Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

hand writing on screen with AI written on it

A Multilayered Defense Strategy Against Adversarial AI Attack

In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Is Cyberspace Becoming More Defensible and Resilient?

For over 50 years, the advantages in cyberspace have favored attackers, not defenders. Until the publication of the “U.S. National Cybersecurity Strategy” in 2023, it was never a goal to shift that advantage.  Cyber defense…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

New Guidelines for Enhancing Software Supply Chain Security Under EO 14028

This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…

Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned

Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…

The Improvement of U.S. Air Force Cyber Defense

Integrated cyber defense has experienced many challenges for the U.S. Air Force (USAF) in the last six years. The idea of active defense, resiliency, and…

Mission-Critical Control System (MCCS) Cybersecurity: Mitigating Legacy & Securing Next-Generation Operational Technology/MCCS

The National Security Agency’s (NSA’s) cybersecurity mission to protect national security systems includes the security of MCCS. This session will provide a strategic and tactical…

Zero Trust – The Time Is Now!

While many improvements are being made in cybersecurity within the U.S. Department of Defense (DoD), the improvements are not keeping up with adversaries.  The traditional…

Explainable, Do-It-Yourself Artificial Intelligence Supporting the DoD and the Intelligence Community

Although artificial intelligence (AI) continues to make rapid advances in the automation of many analysis and operations tasks, the development and training of AI models…