Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Modeling and Simulation on the Final Frontier With AFSIM
This webinar will contain CUI and is restricted to U.S. government and contractors. Registrants may be asked to provide verification of their status. A link…
Mirage: Cyber Deception Against Autonomous Cyber Attacks
The enhancements in search and neural network classifiers, as well as computing advancements, led to the creation of the AlphaGo system, which is capable of…
Optimization Techniques: Improving Effectiveness for Defense Simulation Models
When performing defense system analysis with simulation models, a great deal of time and effort are expended, creating representations of real-world scenarios in U.S. Department…
Past Webinars
Improving Cyber Survivability for Weapon System Mission Assurance
In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP). The tasking was a response to the Director…
Understanding Distributed and Blockchain End-to-End Encryption Communication Services
Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…
Quantum Security – Quantum Computing and the Threat to Cybersecurity
The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…
Simulation-Based Testing for DoD Software
The discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or…
New Guidelines for Enhancing Software Supply Chain Security Under EO 14028
This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…
Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned
Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…