Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Connecting With Cyber: Developing an Enterprise Risk Program
COMING SOONÂ – EXACT DATE AND TIME TBD. This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related…
Deceptive AI: Understanding and Defending Against the Next Generation of Cyber Weapons
COMING SOONÂ – EXACT DATE AND TIME TBD. In the evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force and new frontier of vulnerabilities. This presentation provides a critical analysis of…
Past Webinars
Agile Condor: Supercomputing at the Edge for Intelligent Analytics
Future military conflicts will take place in contested environments where remote sensors deployed in the field will employ advanced artificial intelligence and machine learning technology…
Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures
Organizations’ supply chains are growing increasingly interdependent and complex, the result of which is an ever-increasing attack surface that must be defended. Current supply chain…
5 Best Practices for a Secure Infrastructure
Ransomware incidents are on the rise, specifically due to expanding and complex network configurations. Not only are the incidents costly, monetarily and timewise, but also…
DoD Vulnerability Disclosure Program (VDP)
Established in 2016 by the Secretary of Defense, and born out of Hack The Pentagon, the Vulnerability Disclosure Program (VDP) operates to strengthen the security…
Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 1-4
Part 1 This multi-part series explores a broad range of aspects regarding fifth generation (5G) wireless networks. This initial podcast episode will describe the basics…
Cyber Monitoring
Cyber monitoring: You cannot monitor what you cannot measure. In the world of computer communications, monitoring takes on two distinct forms: performance measuring and monitoring…