Webcasts
Stay informed of the latest research and solutions to software engineering, cybersecurity, and AI engineering problems with SEI webcasts. Whether you're interested in DevOps, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webcast series has you covered.
Subscribe
Filter by
-
Cyber Challenges in Health Care: Managing for Operational Resilience
• Webcast
By Matthew J. Butkovic
In this webcast, Matthew Butkovic and Darrell Keeling explore approaches to maximize return on cybersecurity investment in the health-care context.
LISTEN -
Independent Verification and Validation for Agile Projects
• Webcast
By Justin Smith
In this webcast, Justin Smith highlights a novel approach to providing independent verification and validation (IV&V) for projects that are using an Agile or iterative software development.
LISTEN -
From Chaos to Clarity: Conceptual Modeling for Complex Systems
• Webcast
By Hasan Yasar
In this webcast, Dr. Wolfgang Maass, Dr. Hyoil Han, and Hasan Yasar discuss key principles of conceptual modeling and explore its significance in various domains and its role in driving …
LISTEN -
Embracing AI: Unlocking Scalability and Transformation Through Generative Text, Imagery, and Synthetic Audio
• Webcast
By Tyler Brooks, Dominic A. Ross, Shannon Gallagher
In this webcast, Tyler Brooks, Shannon Gallagher, and Dominic Ross aim to demystify AI and illustrate its transformative power in achieving scalability, adapting to changing landscapes, and driving digital innovation.
LISTEN -
Generative AI and Software Engineering Education
• Webcast
By Douglas Schmidt (Vanderbilt University), Ipek Ozkaya
In this webcast, three experts in software engineering discuss how generative AI is influencing software engineering education.
LISTEN -
Secure Systems Don’t Happen by Accident
• Webcast
By Timothy A. Chick
In this webcast, Tim Chick discusses how security is an integral aspect of the entire software lifecycle.
LISTEN -
Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance
• Webcast
By Suzanne Miller, Linda Parker Gates, Michael D. Konrad, David James Shepard, Nicholas Testa, Crisanne Nolan
In this webcast, SEI researchers discuss a new AI Robustness (AIR) tool that allows users to gauge AI and ML classifier performance with confidence.
LISTEN -
Using a Scenario to Reason About Implementing a Zero Trust Strategy
• Webcast
By Rhonda Brown, Elias Miller, Timothy Morrow
In this webcast, Tim Morrow, Rhonda Brown and Elias Miller discuss an approach organizations can use to help develop the contextual awareness needed to apply a zero trust strategy.
LISTEN -
Ask Us Anything: Supply Chain Risk Management
• Webcast
By Matthew J. Butkovic, Brett Tucker
In this webcast, Brett Tucker and Matthew Butkovic, answer your enterprise risk management questions to help your organization achieve operational resilience in the cyber supply chain.
LISTEN -
The Future of Software Engineering and Acquisition with Generative AI
• Webcast
By John E. Robert, Douglas Schmidt (Vanderbilt University), James Ivers, Ipek Ozkaya, Shen Zhang, Anita Carleton
In this webcast, SEI researchers explore the future of software engineering and acquisition using generative AI technologies.
LISTEN -
Connecting Stakeholders for DoD Software Systems
• Webcast
By Hasan Yasar
In this webcast, we highlight how the upcoming DoD Weapon Systems Software Summit will play a pivotal role in creating effective solutions for securely delivering robust software capabilities on time …
LISTEN -
Cyber Supply Chain Risk Management: No Silver Bullet
• Webcast
By Brett Tucker
In this webcast, Brett Tucker renews an emphasis on using robust enterprise risk management to achieve operational resilience in the cyber supply chain.
LISTEN -
Ask Us Anything: Generative AI Edition
• Webcast
By Jasmine Ratchford, Douglas Schmidt (Vanderbilt University), Matthew Walsh, John E. Robert, Shing-hon Lau, Rachel Dzombak
In this webcast, SEI researchers answered audience questions and discussed what generative AI does well and the associated risk and opportunities.
LISTEN -
Evaluating Trustworthiness of AI Systems
• Webcast
By Carrie Gardner, Carol J. Smith
In this webcast, SEI researchers discuss how to evaluate trustworthiness of AI systems given their dynamic nature and the challenges of managing ongoing responsibility for maintaining trustworthiness.
LISTEN -
Leveraging Software Bill of Materials Practices for Risk Reduction
• Webcast
By Charles M. Wallen, Michael S. Bandor, Carol Woody
In this webcast, Charles Wallen, Carol Woody, and Michael Bandor discuss how organizations can connect Software Bill of Materials (SBOM) to acquisition and development.
