DoD’s Cybersecurity Maturity Model Certification (CMMC) and The Risk Management Framework (RMF) in support of government agencies
Leveraging the Cloud to Automate Threat Detection, Hunting and Mitigation Using Frameworks like the NIST CSF and MITRE ATT&CK
The ability to deliver advanced cyber-attacks, once the domain of nation states, has been democratized and are now pervasive.
Blockchain Technologies and Applications: Concept, Initiatives, Status, Problems, and Potential Solutions
Blockchain technologies and their applications are very popular, but in the last several years there are also many problems and obstacles for their broader adoption.
Cybersecurity is in chaos. Despite increased spending, organizations keep exposing known vulnerabilities. Attackers keep penetrating defenses all too easily.
The intent of this and future Cyber Security and Privacy Research Institute (CSPRI) lunches is to provide glimpses of the vibrant security and privacy private sector in the Washington region to GW
May 18, 6:00 p.m. – 9:00 p.m.
Lost Rhino Brewing Co.,
21730 Red Rum Drive #142,
Ashburn, VA, 20147.
Date: Wednesday, May 18, 2016
Time: 03:00 PM
Location: Dirksen Senate Office Building 226
Presiding: Chairman Graham
May 25-26, 2016
Georgetown University Law Center
Hart Auditorium, McDonough Hall
May 19, 5:30 p.m. – 8:00 p.m.
2807 N, Glebe Road
Arlington, VA, 22207
May 19, 12 noon - 1 pm
National Science Foundation, Stafford I, Room 110.
In a GW University Seminar on Internet Freedom and Governance, CSPRI hosted experts in law, policy and academia to discuss the implications of the ongoing Apple v.
There are at least two major forces tugging at the success of new, modern electronic systems that will take advantage of all society knows about technology. One is the desire for an easy syst
Recently Master Card and Visa announced a data breach at one of their payment processor companies that compromised 1.5 million credit card numbers and associated information.
Wikipedia and other Web sites “went dark” and Google covered up its logo with a big black “censored” rectangle on January 18, 2012 to protest the Stop Online Piracy Act (SOPA) and the Protect Intel
nformation security in the health care industry has almost always been viewed as an impediment to productivity.