Webinars

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Upcoming Webinars

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood…

Past Webinars

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use…

Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography

This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the post-quantum cryptographic (PQC) algorithms being standardized by the National Institute of Standards…

The Digital Ecosystem and Project Linchpin

NOTE: This webinar start time has changed to 12:30 PM EDT. This webinar will provide a Project Linchpin overview – how we got here, who…

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information…

Open-Source Security and Generative AI: Navigating Concerns While Enhancing Development

This webinar will explore the impact of OpenAI’s ChatGPT, GitHub CoPilot, and other generative artificial intelligence (AI) tools on open-source software and security. With over…