LISTEN -
Institutionalizing the Fundamentals of Insider Risk Management
• Webcast
By Daniel L. Costa
In this webcast, Dan Costa identifies themes of best practices observed over two decades of researching insider threat.
LISTEN -
What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems?
• Webcast
By Linda Parker Gates, Alfred Schenker, Jerome Hugues
In this webcast, Fred Schenker, Jerome Hugues, and Linda Parker Gates discuss the benefits of using a model-based approach to improve the design of a CPS’ embedded computing resources.
LISTEN -
Will Rust Solve Software Security?
• Webcast
By David Svoboda, Joe Sible
In this webcast, David Svoboda and Joe Sible evaluate the Rust programming language from a cybersecurity perspective.
LISTEN -
Top 5 Challenges to Overcome on Your DevSecOps Journey
• Webcast
By Hasan Yasar, Joe Yankel
In this webcast, Hasan Yasar and Joe Yankel discuss the top 5 challenges and barriers to implementing DevSecOps practices.
LISTEN -
Improving Analytics Using Enriched Network Flow Data
• Webcast
By Timothy J. Shimeall, Katherine Prevost
In this webcast, Tim Shimeall and Katherine Prevost discuss how to use IPFIX-formatted data with detail derived from deep packet inspection (DPI) to provide increased confidence in identifying behavior.
LISTEN -
How Can Data Science Solve Cybersecurity Challenges?
• Webcast
By None
In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges.
LISTEN -
AI Next Generation Architecture
• Webcast
By Michael Mattarock
During this webcast, Mike Mattarock discusses some of the primary quality attributes guiding design, and how a Next Generation Architecture can facilitate an integrated future state.
LISTEN -
Addressing Supply Chain Risk and Resilience for Software-Reliant Systems
• Webcast
By Carol Woody, Charles M. Wallen
In this webcast, Carol Woody and Charles Wallen discuss the Acquisition Security Framework (ASF) and how the ASF provides a roadmap to help organizations build security and resilience into a …
LISTEN -
Does your DevSecOps Pipeline only Function as Intended?
• Webcast
By Timothy A. Chick
In this webcast, Tim Chick discusses how using Model Based Systems Engineering, a DevSecOps model can be built.
LISTEN -
Finding Your Way with Software Engineering Buzzwords
• Webcast
By Hasan Yasar
In this webcast, Hasan Yasar discusses the new technologies and buzzwords that are required to implement a complete software delivery pipeline.
LISTEN -
Infrastructure as Code Through Ansible
• Webcast
By Matthew Heckathorn
In this webcast, Matthew Heckathorn discusses how Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning of IT infrastructure.
LISTEN -
Applying the Principles of Agile to Strengthen the Federal Cyber Workforce
• Webcast
By Josh Hammerstein
In this webcast, Josh Hammerstein discusses how to use principles and concepts from Agile development to help cyber workforce development initiatives remain adaptable.
LISTEN -
Ransomware: Defense and Resilience Strategies
• Webcast
By Brett Tucker
In this webcast, Brett Tucker will discuss a novel means for assessing an organization to determine its susceptibility to ransomware.
LISTEN -
Using Open Source to Shrink the Cyber Workforce Gap
• Webcast
By Matt Kaar
In this webcast, Matt Kaar and Jarrett Booz discuss open source initiatives that bring innovative ideas to cybersecurity modeling and simulation.
LISTEN -
Exploring an AI Engineering Body of Knowledge
• Webcast
By Carol J. Smith, Michael Mattarock
In this webcast, Carol Smith, Carrie Gardner, and Michael Mattarock discuss maturing artificial intelligence (AI) practices based on the current body of knowledge from the AI Division.
LISTEN -
What are Deepfakes, and How Can We Detect Them?
• Webcast
By None
In this webcast, Shannon Gallagher and Dominic Ross discuss deepfakes, and what makes them distinguishable as fake for people and computers.
LISTEN -
Adapting Agile and DevSecOps to Improve Non-Software Development Teams
• Webcast
By David Sweeney, Lyndsi A. Hughes
In this webcast, Lyndsi Hughes and David Sweeney share their experiences applying Agile and DevSecOps practices in atypical ways.
LISTEN -
Predictable Use of Multicore in the Army and Beyond
• Webcast
By Bjorn Andersson, Dionisio de Niz
In this webcast, SEI staff members Bjorn Andersson, PhD, Dionisio de Niz, PhD, and William Vance of the U.S. Army Combat Capabilities Development Command Aviation & Missile Center will discuss …
LISTEN -
Developing Models to Support DoD Technical Reviews
• Webcast
By Robert Wojcik, Julie B. Cohen, Linda Parker Gates
In this webcast, Julie Cohen, Rob Wojcik and Linda Parker Gates discuss guidelines that contractors can use to develop models to support System Engineering Technical Reviews.
