Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography

This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the Post-Quantum Cryptographic (PQC) algorithms being standardized by the National Institute of Standards and Technology (NIST) as framed by the following two publications…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

The Digital Ecosystem and Project Linchpin

This webinar will provide a Project Linchpin overview – how we got here, who we are, what is missing, and what we are doing.  The goal of Project Linchpin is to deliver trusted artificial intelligence/machine-learning…

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…

Past Webinars

Partitioning Complexity: Breaking down without breaking down

Complex systems are, in a word, complex. The underlying complexity of a given problem is constant. Complexity can be hidden, but it cannot be eliminated….

Managing Technical Debt

“Technical Debt” refers to delayed technical work that is incurred when technical short cuts are taken, usually in pursuit of calendar-driven software schedules. Just like…

IT Estimation 6 Truths You Must Learn

Software estimation is both art and science. Many good cost software cost estimation models, strategies, tools and techniques exist and are useful. However, estimation for…

Securing Systems through Software Reliability Engineering

Software reliability engineering (SRE) represents a well-established set of techniques for specification and assessment of dependability of software-based systems. Application of these techniques to security…

Model Driven Development

The idea of generating code from models has been implemented in a variety of ways with relative success. Most commercially available tools are UML-based, but…

Cloud Nine, Are We There Yet?

Cloud computing is a paradigm that makes the notion of utility computing a reality. Instead of Information Technology (IT) organizations investing in all of the…