• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ All Podcast Series / The CSIAC Podcast

The CSIAC Podcast

The CSIAC Podcast features discussions with Subject Matter Experts on emerging topics in the fields of cybersecurity, modeling and simulation, software engineering and knowledge management. One-on-one and round-table discussions are held to provide insight into highly technical topics and increase user awareness.

Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures

Posted: 12/15/2020 | Presenter: Daniel Carbonaro | 1 Comment

This podcast seeks to add context not only to the challenges facing security within the Information and Communications Technology (ICT) Supply Chain, but attempts to give a hybrid framework for any business regardless of size or function to follow when attempting to mitigate threats both to and from within their supply chain.

Learn More

5 Best Practices for a Secure Infrastructure

Posted: 11/09/2020 | Presenter: Farhat Shah | Leave a Comment

Hackers are becoming progressively more sophisticated. The attacks can take place on companies, businesses, hospitals, government organizations and universities, alike. A non-intentional lack of awareness of basic security practices can easily lead to a ransomware attack with irreparable damage.

This video podcast describes some best practices that can assist in preventing incidents on a network and mitigate the risk in case of a cyber attack.

Learn More

Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 4

Posted: 10/21/2020 | Presenters: Dr. Carl Kutsche, Dr. Paul B. Losiewicz | Leave a Comment

This multi-part series explores a broad range of aspects regarding fifth generation (5G) wireless networks. In this final episode, 5G-oriented National Cyber Strategies are discussed and future 5G devices are examined.

Learn More

Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 3

Posted: 10/21/2020 | Presenters: Dr. Carl Kutsche, Dr. Paul B. Losiewicz | Leave a Comment

This episode will discuss new 5G capabilities and applications, this includes mission-critical services, massive Internet of Things (IoT), and enhanced mobile broadband. It also explores potential cybersecurity concerns involving 5G technology and methods to mitigate these issues.

Learn More

Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 2

Posted: 10/21/2020 | Presenters: Dr. Carl Kutsche, Dr. Paul B. Losiewicz | Leave a Comment

This episode will discuss 5G infrastructure changes and examine the varying properties of different frequencies. Multiple private network architectures as well as INL secure wireless capabilities will be described.

Learn More

Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 1

Posted: 10/21/2020 | Presenters: Dr. Carl Kutsche, Dr. Paul B. Losiewicz | Leave a Comment

This initial podcast episode will describe the basics of 5G, including the evolution of this wireless technology. It will touch on the potential applications it will enable and examine spectrum issues associated with 5G.

Learn More

Hypergaming for Cyber – Strategy for Gaming a Wicked Problem

Posted: 10/02/2020 | Presenter: Dr. Joshua Alton Sipper | Leave a Comment

Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other…

Learn More

The Evolution of Peer to Peer File Sharing Systems

Posted: 09/24/2020 | Presenter: Charlie Merulla | Leave a Comment

In this episode of the CSIAC podcast, Charlie Merulla explains the evolution of peer to peer file sharing systems. Man has had the need to share information since the beginning of time and today is no exception. This podcast looks into the technical details of how files are shared today. Trends associated with peer to peer file sharing systems are examined. Lastly, the risks associated with file sharing and how to minimize those risks are presented.

Learn More

Advanced Persistent Threats

Posted: 09/21/2020 | Presenter: Ryan T. Moran | Leave a Comment

This podcast discusses the distinguishing characteristics common to an APT – describing the individual phases of the typical APT life-cycle and the respective challenges each poses to securing an organization’s integrity.

Learn More

Rust Programming Language: Addressing Software Development and Program Security Shortfalls

Posted: 08/13/2020 | Presenter: Dr. Jim Fawcett | Leave a Comment

This podcast features a roundtable discussion centered around challenges and benefits of using a new programming language called “Rust,” which can fundamentally improve resilience and survivability of software intensive systems.

Learn More

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.