Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Overview of CISA’s SCuBA Project
The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…
A Framework for Evaluating National Cybersecurity Strategies
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Agile Condor: Supercomputing at the Edge for Intelligent Analytics
Future military conflicts will take place in contested environments where remote sensors deployed in the field will employ advanced artificial intelligence and machine learning technology…
Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures
Organizations’ supply chains are growing increasingly interdependent and complex, the result of which is an ever-increasing attack surface that must be defended. Current supply chain…
5 Best Practices for a Secure Infrastructure
Ransomware incidents are on the rise, specifically due to expanding and complex network configurations. Not only are the incidents costly, monetarily and timewise, but also…
DoD Vulnerability Disclosure Program (VDP)
Established in 2016 by the Secretary of Defense, and born out of Hack The Pentagon, the Vulnerability Disclosure Program (VDP) operates to strengthen the security…
Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 1-4
Part 1 This multi-part series explores a broad range of aspects regarding fifth generation (5G) wireless networks. This initial podcast episode will describe the basics…
Cyber Monitoring
Cyber monitoring: You cannot monitor what you cannot measure. In the world of computer communications, monitoring takes on two distinct forms: performance measuring and monitoring…