Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Host a Webinar with CSIAC
Upcoming Webinars
Extended Reality for Maintenance and Repair Training
Extended reality (XR) is an all-encompassing term that groups three similar technologies: (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development…
A Framework for Evaluating National Cybersecurity Strategies
As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…
AI Reliability Risk Assessment
Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…
Past Webinars
Evolving Developments in Cyberlaw: June 2019
CSIAC SME and member of the American Bar Association’s Information Security Committee, Richard “Rick” Aldrich, gives a snapshot of the recent developments in cyberlaw, policy,…
Data Manipulation
What is data manipulation? A misconception is that hackers always steal data, but this assumption is incorrect. Data manipulation attacks occur when an adversary does…
Binary File Application Scanner: A prototype for scanning, detecting and reporting PII in disparate binary formats
Large data volumes (aka “big data”) coupled with the use of new technologies can greatly increase the amount of Personally Identifiable Information (PII) data collected…
OWASP Amass: Discovering Your Exposure on the Internet
The Open Web Application Security Project (OWASP) Amass project was originally created when the project lead was showing organizations what they look like on the…
Reducing Your Digital Footprint
Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital footprint. The information left behind…
Emerging Developments in Cyberlaw: March 2019
CSIAC SME and member of the American Bar Association’s Information Security Committee, Richard “Rick” Aldrich, gives a snapshot of the recent developments in cyberlaw, policy,…