Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
A Framework for Evaluating National Cybersecurity Strategies
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
Is Cyberspace Becoming More Defensible and Resilient?
For over 50 years, the advantages in cyberspace have favored attackers, not defenders. Until the publication of the “U.S. National Cybersecurity Strategy” in 2023, it was never a goal to shift that advantage. Cyber defense…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Leveraging Machine Learning: How to Achieve the Right Balance Between Humans and Automation to Optimize Outcomes
The most valuable resource we have in the universe is intelligence, which is simply information and computation. However, in order to be effective, technological intelligence…
Meeting DFARS Controlled Unclassified Information (CUI) Compliance Standards for Federal Contractors
Defense Federal Acquisition Regulation Supplement (DFARS) established guidelines that required all government contractors to establish a program to protect Controlled Unclassified Information (CUI). All federal…
Today’s Predictions for Tomorrow’s Internet
In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. Users…
Cloud Infrastructure Deployment
An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. It is crucial that companies…
Internet of Things (IoT)
Cars, medical devices, and other products will continue to be produced with network capabilities, increasing attack surface. There is expected to be 20.4 billion IoT…
Blockchain: Applications, Security Promises and Internals
The Blockchain application started in cryptocurrency and has been surging recently. Blockchain has been rapidly expanding to other fields in finance and beyond and is…