Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

A Journey From CRISP to ATLAS

This webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

NREL’s Energy Security and Resilience Center

This webinar discusses the National Renewable Energy Laboratory’s ongoing work to ensure energy security and resilience in today’s interconnected and interdependent world. Today, widely available…

Agile, Energy-Efficient, and Trustworthy Intelligence at the Edge

Artificial intelligence (AI) has become the linchpin in a growing number of products, services, and research programs which are aimed at automating and enhancing the…

Risk Management Framework (RMF) Categorization Part 1-4

In this four part podcast series, CSIAC subject matter experts (SMEs) conduct a roundtable discussion of the first step of the Risk Management Framework (RMF)…

What Is Machine Learning Anyway?

Machine learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the…

Simulating Cyberattacks on Nuclear Command and Control

During the height of the Cold War, the biggest fear involved the possibility of mutually assured destruction (MAD) from nuclear warfare. However, in today’s digital…

Cybersecurity Simplified

To many, cybersecurity is a well-known but poorly understood topic. System owners specializing in non-software/Information Technology (IT) functions have undoubtedly been warned of the potentially…