Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Cybersecurity Maturity Model Certification (CMMC) and DoD NIST 800-171 Rev 2 & 171A: Protecting Controlled Unclassified Information (CUI)

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography

This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the post-quantum cryptographic (PQC) algorithms being standardized by the National Institute of Standards and Technology (NIST) as framed by the following two publications…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge…

Past Webinars

Intro to Cross Domain Solutions

Cross Domain Solutions (CDSs) facilitate electronic information transfer between security domains via a secure and highly controlled interface. Their capabilities are essential to a wide…

Automated Test and Re-Test (ATRT) Demonstration

The podcast demonstrates features of the DOD SBIR funded automated testing solution called Automated Test and Re-Test (ATRT). ATRT addresses automated software testing challenges and…

Automated Test and Re-Test (ATRT) and DOD – Challenges and Solutions

This presentation discusses automated software testing challenges and solutions based on experiences with DOD systems. The presentation will discuss how a DOD SBIR funded automated…

A Disruptive Game Changer to Achieve DOD Austerity

Today the challenges that threaten the sustainability of the defense software industry are Cyber Security and austerity. How did the futurists get it wrong? When…

Software Security Growth Modeling Webinar

Security growth modeling, analogous to reliability growth modeling, is an attempt to quantify how the projected security of a system increases with detection and removal…

Summary of Software Security Growth Modeling Webinar

Security growth modeling, analogous to reliability growth modeling, is an attempt to quantify how the projected security of a system increases with detection and removal…