LISTEN -
Ask Us Anything: Zero Trust Edition
• Webcast
By Greg Touhill
In this webcast, SEI CERT Division Director Greg Touhill, and Dr. Chase Cunningham, chief strategy officer at Ericom Software, answered questions and discussed what you need to implement a Zero …
LISTEN -
Acquisition Disasters? Ideas For Reducing Acquisition Risk
• Webcast
By Alfred Schenker, Linda Parker Gates
In this webcast, Fred Schenker and Linda Parker Gates discuss the status quo, alternative approaches, and how the community of Cyber Physical System acquirers and suppliers can improve.
LISTEN -
A Cybersecurity Engineering Strategy for DevSecOps
• Webcast
By Carol Woody
In this webcast, Carol Woody presents a strategy for cybersecurity engineering in DevSecOps environments.
LISTEN -
CRO Success Factors in the Age of COVID
• Webcast
By Brett Tucker
In this webcast, Brett Tucker, Ryan Zanin, and Abid Adam discuss the critical factors for risk executives to be successful to not only protect critical assets but also to take …
LISTEN -
Zero Trust Journey
• Webcast
By Timothy Morrow, Geoff Sanders
In this webcast, Geoffrey Sanders and Tim Morrow discuss the purpose of and how to think about Zero Trust Architecture transition.
LISTEN -
The Future of AI: Scaling AI Through AI Engineering
• Webcast
By Matt Gaston
Dr. Matt Gaston, Director of the SEI AI Division interviews Dr. Steve Chien and Dr. Jane Pinelis on scaling AI.
LISTEN -
AI Engineering: Ask Us Anything About Building AI Better
• Webcast
By Matt Gaston, Rachel Dzombak
In this webcast, Rachel Dzombak and Matt Gaston take your questions and discuss what is needed to create, deploy, and maintain AI systems we can trust.
LISTEN -
Balanced Approaches to Insider Risk Management
• Webcast
By Randall F. Trzeciak, Daniel L. Costa
In this webcast, Randy Trzeciak and Dan Costa provide an overview of the ongoing research in this area, and answer questions about how the threat landscape continues to evolve, and …
LISTEN -
Software Development Open Forum: Ask Hasan Anything!
• Webcast
By Hasan Yasar
Hasan Yasar answers attendee questions on the software development lifecycle, DevSecOps, SBOM, career training, and the DoD Enterprise DevSecOps Initiative.
LISTEN -
Software Supply Chain Concerns for DevSecOps Programs
• Webcast
By Aaron K. Reffett, Richard Laughlin
In this webcast, Aaron Reffett and Richard Laughlin explore the important architectural aspects of DevSecOps that are impacted by the software supply chain.
LISTEN -
How Do We Teach Cybersecurity?
• Webcast
By Josh Hammerstein, Rotem D. Guttman
Rotem Guttman shares the lessons he's learned over a decade of developing engaging, immersive training and evaluation environments.
LISTEN -
How I Learned to Stop Worrying and Love SLAs
• Webcast
By Matthew J. Butkovic
In this webcast, Matt Butkovic and Alan Levine discuss how cybersecurity SLAs are vital to the success of third-party relationships and a core component of sound governance.
LISTEN -
Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems
• Webcast
By Hasan Yasar
In this webcast, our panel discusses personal experience applying DevOps principles and practices in organizations.
LISTEN -
AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI
• Webcast
By Matt Gaston, Frank Redner, Rachel Dzombak
In this webcast, Rachel Dzombak, Matt Gaston and Frank Redner discuss the national initiative for human-centered, robust and secure, and scalable AI.
LISTEN -
Amplifying Your Privacy Program: Strategies for Success
• Webcast
By Daniel L. Costa, Carrie Gardner
In this webcast, Dan Costa and Carrie Gardner highlight best practices for privacy program planning and implementation.
LISTEN -
DevOps Enables Digital Engineering
• Webcast
By David James Shepard, Hasan Yasar
In this webcast, Hasan Yasar and David Shepard introduce the relatively new concept of Digital Engineering and how they believe DevOps complements/enables Digital Engineering.
LISTEN -
Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency
• Webcast
By Nataliya Shevchenko, Aaron K. Reffett, Joe Yankel
In this webcast, we discuss why an authoritative reference, or Platform Independent Model, is needed to design an integrated DevSecOps strategy.
LISTEN -
SolarWinds Hack: Fallout, Recovery, and Prevention
• Webcast
By Art Manion, Matthew J. Butkovic
The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains.
LISTEN -
Software Engineering for Machine Learning
• Webcast
By Grace Lewis, Ipek Ozkaya
In this webcast, Grace Lewis provides perspectives involved in the development and operation of ML systems.
