Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge…

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

Past Webinars

Cyber Test and Evaluation (T&E)

Cyber T&E policy and guidance are being modernized to keep pace with the U.S. Department of Defense (DoD) acquisition objectives stated in DoDI 5000.01: Simplify…

Think Like an Adversary With DAU

The cyber threat landscape is constantly evolving, and organizations continue to expand their digital edge by heavily relying on mobile and Internet-of-Things (IoT) devices.  COVID-19…

Systems Security Engineering (SSE) Cyber Guidebook (SSECG)

The U.S. Department of the Air Force (DAF) Systems Security Engineering (SSE) Cyber Guidebook (SSECG) is intended to assist program offices in performing cybersecurity, cyber…

Improving Cyber Survivability for Weapon System Mission Assurance

In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP).  The tasking was a response to the Director…

Understanding Distributed and Blockchain End-to-End Encryption Communication Services

Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…

Quantum Security – Quantum Computing and the Threat to Cybersecurity

The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…