvement of users or system administrators. Autonomic Cyber Security (ACS) is a biologically based concept inspired…

Find out more »

September 2018

ICSJWG Webinar Series – The Top 20 Cyberattacks on Industrial Control Systems

September 25, 2018 @ 14:00 - 15:00 EDT

Organized by: ICSJWG

The material will be presented by Andrew Ginter of Waterfall Security Solutions. This presentation very quickly reviews 20 high-consequence attack examples against ICS networks, across a spectrum of sophistication. With a spectrum of attacks at their fingertips, security practitioners can better evaluate gaps in security programs and propose next steps for those programs. All ICSJWG members and other interested individuals are welcome to participate! If you would like to attend, please RSVP to ICSJWG.Communications@hq.dhs.gov with your name, work email address,…

Find out more »

October 2018

Operational Technology Risk Assessment

October 23, 2018 @ 12:00 - 13:00 EDT

Organized by: CSIAC

Historically, an organization developed a Cybersecurity program to achieve compliance. It has been our experience, organizations which achieve full compliance cannot continue to operate because of strict Compliance requirements and the lack of a functional Cybersecurity program. Additionally, the lack of a functional Cybersecurity program enables methodologies found within the Industrial Control System Cyber Kill Chain (Assante & Roberts, 2015). Cybersecurity programs should enable an organization’s Mission and business objectives. When an organization develops a Cybersecurity program specific to the…

Find out more »

Why Should Your Community College Become a Center of Academic Excellence in Cyber?

October 24, 2018 @ 15:00 - 16:00 EDT

Organized by: Excelsior College

To fill the growing demand of cybersecurity professionals, we need top cybersecurity-related degree programs. The Department of Homeland Security (DHS) and the National Security Agency (NSA) jointly sponsor the National Centers of Academic Excellence (CAE) program. The CAE designation is awarded to 2 and 4-year schools based on their degree programs and alignment to specific cyber-related knowledge units (KUs). Join us for this webinar to hear from two CAE designated community colleges and one CAE designated four-year college on the…

Find out more »

December 2018

CSIAC Webinars – Phishing for Solutions: Are Cybersecurity Compliance Based Programs Working?

December 13, 2018 @ 12:00 - 13:00 EST

Organized by: CSIAC

Phishing and spear phishing, i.e. social engineering, have rendered today’s users defenseless against increasingly sophisticated cyber-attacks. In 2016, the Director of National Intelligence (DNI) reported that 91% of all successful cyber-attacks against the Federal Government in 2015 were enabled by social engineering. In short, 91% of successful cyber-attacks were enabled by users. To complicate matters further, Federal users represent a near 100% cybersecurity trained population, operating within compliance-based cybersecurity programs.  If the purpose of cybersecurity programs is to reduce risks,…

Find out more »

March 2019

CSIAC Webinars – The National Security Agency’s Science of Security and Privacy Initiative

March 19 @ 12:00 - 13:00 EDT

Organized by: CSIAC

The Science of Security and Privacy (SoS) Initiative, sponsored by the National Security Agency Research Directorate, fosters a self-sustaining, open, and public security science research community to discover key cyber principles necessary to support improved explanations, predictions and confirmation or validation of predicted outcomes. The discipline of Science of Security and Privacy draws on the bases from multiple disciplines including: Computer Science, Engineering, Mathematics, and Psychology. SoS is advancing the technical aspects of security along with an understanding the human…

Find out more »

August 2019

DoD Enterprise DevSecOps Initiative

August 20 @ 12:00 - 13:00 EDT

Organized by: CSIAC

This webinar will present the vision for transforming DoD software acquisition into secure, responsive software factories. It will examine and explore the utilization of modern software development processes and tools to revolutionize the Department's ability to provide responsive, timely, and secure software capabilities for our warfighters. The focus of the effort involves exploiting automated software tools, services, and standards so warfighters can rapidly create, deploy, and operate software applications in a secure, flexible, and interoperable manner.

Find out more »
+ Export Events