LISTEN -
Busting the Myths of Programmer Productivity
• Webcast
By Bill Nichols
Are the great programmers really 10 times faster than the rest? What does this difference in productivity even mean?
LISTEN -
What Is Cybersecurity Engineering and Why Do I Need It?
• Webcast
By Carol Woody, Rita C. Creel
In this webcast, Carol Woody and Rita Creel discuss how cybersecurity engineering knowledge, methods, and tools throughout the lifecycle of software-intensive systems will reduce their inherent cyber risk and increase …
LISTEN -
Threats for Machine Learning
• Webcast
By Mark Sherman
Mark Sherman explains where machine learning applications can be attacked, the means for carrying out the attack and some mitigations you can use.
LISTEN -
Follow the CUI: Setting the Boundaries for Your CMMC Assessment 1.0 (CMMC 1.0)
• Webcast
By Matthew Trevors, Gavin Jurecko
In this webcast, Model Architects Gavin Jurecko and Matt Trevors reviewed several steps for identifying CUI exposure in terms of their critical services and the assets that support them.
LISTEN -
Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks?
• Webcast
By Brett Tucker, Matthew J. Butkovic
In this webcast, Brett Tucker and Matthew Butkovic discuss the OCTAVE FORTE process. Attendees learned about the fundamental steps of the process and how they might apply them in their …
LISTEN -
Quality Attribute Concerns for Microservices at the Edge
• Webcast
By Marc Novakouski, Grace Lewis
In this webcast, Marc Novakouski and Grace Lewis reviewed characteristics of edge environments with a focus on architectural qualities.
LISTEN -
Agile in Government: Go for Insight, Not Just Oversight
• Webcast
By Suzanne Miller
This webcast provided practical insights into how a Government Program Office can productively engage with a contractor using Agile and Lean methods.
LISTEN -
Organizational Resilience in a Time of Crisis
• Webcast
By Matthew J. Butkovic, Roberta (Bobbie) Stempfley
An organization can demonstrate operational resilience, when faced with both cyber and physical disruptions, if it focuses on the fundamentals and makes data-driven risk decisions.
LISTEN -
Solving Current Cyber Challenges: Academic and Industry Collaboration
• Webcast
By Timothy J. Shimeall, Timur D. Snoke
The chasm between what academia researches and what industry uses in cyber is wide. By building mutually beneficial collaborations between the two, we can improve algorithms, datasets and techniques that …
LISTEN -
A Discussion on DoD Software Advances and What’s Next from SEI
• Webcast
By Thomas A. Longstaff, Jeff Boleng
SEI Chief Technology Officer Tom Longstaff interviewed Jeff Boleng, a senior advisor to the U.S. Department of Defense, on recent DoD software advances and accomplishments.
LISTEN -
Top 5 Considerations Before Boarding the Container Ship
• Webcast
By David James Shepard, Aaron Volkmann
In this webcast, David Shepard and Aaron Volkmann discussed some of the potential pitfalls of using containers and provide some food for thought to software teams considering embarking on a …
LISTEN -
Trust, Verify & Authorize with DevSecOps
• Webcast
By Hasan Yasar
Hasan Yasar and Eric Bram discussed how the continuous aspect of communication and collaboration among developers and information security teams reinforces core DevOps principles.
LISTEN -
Adopting a DevSecOps Culture in the DoD
• Webcast
By Jeffrey Hamed, Shane Ficorilli
In this webcast, Jeffrey Hamed and Shane Ficorilli discussed the foundational blocks for building a successful DevSecOps culture within a DoD software engineering group.
LISTEN -
Hitting the Ground Running: Reviewing the 17 CMMC Level 1.O Practices (CMMC 1.0)
• Webcast
By Matthew Trevors, Gavin Jurecko
In this webcast, CMMC Architects, Gavin Jurecko, and Matt Trevors provide insight on how to evaluate and assess your organization's readiness for meeting the practice requirements of CMMC Level 1.
LISTEN -
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 1.0 (CMMC 1.0)
• Webcast
By Andrew F. Hoover, Katie C. Stewart
This webcast provides insight into how organizations can prepare for CMMC.
LISTEN -
Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite
• Webcast
By Brett Tucker, Matthew Trevors
This webcast discussed how professionals and executives communicate risk concerns despite the cacophony and distraction posed by technical details and other organizational demands using the new OCTAVE FORTE approach.
LISTEN -
At What Point Does DevSecOps Become Too Risky for the Business?
• Webcast
By Hasan Yasar
This webcast covered the implementation of an automated, continuous risk pipeline that demonstrates how cyber-resiliency and compliance risk can be traced to and from DevSecOps teams working in the SDLC …
LISTEN -
Designing Trustworthy AI: A User Experience (UX) Framework
• Webcast
By Carol J. Smith
This webcast introduced a new user experience (UX) framework to guide the creation of AI systems that are accountable, de-risked, respectful, secure, honest and usable.
