All Podcast Series
CSIAC has produced many video podcasts on several different topics to offer in-depth analysis of current news and issues related to the techincal focus areas of the center. The podcasts have been grouped into series based on what their podcasts are about.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing. Occasionally, the presenter is asked to do a short follow-up video to better describe a section of their presentation or provide an update to the topic.
To assist organizations’ Cyber Awareness training programs, the CSIAC has created a series of videos designed to introduce several fundamental cybersecurity concepts. This fast, free, and easy-to-watch video series describes current cybersecurity threats and protections for government, industry and academia.
CSIAC releases a new online training video on a monthly basis. Subscribe to receive an email notification when new videos are released.
The CSIAC Podcast features discussions with Subject Matter Experts on emerging topics in the fields of cybersecurity, modeling and simulation, software engineering and knowledge management. One-on-one and round-table discussions are held to provide insight into highly technical topics and increase user awareness.
This is a 6-part video series entitled C++ Models by Dr. James Fawcett. Each video describes different conceptual models underlying the C++ programming language. Discussion with exemplars is used to illustrate how the models apply to aspects of the language for effective use. In this series, eight fundamental models are covered: Code Structure, Compilation, Program Execution, Use of Memory, Classes, Object Model, and Templates
These short videos answer frequently asked questions and highlight features of the CSIAC.org website you may not have known existed.
The CSIAC has produced a series of short follow-up videos on recent cybersecurity headlines. These podcast videos provide an update to popular CS Digest articles.
CSIAC periodically hosts workshops on topics of interest to our communities of practice. Some topics include Insider Threat, Cyber Metrics, and Modeling & Simulation utilization for cybersecurity. CSIAC also creates reports that are the documented results of topic-specific analyses performed by CSIAC subject matter experts.
The Insider Threat Workshop was a one-day review of current trends in Insider Threat tactics and remediation steps of interest to managers and Cyber Security professionals. The workshop provided an overview of the current state of understanding of who the “insiders” are, how they operate, what motivates them and what threats they pose to information systems. The workshop also addresses new approaches based on current technology, such as Cloud Computing and Bring Your Own Device (BYOD), and the threats they impose.
The Cybersecurity Metrics Workshop was a one-day review of current trends in policy, tools and techniques of interest to managers and Cyber Security professionals useful in measuring one's cyber security vulnerability. The workshop provided an overview of the current state of understanding of what is presently available and focused on what research needs to be done to develop robust and easy to use techniques to assess and monitor cyber preparedness and vulnerability.
CSIAC organized and hosted an invitation-only workshop at George Mason University. The workshop brought together personnel from the Department of Defense DOD), academia and industry. The goal was to facilitate a discussion and exploration of the technical challenges, research directions, and practical approaches to the utilization of cyber modeling and simulation (M&S) to support the Cyber Mission Forces (CMF).
CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of the course experiment exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices.