• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ All Podcast Series / CSIAC Webinars

Series: CSIAC Webinars

CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.

Subscribe to receive an email notification when registration is open for new webinars.


Resilient Cloud Services: Design, Analysis and Evaluation

Posted: 10/11/2015 | Presenter: Salim Hariri | Leave a Comment

Current advances in computing, networking and software technology will lead to the development of cyberspace (“cloud”) services that are ubiquitous and will revolutionize all aspects of our life. The delivery of these services will require cyberspace resources that are highly resilient. This presentation will review the development of a Resilient Cloud Services (RCS) Methodology. RCS…

Watch Now!

Cyber Information Sharing and Public Policy

Posted: 09/03/2015 | Presenter: Dr. John Bay | Leave a Comment

The US Senate is currently debating a vote on its thirteenth major cybersecurity information sharing bill. It is important to understand why the government is being so persistent pursuing such policy and why the previous twelve bills have failed. The reasons to pursue such a bill can be compared to the reasons that we have…

Watch Now!

Using Unified Code Count (UCC) for Data Collection

Posted: 08/11/2015 | Presenter: Anandi Hira | Leave a Comment

Understanding the software development process and gathering data and metrics on the process is an important step to making better-informed cost and effort estimates, improving processes, and making good decisions. UCC (Unified Code Count) is a comprehensive SLOC (software lines of code) counter, and also provides metrics such as Cyclomatic Complexity and difference metrics between…

Watch Now!

Cloud Attacks, Threats, and Defenses

Posted: 05/11/2015 | Presenter: Mr. Gary Hamilton | Leave a Comment

As organizations migrate critical services to the cloud, adversaries gain increasing incentive to gain access to these environments. Attacks against cloud environments can range from traditional exploits against an instance to complex, low-level attacks against the underlying infrastructure. This webinar will provide an overview of cloud attacks, drawing directly upon expertise demonstrating vulnerabilities in these…

Watch Now!

Cloud Computing and the Government Sector Understanding the Cloud Architecture and Requirements

Posted: 09/11/2014 | Presenter: Mr. Gary Hamilton | Leave a Comment

Adoption of cloud computing requires a thorough understanding of its purpose, characteristics, underlying technologies, service models, and the standards that govern its deployment. This webinar will discuss the fundamental features of cloud computing, service models, deployment models, business models, and provide a brief overview of major providers. Further discussion will focus on the interpretation and…

Watch Now!

The Building Security In Maturity Model (BSIMM)

Posted: 06/11/2014 | Presenters: Jason Hills, Mike Ware | Leave a Comment

The Building Security In Maturity Model (BSIMM, pronounced “bee simm”) is designed to help you understand, measure, and plan a software security initiative. The BSIMM-V was created by observing and analyzing real-world data from sixty-seven software security initiatives. It is freely available and is licensed under the Creative Commons Attribution-Share Alike 3.0 License. The BSIMM…

Watch Now!

Heartbleed: Making On-line Security Popular with the Masses

Posted: 05/11/2014 | Presenter: Aaron Grace | Leave a Comment

On April first 2014, a severe flaw in an OpenSSL cryptographic library was publicly announced. Unfortunately, this was no April Fool’s joke and the vulnerability proceeded to capture the attention of security professionals and average internet users alike. This webinar will discuss the details of the vulnerability, how it affects the average internet user, and…

Watch Now!

Certifying Security Testers

Posted: 03/11/2014 | Presenter: Hugh “Taz” Daughtrey | Leave a Comment

Recent significant security failures – affecting commercial, educational, and government systems – highlight the damage caused by inadequate cybersecurity. Such risks can be reduced through more thoughtful design and implementation of critical systems, but appraisals are also necessary to provide adequate confidence in these systems. Testing is a key appraisal activity. This presentation starts with…

Watch Now!

An Architecture-centric Virtual Integration Strategy to Safety-Critical System Verification

Posted: 02/11/2014 | Presenter: Peter Feiler | Leave a Comment

As safety-critical systems have become more software-reliant, verification of such system has become an increasing challenge, as evidenced exponential increase in verification related software rework cost. Industry studies show that 70% of defects are introduced in requirements and architecture design, while 80% are discovered post-unit test, with up to 80% of system functionality dealing with…

Watch Now!

Software Cost Estimation Metrics Online Manual

Posted: 01/11/2014 | Presenter: Brad Clark | Leave a Comment

The Software Cost Estimation Metrics Manual is now available in an online version. This presentation discusses taking DoD’s Software Resource Data Reports and creating productivity benchmarks and cost / schedule estimating relationships. This latest edition of the manual discusses what data to collect for creating cost and schedule estimating relationships (small models that estimate project…

Watch Now!

  • « Previous Page
  • Page 1
  • …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • …
  • Page 9
  • Next Page »

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More