LISTEN -
Becoming a Better Software Architect
• Webcast
By Keegan M. Williams, Ipek Ozkaya, Philip Bianco, James Ivers
In this session, a panel of architects discussed their personal paths to becoming software architects and how they have helped others on that journey.
LISTEN -
Cyber Hygiene: Why the Fundamentals Matter
• Webcast
By Randall F. Trzeciak, Matthew J. Butkovic, Matthew Trevors
In this webcast, as a part of National Cybersecurity Awareness Month, our experts provided an overview of the concept of cyber hygiene, which addresses simple sets of actions that users …
LISTEN -
Insider Threats: Your Questions. Our Answers.
• Webcast
By Matthew J. Butkovic, Daniel L. Costa, Randall F. Trzeciak
In this webcast, as a part of National Insider Threat Awareness Month, our experts provided an overview of the ongoing research in this area, and answered questions about how the …
LISTEN -
Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them
• Webcast
By Eileen Wrubel, Timothy Morrow, Dale Alleshouse
This webcast addressed a few of the causes for cloud transition issues, as well as identified some practices that will assist organizations as they plan to transition assets and capabilities …
LISTEN -
Secure Your Code with AI and NLP
• Webcast
By Nathan M. VanHoudnos, Eliezer Kanal
In this talk, we discussed how a branch of artificial intelligence called Natural Language Processing, or NLP, is being applied to computer code.
LISTEN -
DevSecOps Implementation in the DoD: Barriers and Enablers
• Webcast
By Hasan Yasar, Eileen Wrubel, Jeff Boleng
In this webcast, panelists discuss potential enablers of and barriers to using modern software development techniques and processes in the DoD or similar segregated environments.
LISTEN -
What Makes a Good Software Architect (2019 Edition)?
• Webcast
By Ipek Ozkaya, Suzanne Miller, Felix Bachmann, John Klein
The architect's role continues to evolve; in this webcast we revisited the question in the context of today's role and responsibilities.
LISTEN -
Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator
• Webcast
By Gabriel Somlo, Geoffrey B. Dobson, Jeff Mattson, Adam Welle, Christopher May
Throughout this talk, our team of researchers and engineers discuss the solutions we developed to help achieve a new level of realism in simulated cyber environments.
LISTEN -
Improve Your Static Analysis Audits Using CERT SCALe’s New Features
• Webcast
By Lori Flynn
In this webcast, Lori Flynn, a CERT senior software security researcher, describes the new features in SCALe v3, a research prototype tool.
LISTEN -
Five Ways to Boost Cybersecurity with DevOps
• Webcast
By Doug Reynolds, Aaron Volkmann
In this webcast, Doug Reynolds and Aaron Volkmann discuss key DevOps principles, including cross-team collaboration, task automation, tool integration, continuous integration and deployment, and continuous monitoring.
LISTEN -
Next Steps with Blockchain Technology
• Webcast
By Gabriel Somlo, Eliezer Kanal
In this webcast, Elli Kanal and Gabe Somlo discussed some blockchain successes, including a number of interesting applications they have encountered in their work at SEI.
LISTEN -
Digital Footprints: Managing Privacy and Security
• Webcast
By Lena Pons, Matthew J. Butkovic
With the recent Cambridge Analytica news and the rollout of the General Data Privacy Rule (GDPR) in Europe, there are many questions about how social media data privacy is managed …
LISTEN -
Digital Footprints: What Can be Learned from the Traces We Leave on Social Networks
• Webcast
By Carson Sestili, April Galyardt
In this first webcast in a two-part series, April Galyardt and Carson Sestili described what metadata is and what information can be gleaned from it.
LISTEN -
Blockchain: Your Questions. Our Answers.
• Webcast
By Gabriel Somlo, Eliezer Kanal
In this webcast, we explain how the technology works and what makes it fundamentally different than its predecessors. We discuss where it fits (and where it doesn't fit) and help …
LISTEN -
Three Software Innovations that DoD Needs Now
• Webcast
By Nathan M. VanHoudnos, Sam Procter, Robert Schiela, Lena Pons, Jeff Boleng
Watch Jeff Boleng, Robert Schiela, Samuel Procter, Lena Pons, and Nathan VanHoudnos discuss "Three Software Innovations that DoD Needs Now".
LISTEN -
Agile and DevOps: Your Questions. Our Answers.
• Webcast
By Hasan Yasar, Eileen Wrubel
Watch this lively discussion in which we answered attendee questions on all things Agile and DevOps.
