Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Extended Reality for Maintenance and Repair Training
Extended reality (XR) is an all-encompassing term that groups three similar technologies: (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development…
A Framework for Evaluating National Cybersecurity Strategies
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures
Organizations’ supply chains are growing increasingly interdependent and complex, the result of which is an ever-increasing attack surface that must be defended. Current supply chain…
5 Best Practices for a Secure Infrastructure
Ransomware incidents are on the rise, specifically due to expanding and complex network configurations. Not only are the incidents costly, monetarily and timewise, but also…
DoD Vulnerability Disclosure Program (VDP)
Established in 2016 by the Secretary of Defense, and born out of Hack The Pentagon, the Vulnerability Disclosure Program (VDP) operates to strengthen the security…
Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 1-4
Part 1 This multi-part series explores a broad range of aspects regarding fifth generation (5G) wireless networks. This initial podcast episode will describe the basics…
Cyber Monitoring
Cyber monitoring: You cannot monitor what you cannot measure. In the world of computer communications, monitoring takes on two distinct forms: performance measuring and monitoring…
Update on Current FDA Cybersecurity Efforts
Over the past several years, FDA has undertaken a significant and diverse set of efforts aimed at improving not only medical device cybersecurity, but cybersecurity…