Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
A Journey From CRISP to ATLAS
This webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber…
Current Guidance for Test and Evaluation of Artificial Intelligence
As the Defense Department accelerates incorporating artificial intelligence (AI) in all aspects of defense, the importance of rigorous test and evaluation (T&E) grows. In this webinar, contributors to the Developmental Test, Evaluation, and Assessment (DTE&A)…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
From Muddle to Model: M&S in Cyber
Presentation by Dr. Alexander Kott, Chief of the U.S. Army Research Laboratory (ARL) Network Science Division.
M&S Support for Cyber Mission Forces
Presentation by Dr. Steven King, Deputy Director, Cyber Technologies, OASD (R&E).
Discussion on Cyber M&S moderated by Michael Weir
Cyber M&S discussion moderated by Michael Weir, Director of Cybersecurity and Information Systems Information Analysis Center (CSIAC).
Breakout Group Summaries on Cyber M&S
Afternoon breakout groups present summaries and conclusions on Cyber M&S.
Bluetooth
Key facts and figures on Bluetooth, and some tips on how maintain a good security posture in a world of increasingly popular Bluetooth devices.
Asymmetric Resilient Cybersecurity
We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek…