Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

shield

Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD

The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defense’s (DoD’s) AI ethical principles, while capitalizing…

GAO

Government Accountability Office’s Cybersecurity Program Audit Guide (CPAG)

This presentation will focus on the origin of the CPAG and how individuals and auditors can use it when planning for and conducting cybersecurity-related performance audits. Attendees will gain a foundational understanding of the guide’s recommended…

Past Webinars

Improving Cyber Survivability for Weapon System Mission Assurance

In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP).  The tasking was a response to the Director…

Understanding Distributed and Blockchain End-to-End Encryption Communication Services

Blockchain, cryptocurrency, and “web3” are all terms that you may have heard before or possibly dabbled in; but are you aware that there are dark…

Quantum Security – Quantum Computing and the Threat to Cybersecurity

The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…

Simulation-Based Testing for DoD Software

The discipline of software testing is changing to align with the automated processes of Agile DevSecOps.  Automated testing is executed by running test scripts or…

New Guidelines for Enhancing Software Supply Chain Security Under EO 14028

This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…

Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned

Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…