Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

Digital Transformation of SATCOM Networks

Driven by the rapidly changing space segment, satellite ground networks are in the midst of evolutionary change called the digital transformation. The digital transformation will…

Physical Cybersecurity: Using One-Way Data Diodes to Secure Asset Monitoring

A new class of technology promises to combine the security of an “air gap” with the connectivity needed to efficiently manage both modern and legacy…

Action Bias and the Two Most Dangerous Words in Cybersecurity

Most cybersecurity professionals acknowledge that achieving perfect security is impossible. Yet, they nobly strive for perfection as the ultimate goal and feel loss, failure, and…

The Case for a National Cybersecurity Safety Board

In the wake of a series of destabilizing and damaging cyberattacks, there has been a growing call for the U.S. government to establish an analogue…

President’s Cup Cybersecurity Competition: Building a Competition Across the Federal Workforce

In 2019, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) held the first cybersecurity competition for the federal workforce. The goal of…

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of…