LISTEN -
Is Software Spoiling Us?
• Webcast
By Satya Venneti, Grace Lewis, Jeff Boleng, Joe Yankel, Eliezer Kanal
Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
LISTEN -
Four Valuable Data Sources for Network Security Analytics
• Webcast
By Timothy J. Shimeall
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and …
LISTEN -
Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
• Webcast
By Greg Shannon
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience …
LISTEN -
Three Secrets to Successful Agile Metrics
• Webcast
By Will Hayes
Watch this webcast to gain insights into effective metrics programs in government settings.
LISTEN -
Five Keys to Effective Agile Test Automation for Government Programs
• Webcast
By Robert V. Binder, Suzanne Miller
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss five key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment …
LISTEN -
The Evolving Role of the Chief Risk Officer
• Webcast
By Summer C. Fowler, Greg Porter (Heinz College at Carnegie Mellon University)
In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.
LISTEN -
Practical Considerations in Adopting Agile/Lean in Government Settings
• Webcast
By Suzanne Miller, Eileen Wrubel
This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.
LISTEN -
Building Analytics for Network Flow Records
• Webcast
By Timothy J. Shimeall, Matthew Heckathorn
Learn how to identify network flow characteristics and metrics that support understanding traffic
LISTEN -
5 Things You Need to Know About Leading a Successful Large IT Modernization Project
• Webcast
By Will Hayes, Stephany Bellomo, Felix Bachmann
In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.
LISTEN -
Building and Scaling a Malware Analysis System
• Webcast
By Brent Frye
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
LISTEN -
How to Reduce the Graveyard of Software Tools with UI/UX Capability
• Webcast
By Michael Szegedy, Jennifer Cowley
For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this …
LISTEN -
From Secure Coding to Secure Software
• Webcast
By Mark Sherman, Robert Schiela
In this webinar, we discussed how you can improve your organization's secure coding capabilities.
LISTEN -
Security Practitioner Perspective on DevOps for Building Secure Solutions
• Webcast
By Hasan Yasar
This webinar covered the perspectives of security practitioners on building secure software using the DevOps development process and modern security approach.
LISTEN -
Data Science: What It Is and How It Can Help Your Company
• Webcast
By Eliezer Kanal, Brian Lindauer
In this webinar, we discussed what the term “data science” means, what skills a data scientist brings to the table, and what competitive edge data science can bring to your …
LISTEN -
How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate
• Webcast
By Randall F. Trzeciak
In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have …
LISTEN -
Secure Software Development Landscape
• Webcast
By Mark Sherman
Examine how security can be introduced throughout the software development lifecycle to blunt vulnerabilities.
LISTEN -
Coordinated Vulnerability Disclosure
• Webcast
By Dan J. Klinedinst
Learn how to develop a vulnerability coordination capability, which helps you respond to vulnerabilities and demonstrates that you are serious about fixing them.
LISTEN -
Continuous Integration (Secure DevOps)
• Webcast
By Hasan Yasar
Learn how to better identify process improvements at your organization through new perspectives on secure software development and delivery.
LISTEN -
Security Requirements Engineering
• Webcast
By Christopher J. Alberts
Learn the importance of developing security requirements in the same time frame as functional requirements.
LISTEN -
Secure Coding Best Practices
• Webcast
By Robert Schiela
Learn why secure coding practices are important to reduce common programming errors that lead to vulnerabilities.
LISTEN -
What Makes a Good Software Architect?
• Webcast
By John Klein, Ipek Ozkaya, Andrew Kotov
In this webinar, SEI researchers and an industry colleague discussed in two talks What Makes a Good Software Architect?
LISTEN -
Structuring the Chief Information Security Officer Organization
• Webcast
By Julia H. Allen, Nader Mehravari
This webinar described a CISO organizational structure and functions for a typical large, diverse organization using input from CISOs, policies, frameworks, maturity models, standards, and codes of practice.
LISTEN -
Using Network Flow to Gain Cyber Situational Awareness
• Webcast
By Sid Faber
During this webinar we discussed the foundations of cyber situational awareness and how to apply situational awareness concepts to the cyber domain.
LISTEN -
Context Enabled Computing
• Webcast
By Jeff Boleng, Marc Novakouski
In this webinar, we covered a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.
LISTEN -
Intelligence Preparation for Operational Resilience
• Webcast
By None
This webinar proposed the Intelligence Preparation for Operational Resilience (IPOR) framework to create a model for structured analysis of your intelligence needs and a way to operationalize threat intelligence once …
LISTEN -
DevOps Security: Ignore it as Much You Would Ignore Normal Security
• Webcast
By Chris Taschner, Tim Palko
In this presentation, Tim Palko and Chris Taschner explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices.
