Events
Insider Threat Program Manager (ITPM) Certificate Package
Jan 22-24, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Jan 22-24, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterProbing the Limits: A Workshop on Red-Teaming AI Systems
Jan 28, 2025 · Full Day
Participants in this workshop will help identify best practices for red teaming Generative AI Systems to extend existing guidance on cyber red teaming.
Register NowAFCEA West 2025
Jan 28-30, 2025
Visit the Software Engineering Institute at Booth #3233!
RegisterAFCEA Rocky Mountain CyberSpace Symposium
Feb 10-13, 2025
The Software Engineering Institute will be exhibiting at the annual AFCEA Rocky Mountain CyberSpace Symposium on February 10-13 2025 in Colorado Springs, Colorado. Visit the Software Engineering Institute at Booth 335!
RegisterSoftware Architecture Design and Analysis
Feb 11-14, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Feb 19-21, 2025
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Risk Management: Measures of Effectiveness
Feb 19-21, 2025
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Feb 25-27, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Feb 25-27, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Mar 4-6, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Mar 4-6, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterFloCon 2025
Mar 4, 2025 · 8AM-5PM (ET)
Situational Awareness: Beyond the Network
Register NowInsider Threat Analyst
Mar 18-20, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterCreating a Computer Security Incident Response Team
Mar 25, 2025
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.
RegisterManaging Computer Security Incident Response Teams
Mar 26-28, 2025
This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.
RegisterInsider Threat Program Manager: Implementation and Operation
Apr 8-10, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Apr 8-10, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterDocumenting Software Architectures
Apr 28-May 1, 2025
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterRSA Conference 2025
Apr 28-May 1, 2025
Meet with CERT Division staff at the SEI booth #1649. RSA unites experts from many corners of the cybersecurity world who are united in a common mission: to foresee risks, counter threats, and embrace the challenges ahead. Together, we shape the future of security.
RegisterDesigning Modern Service-Based Systems
May 6, 2025
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
RegisterInsider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterDesign Guidelines and Patterns for Microservices
May 12-15, 2025
This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterSoftware Architecture Design and Analysis
Jun 10-13, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Risk Management Symposium 2025
Jun 12, 2025
The theme of this year's event is “Technology-Driven Changes to the Insider Risk Landscape". This symposium will explore how recent technical advancements have changed the threat landscape for insider risk management program practitioners, and how these same emerging technologies can (and cannot) be used to help organizations more effectively manage insider risk.
RegisterInsider Threat Program Manager: Implementation and Operation
Jun 24-26, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jun 24-26, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInternational Workshop on Envisioning the AI-Augmented Software Development Life Cycle
Jun 24, 2025
This workshop, collocated with FSE 2025, seeks to explore how AI might transform end-to-end software systems development workflows and emphasizes the need to collect relevant data now to assess the long-term effects of AI throughout the software development life cycle (SDLC).
RegisterTechnical Meeting for CSIRTs with National Responsibility (NatCSIRT 2025)
Jun 27, 2025
The 20th Annual Technical Meeting for CSIRTs with National Responsibility (NatCSIRT 2025) is an invitation-only meeting restricted to technical and managerial staff members of National CSIRTs. The meeting provides a forum for National CSIRTs to share information, tools, techniques, and strategies that address problems unique to CSIRTs that are responsible for a nation or economy.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jul 22-24, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Jul 22-24, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterCybersecurity Oversight for the Business Executive
Jul 29-30, 2025
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Aug 5-7, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Aug 5-7, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture Design and Analysis
Aug 12-15, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterSoftware Architecture: Principles and Practices
Aug 18-21, 2025
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Program Manager: Implementation and Operation
Sep 16-18, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Sep 16-18, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterAdvanced Topics in Incident Handling
Sep 23-26, 2025
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
RegisterDeveloping a National or Government CSIRT
Oct 7-8, 2025
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.
RegisterSoftware Architecture Design and Analysis
Oct 14-17, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Threat Program Manager: Implementation and Operation
Oct 21-23, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Oct 21-23, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Risk Management: Measures of Effectiveness
Oct 28-30, 2025
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Oct 28-30, 2025
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterRisk Program Development - Governance and Appetite Workshop
Nov 12-13, 2025
This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.
RegisterIntroduction to the CERT Resilience Management Model
Dec 2-3, 2025
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
RegisterInsider Threat Analyst
Dec 9-11, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Register