Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
A Journey From CRISP to ATLAS
This webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Cyber Deconflicted: Understanding the Layers of Cyberspace
The term cyber has been so broadly applied as to encompass virtually everything in the electronic domain. This webinar captures a consolidated DoD view on…
Cybersecurity Issues for Security Managers: 2019
CSIAC SME and member of the American Bar Association’s Information Security Committee, Richard “Rick” Aldrich, gives an overview of the Cybersecurity Issues facing Security Managers.
Security-Conscious Password Behavior from the End-User’s Perspective
Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior. Even if hashing and encrypting are…
Open Innovation Campus (OIC)
This webinar will provide an overview of the Air Force Research Lab (AFRL) Information Directorate’s planned development of the new Open Innovation Campus (OIC) initiative,…
VPNFilter Router Attack
In late May 2018, security researchers announced that specific consumer-grade electronic devices had been infected by a type of malware referred to as the VPNFilter. Only…
DoD Enterprise DevSecOps Initiative
The current Department of Defense (DoD) software acquisition process is not responsive to the needs of our warfighters. Therefore, it is difficult for the DoD…