Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Deceptive AI: Understanding and Defending Against the Next Generation of Cyber Weapons
In the evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force and new frontier of vulnerabilities. This presentation provides a critical analysis of the deceptive behaviors used to turn AI…
Satellite Cybersecurity
As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…
Assessing DoD Mission Resilience: A Guide to Cyber DT&E
This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring…
Past Webinars
Defense Acquisition University Secure Systems Design Course Experiment – Introduction Video
This is an introduction video to a CSIAC-developed course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of the course experiment…
Software Defined WAN (SD-WAN): Security Implications and Design Solutions
Software Defined WAN (SD-WAN) is transforming Wide Area Networks (WANs) by providing a highly available Secure WAN Transport combined with Direct Internet Access in the…
Applying the Top 20 Critical Controls for Risk Assessment
This webinar will introduce attendees to the Center for Internet Security (CIS) Top 20 Critical Security Controls. Tools and techniques to implement the controls will…
Overview of the Software Assurance Marketplace (SWAMP) and SWAMP-in-a-Box (SiB)
With the increasing rate of security breaches, today’s applications need to be built more securely at the code level, and that code needs to be…
Encryption Awareness
Learn the basics about what encryption is and how it works. This short video describes symmetric and asymmetric encryption. This is part 1 of a…