LISTEN -
A Taxonomy of Testing Types
• Webcast
By Donald Firesmith
Watch Donald Firesmith discuss a taxonomy of testing types to clarify the grand scope of testing and enable attendees to better select the appropriate types of testing for their specific …
LISTEN -
Cyber-Vulnerabilities in Aviation Today
• Webcast
By Robert Behler
SEI Chief Operating Officer, Robert F. Behler discusses Cyber-Vulnerabilities in Aviation Today.
LISTEN -
Web Traffic Analysis with CERT Tapioca
• Webcast
By Will Dormann
Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.
LISTEN -
Enhancing Mobile Device Security
• Webcast
By Jose A. Morales
Jose Morales discusses mobile device security enhancements with defensive and offensive uses.
LISTEN -
Generalized Automated Cyber-Readiness Evaluator (ACE)
• Webcast
By Rotem D. Guttman
Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.
LISTEN -
Finding Related Malware Samples Using Run-Time Features
• Webcast
By Rhiannon Weaver
Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.
LISTEN -
Resilience Panel Discussion
• Webcast
By Katie C. Stewart, Matthew J. Butkovic
Watch a panel of CERT researchers, led by Technical Manager Matt Butkovic, discuss risk management and resilience.
LISTEN -
DevOps Panel Discussion
• Webcast
By Joe Yankel, Kevin Fall, Hasan Yasar
CERT researchers discuss DevOps and its relationship to cybersecurity and the dynamic threat.
LISTEN -
Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps
• Webcast
By Lori Flynn, William Klieber
Will Klieber and Lori Flynn discuss undesired flows of sensitive information within and between Android apps.
LISTEN -
CERT® Alignment with Cyber COI Challenges and Gaps
• Webcast
By Greg Shannon
Greg Shannon discusses the CERT Division's current work associated with cyber community of interest (COI).
LISTEN -
Culture Shock: Unlocking DevOps with Collaboration and Communication
• Webcast
By Todd Waits, Aaron Volkmann
Watch a discussion about ways to shift organizational culture to achieve DevOps. We highlighted communication tools and movements, such as ChatOps.
LISTEN -
What DevOps Is Not!
• Webcast
By Hasan Yasar
In this webinar, we'll talk about DevOps, its common misconceptions and roadblocks, and how you can use DevOps to help your organization reach new heights of efficiency and productivity.
LISTEN -
Approaching Security from an "Architecture First" Perspective
• Webcast
By Rick Kazman
In this talk, we report on three case studies of real-world projects—two industrial and one open-source—where we attempted to measure the consequences of various architectural approaches to security.
LISTEN -
Trends and New Directions in Software Architecture
• Webcast
By Linda M. Northrop
This talk shares a perspective on the trends influencing the need for change, the related architectural challenges, and the applicable research and practices.
LISTEN -
Advancing Cyber Intelligence Practices Through the SEI's Consortium
• Webcast
By Melissa Ludwick, Jay McAllister
Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help …
LISTEN -
Tactical Cloudlets: Moving Cloud Computing to the Edge
• Webcast
By Grace Lewis
This webinar presents the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms.
LISTEN -
Risk Priority Number (RPN) – A Method for Software Defect Report Analysis
• Webcast
By Julie B. Cohen, Will Hayes
This webinar will explain the component used in RPN and how it can help a program select between competing defects to best utilize constrained resources to help lower overall system …
LISTEN -
Lessons in External Dependency and Supply Chain Risk Management
• Webcast
By John Haller, Matthew J. Butkovic
In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will discuss real-world incidents, including recent industrial control system attacks and incidents affecting …
LISTEN -
Architecture Analysis with AADL
• Webcast
By Julien Delange
This webinar introduces the Architecture Analysis and Design Language (AADL), the architecture modeling language used to specify safety-critical systems. We show its use in the Open Source AADL Tool Environment …
LISTEN -
Software Architecture for Big Data Systems
• Webcast
By Ian Gorton
Watch Ian Gorton discuss software architecture for big data systems.
LISTEN -
Architectural Implications of DevOps
• Webcast
By Stephany Bellomo
Watch Stephany Bellomo discuss the architectural implications of DevOps.
LISTEN -
The Smart Grid Maturity Model Around the World
• Webcast
By Jeffrey H. Ferris (IBM)
This webinar will introduce the Smart Grid Maturity Model (SGMM), a management tool designed to help any utility, anywhere, plan its journey toward grid modernization-no customization required.
LISTEN -
When Measurement Benefits the Measured
• Webcast
By Bill Nichols, Mark Kasunic
During this webinar, we shared the performance results of over 100 software teams that have carefully tracked their schedule performance and the quality of their work.
