Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol
Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…
Research Challenges for Large Pretrained Models
This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge…
Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?
On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…
Past Webinars
Cyber Test and Evaluation (T&E)
Cyber T&E policy and guidance are being modernized to keep pace with the U.S. Department of Defense (DoD) acquisition objectives stated in DoDI 5000.01: Simplify…
Think Like an Adversary With DAU
The cyber threat landscape is constantly evolving, and organizations continue to expand their digital edge by heavily relying on mobile and Internet-of-Things (IoT) devices. COVID-19…
Systems Security Engineering (SSE) Cyber Guidebook (SSECG)
The U.S. Department of the Air Force (DAF) Systems Security Engineering (SSE) Cyber Guidebook (SSECG) is intended to assist program offices in performing cybersecurity, cyber…
Improving Cyber Survivability for Weapon System Mission Assurance
In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP). The tasking was a response to the Director…
Understanding Distributed and Blockchain End-to-End Encryption Communication Services
Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…
Quantum Security – Quantum Computing and the Threat to Cybersecurity
The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…