Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Upcoming Webinars

Quantum Security – Quantum Computing and the Threat to Cybersecurity

The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…

Understanding Distributed and Blockchain End-to-End Encryption Communication Services

Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…

Improving Cyber Survivability for Weapon System Mission Assurance

In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP).  The tasking was a response to the Director…

Systems Security Engineering (SSE) Cyber Guidebook (SSECG)

The Department of the Air Force (DAF) Systems Security Engineering (SSE) Cyber Guidebook (SSECG) is intended to assist Program Offices in performing Cybersecurity, Cyber Resiliency…

Cyber Test and Evaluation

Cyber T&E policy and guidance is being modernized to keep pace with the DoD acquisition objectives stated in the DoDI 5000.01: Simplify Acquisition Policy Tailor…

Past Webinars

Action Bias and the Two Most Dangerous Words in Cybersecurity

Most cybersecurity professionals acknowledge that achieving perfect security is impossible. Yet, they nobly strive for perfection as the ultimate goal and feel loss, failure, and…

The Case for a National Cybersecurity Safety Board

In the wake of a series of destabilizing and damaging cyberattacks, there has been a growing call for the U.S. government to establish an analogue…

President’s Cup Cybersecurity Competition: Building a Competition Across the Federal Workforce

In 2019, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) held the first cybersecurity competition for the federal workforce. The goal of…

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of…

Cyber Resilient Weapon Systems Body of Knowledge (CRWS-BoK)

The Resilient Systems (RS) Directorate in the Strategic Technology Protection and Exploitation Office, under the Office of the Under Secretary of Defense for Research and…

What is Digital Twin Technology All About, Anyway?

A Digital Twin (DT) is a real-time, virtual representation (a digital equivalent) of real-world objects such as devices, systems, places, business processes, and people. The…