Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography
This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the Post-Quantum Cryptographic (PQC) algorithms being standardized by the National Institute of Standards and Technology (NIST) as framed by the following two publications…
Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol
Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…
The Digital Ecosystem and Project Linchpin
This webinar will provide a Project Linchpin overview – how we got here, who we are, what is missing, and what we are doing. The goal of Project Linchpin is to deliver trusted artificial intelligence/machine-learning…
Validating the Integrity of Computing Devices
Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…
Past Webinars
Partitioning Complexity: Breaking down without breaking down
Complex systems are, in a word, complex. The underlying complexity of a given problem is constant. Complexity can be hidden, but it cannot be eliminated….
Managing Technical Debt
“Technical Debt” refers to delayed technical work that is incurred when technical short cuts are taken, usually in pursuit of calendar-driven software schedules. Just like…
IT Estimation 6 Truths You Must Learn
Software estimation is both art and science. Many good cost software cost estimation models, strategies, tools and techniques exist and are useful. However, estimation for…
Securing Systems through Software Reliability Engineering
Software reliability engineering (SRE) represents a well-established set of techniques for specification and assessment of dependability of software-based systems. Application of these techniques to security…
Model Driven Development
The idea of generating code from models has been implemented in a variety of ways with relative success. Most commercially available tools are UML-based, but…
Cloud Nine, Are We There Yet?
Cloud computing is a paradigm that makes the notion of utility computing a reality. Instead of Information Technology (IT) organizations investing in all of the…