Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD
The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defense’s (DoD’s) AI ethical principles, while capitalizing…
Government Accountability Office’s Cybersecurity Program Audit Guide (CPAG)
This presentation will focus on the origin of the CPAG and how individuals and auditors can use it when planning for and conducting cybersecurity-related performance audits. Attendees will gain a foundational understanding of the guide’s recommended…
Past Webinars
Improving Cyber Survivability for Weapon System Mission Assurance
In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP). The tasking was a response to the Director…
Understanding Distributed and Blockchain End-to-End Encryption Communication Services
Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…
Quantum Security – Quantum Computing and the Threat to Cybersecurity
The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…
Simulation-Based Testing for DoD Software
The discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or…
New Guidelines for Enhancing Software Supply Chain Security Under EO 14028
This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…
Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned
Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…