Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Is Cyberspace Becoming More Defensible and Resilient?

For over 50 years, the advantages in cyberspace have favored attackers, not defenders. Until the publication of the “U.S. National Cybersecurity Strategy” in 2023, it was never a goal to shift that advantage.  Cyber defense…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

Leveraging Machine Learning: How to Achieve the Right Balance Between Humans and Automation to Optimize Outcomes

The most valuable resource we have in the universe is intelligence, which is simply information and computation. However, in order to be effective, technological intelligence…

Meeting DFARS Controlled Unclassified Information (CUI) Compliance Standards for Federal Contractors

Defense Federal Acquisition Regulation Supplement (DFARS) established guidelines that required all government contractors to establish a program to protect Controlled Unclassified Information (CUI). All federal…

Today’s Predictions for Tomorrow’s Internet

In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. Users…

Cloud Infrastructure Deployment

An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. It is crucial that companies…

Internet of Things (IoT)

Cars, medical devices, and other products will continue to be produced with network capabilities, increasing attack surface. There is expected to be 20.4 billion IoT…

Blockchain: Applications, Security Promises and Internals

The Blockchain application started in cryptocurrency and has been surging recently. Blockchain has been rapidly expanding to other fields in finance and beyond and is…