Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies: (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

Quantum Security – Quantum Computing and the Threat to Cybersecurity

The promise of quantum computing is to revolutionize traditional computing, enabling us to tackle computational challenges previously considered impossible. Quantum computers are ideal for conducting…

Simulation-Based Testing for DoD Software

The discipline of software testing is changing to align with the automated processes of Agile DevSecOps.  Automated testing is executed by running test scripts or…

New Guidelines for Enhancing Software Supply Chain Security Under EO 14028

This session will review new guidelines under Executive Order (EO) 14028. The National Institute of Standards and Technology, in consultation with industry and other federal…

Users Are Not Stupid: Eight Cybersecurity Pitfalls Overturned

Whether implementing security policy or developing products, it is critical for security teams to consider the human element. Yet they often fall victim to misconceptions…

The Improvement of U.S. Air Force Cyber Defense

Integrated cyber defense has experienced many challenges for the U.S. Air Force (USAF) in the last six years. The idea of active defense, resiliency, and…

Mission-Critical Control System (MCCS) Cybersecurity: Mitigating Legacy & Securing Next-Generation Operational Technology/MCCS

The National Security Agency’s (NSA’s) cybersecurity mission to protect national security systems includes the security of MCCS. This session will provide a strategic and tactical…