Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol
Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…
The Digital Ecosystem and Project Linchpin
COMING SOON.. DATE TBD This webinar will provide a Project Linchpin Overview – How we got here, who we are, what’s missing, and what we are doing. The goal of Project Linchpin is to deliver…
Validating the Integrity of Computing Devices
Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…
Past Webinars
Improving Cyber Survivability for Weapon System Mission Assurance
In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP). The tasking was a response to the Director…
Understanding Distributed and Blockchain End-to-End Encryption Communication Services
Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…
Quantum Security – Quantum Computing and the Threat to Cybersecurity
The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…
Simulation-Based Testing for DoD Software
The discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or…
New Guidelines for Enhancing Software Supply Chain Security Under EO 14028
This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…
Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned
Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…