Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge…

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

Past Webinars

Autonomic Cyber Security (ACS)

This webinar will provide an overview of cutting-edge research efforts being conducted at the University of Arizona’s National Science Foundation (NSF) Cloud and Autonomic Computing…

Leveraging Machine Learning: How to Achieve the Right Balance Between Humans and Automation to Optimize Outcomes

The most valuable resource we have in the universe is intelligence, which is simply information and computation. However, in order to be effective, technological intelligence…

Meeting DFARS Controlled Unclassified Information (CUI) Compliance Standards for Federal Contractors

Defense Federal Acquisition Regulation Supplement (DFARS) established guidelines that required all government contractors to establish a program to protect Controlled Unclassified Information (CUI). All federal…

Today’s Predictions for Tomorrow’s Internet

In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. Users…

Cloud Infrastructure Deployment

An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. It is crucial that companies…

Internet of Things (IoT)

Cars, medical devices, and other products will continue to be produced with network capabilities, increasing attack surface. There is expected to be 20.4 billion IoT…