Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Modeling and Simulation on the Final Frontier With AFSIM

This webinar will contain CUI and is restricted to U.S. government and contractors. Registrants may be asked to provide verification of their status. A link…

Past Webinars

The Bilateral Enterprise Analysis Model (BEAM)

The Bilateral Enterprise Analysis Model (BEAM) is a new joint campaign tool that enables easy analysis of strategy, force structure, or infrastructure changes. It has…

Emerging Developments in Cyberlaw

Information security professionals increasingly need to be familiar with developments in cyberlaw to ensure they comport their actions within the contours of the law.  Unfortunately,…

NIST Risk Management Framework

The NIST Risk Management Framework (RMF) provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control…

Cyber Test and Evaluation (T&E)

Cyber T&E policy and guidance are being modernized to keep pace with the U.S. Department of Defense (DoD) acquisition objectives stated in DoDI 5000.01: Simplify…

Think Like an Adversary With DAU

The cyber threat landscape is constantly evolving, and organizations continue to expand their digital edge by heavily relying on mobile and Internet-of-Things (IoT) devices.  COVID-19…

Systems Security Engineering (SSE) Cyber Guidebook (SSECG)

The U.S. Department of the Air Force (DAF) Systems Security Engineering (SSE) Cyber Guidebook (SSECG) is intended to assist program offices in performing cybersecurity, cyber…