Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
A Framework for Evaluating National Cybersecurity Strategies
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
Is Cyberspace Becoming More Defensible and Resilient?
For over 50 years, the advantages in cyberspace have favored attackers, not defenders. Until the publication of the “U.S. National Cybersecurity Strategy” in 2023, it was never a goal to shift that advantage. Cyber defense…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Defense Acquisition University Secure Systems Design Course Experiment – Introduction Video
This is an introduction video to a CSIAC-developed course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of the course experiment…
Software Defined WAN (SD-WAN): Security Implications and Design Solutions
Software Defined WAN (SD-WAN) is transforming Wide Area Networks (WANs) by providing a highly available Secure WAN Transport combined with Direct Internet Access in the…
Applying the Top 20 Critical Controls for Risk Assessment
This webinar will introduce attendees to the Center for Internet Security (CIS) Top 20 Critical Security Controls. Tools and techniques to implement the controls will…
Overview of the Software Assurance Marketplace (SWAMP) and SWAMP-in-a-Box (SiB)
With the increasing rate of security breaches, today’s applications need to be built more securely at the code level, and that code needs to be…
Encryption Awareness
Learn the basics about what encryption is and how it works. This short video describes symmetric and asymmetric encryption. This is part 1 of a…