All Podcast Series
CSIAC has produced many video podcasts on several different topics to offer in-depth analysis of current news and issues related to the techincal focus areas of the center. The podcasts have been grouped into series based on what their podcasts are about.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing. Occasionally, the presenter is asked to do a short follow-up video to better describe a section of their presentation or provide an update to the topic.
To assist organizations’ Cyber Awareness training programs, the CSIAC has created a series of videos designed to introduce several fundamental cybersecurity concepts. This fast, free, and easy-to-watch video series describes current cybersecurity threats and protections for government, industry and academia.
CSIAC releases a new online training video on a monthly basis. Subscribe to receive an email notification when new videos are released.
The CSIAC Podcast features discussions with Subject Matter Experts on emerging topics in the fields of cybersecurity, modeling and simulation, software engineering and knowledge management. One-on-one and round-table discussions are held to provide insight into highly technical topics and increase user awareness.
This is a 6-part video series entitled C++ Models by Dr. James Fawcett. Each video describes different conceptual models underlying the C++ programming language. Discussion with exemplars is used to illustrate how the models apply to aspects of the language for effective use. In this series, eight fundamental models are covered: Code Structure, Compilation, Program Execution, Use of Memory, Classes, Object Model, and Templates
Rust is a fairly new programming language with the goal of being a safe systems programming language. “Safe” means code generated by Rust is free of memory access and data race vulnerabilities. System programming language means that Rust programs are fast and able to use platform resources. This 5-part video series entitled Rust Models by Dr. James Fawcett, describes different conceptual models that underlie the Rust programming language. Discussion with exemplars is used to illustrate how the models describe aspects of the language for effective use
The 5th generation (5G) of wireless technology will soon be available with the launching of 5G wireless networks along with compatible cellular technologies. 5G is built on the 802.11ac Institute of Electrical and Electronics Engineers (IEEE) wireless networking standard. Speeds are anywhere from 10x to 100x faster than 4G. CSIAC discusses this further along with the impacts of IoT and mobile devices that 5G will or may cause. This four-part podcast series is a discussion between CSIAC Senior Science Advisor, Dr. Paul Losiewicz and Dr. Carl Kutsche of Idaho National Laboratory.
This podcast series is dedicated to the research, comparison, and analysis of varied programming languages. Depending on the podcast, concepts such as initial speed, performance and security of memory access differences are studied and compared by software engineering subject matter experts. Practical conclusions are drawn from the analysis that programmers, web developers and other professionals in the industry can apply
These short videos answer frequently asked questions and highlight features of the CSIAC.org website you may not have known existed.
The CSIAC has produced a series of short follow-up videos on recent cybersecurity headlines. These podcast videos provide an update to popular CS Digest articles.
CSIAC periodically hosts workshops on topics of interest to our communities of practice. Some topics include Insider Threat, Cyber Metrics, and Modeling & Simulation utilization for cybersecurity. CSIAC also creates reports that are the documented results of topic-specific analyses performed by CSIAC subject matter experts.
The Insider Threat Workshop was a one-day review of current trends in Insider Threat tactics and remediation steps of interest to managers and Cyber Security professionals. The workshop provided an overview of the current state of understanding of who the “insiders” are, how they operate, what motivates them and what threats they pose to information systems. The workshop also addresses new approaches based on current technology, such as Cloud Computing and Bring Your Own Device (BYOD), and the threats they impose.
The Cybersecurity Metrics Workshop was a one-day review of current trends in policy, tools and techniques of interest to managers and Cyber Security professionals useful in measuring one's cyber security vulnerability. The workshop provided an overview of the current state of understanding of what is presently available and focused on what research needs to be done to develop robust and easy to use techniques to assess and monitor cyber preparedness and vulnerability.
CSIAC organized and hosted an invitation-only workshop at George Mason University. The workshop brought together personnel from the Department of Defense DOD), academia and industry. The goal was to facilitate a discussion and exploration of the technical challenges, research directions, and practical approaches to the utilization of cyber modeling and simulation (M&S) to support the Cyber Mission Forces (CMF).
CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of the course experiment exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices.
This Department of Defense (DoD) focused virtual event addressed the current and future challenges involving SmartBase/SmartCity initiatives. Presenters included stakeholders from the military services and the national research laboratories, as well as scientists and engineers from academia and industry. This two-day event brought professionals from all backgrounds together that are working SmartCity and SmartBase initiatives to share issues, perspectives, approaches and lessons learned. The SmartBase/SmartCity Virtual Event was organized by the Defense Technical Information Center (DTIC) sponsored Information Analysis Centers (IACs). Subject Matter Experts (SMEs) from the Cybersecurity and Information Systems IAC (CSIAC) and the Homeland Defense and Security IAC (HDIAC) created a detailed agenda and lead the virtual event's presentations and discussion panels. The agenda can be downloaded here: https://r.csiac.org/smartbase-agenda This defense community event was endorsed by U.S. Central Command (USCENTCOM), co-signed by the CCJ4 and CCJ8