LISTEN -
CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin
• Webcast
By Matthew J. Butkovic
Watch the CERT® RMM User Panel discuss their experiences implementing RMM from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
LISTEN -
Department of Homeland Security Cyber Resilience Review (Case Study)
• Webcast
By Matthew J. Butkovic
Watch Matthew Butkovic discuss the "Department of Homeland Security Cyber Resilience Review (Case Study)" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
LISTEN -
United States Postal Inspection Service (USPIS)
• Webcast
By Julia H. Allen
Watch Julia Allen discuss the United States Postal Inspection Service (USPIS) (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
LISTEN -
Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape
• Webcast
By Nader Mehravari
Watch Nader Mehravari discuss "Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
LISTEN -
Overview of the CERT® Resilience Management Model (CERT®-RMM)
• Webcast
By James J. Cebula
Watch James Cebula discuss the "Overview of the CERT® Resilience Management Model" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
LISTEN -
ABCs of Operational Resilience
• Webcast
By Nader Mehravari
Watch Nader Mehravari discuss the "ABCs of Operational Resilience" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.
LISTEN -
Heartbleed: Analysis, Thoughts, and Actions
• Webcast
By Robert Floodeen, Will Dormann, Robert C. Seacord, Bill Nichols, Jason McCormick, Brent Kennedy
Panelists discussed the impact of Heartbleed, methods to mitigate the vulnerability, and ways to prevent crises like this in the future.
LISTEN -
Taking Advantage of Agile while Minimizing Risk
• Webcast
By David Zubrow
Watch Dave Zubrow discuss “Taking Advantage of Agile while Minimizing Risk” at the Agile for Government Summit.
LISTEN -
SEI Webinar Series: CheckPoint Diagnostic
• Webcast
By None
This webinar will introduce the methodology and outputs of SEI's latest investigative approach: the Checkpoint Diagnostic (CPD).
LISTEN -
Panel Discussion: Managing the Insider Threat: What Every Organization Should Know
• Webcast
By Kurt C. Wallnau, Robert Floodeen, Andrew P. Moore, William R. Claycomb, Randall F. Trzeciak, Alex Nicoll
In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.
LISTEN -
Illicit Cyber Activity Involving Fraud
• Webcast
By Randall F. Trzeciak
In this webinar, Randy Trzeciak discusses a study to develop insights and risk indicators related to malicious insider activity in the banking and finance sector.
LISTEN -
Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data
• Webcast
By Kurt C. Wallnau
In this webinar, Kurt Wallnau discusses insider threat controls and how to test systems whose dynamics are based in human nature that is only partially understood.
LISTEN -
Emerging Trends
• Webcast
By William R. Claycomb, Andrew P. Moore
In this November 2013 webinar, Bill Claycomb and Andrew Moore discuss how technology in emerging trends enables new types of insider attacks.
LISTEN -
Components and Considerations in Building an Insider Threat Program
• Webcast
By Carly L. Huth, Robin Ruefle
In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.
LISTEN -
Best Practices and Controls for Mitigating Insider Threats
• Webcast
By Alex Nicoll, George Silowash
In this 2013 webinar, Alex Nicoll and George Silowash discuss how the CERT division develops, inspects, and transitions insider threat controls to the public.
LISTEN -
Overview of the Threat Posed by Insiders to Critical Assets
• Webcast
By Randall F. Trzeciak, Dave Mundie
In this 2013 webinar, Randy Trzeciak and David Mundie discuss the challenges organizations face as they try to address insider threat.
LISTEN -
20+ Years of Cyber (in)Security
• Webcast
By Richard D. Pethia
In this webinar, Rich Pethia discusses how cybersecurity has changed over the past 20 years.
LISTEN -
Achieving Mission Assurance Through Resilience Management
• Webcast
By Nader Mehravari
In this August 2013 webinar, Nader Mehravari discusses how to protect and sustain the mission and business operations of an organization.
LISTEN -
Observations of Successful Cyber Security Operations
• Webcast
By Roman Danyliw
In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.
LISTEN -
Responding to a Large-Scale Cybersecurity Incident
• Webcast
By Christian Roylo
In this 2013 webinar, Christian Roylo discusses the role of technology in responding to large-scale cyber incidents.
LISTEN -
Developing Your Cyber Workforce
• Webcast
By Christopher May
In this 2013 webinar, Chris May discusses ways to research and develop solutions approaching the cyber workforce development challenge.
LISTEN -
The Cyber Security R&D Pipeline – Building Capability Through Science
• Webcast
By Greg Shannon
In this 2013 webinar, Dr. Greg Shannon describes advances in software engineering to build systems with predictable and improved quality, cost, and schedule.
LISTEN -
Architecting in a Complex World: Achieving Agility and Stability in Large-Scale Software Development
• Webcast
By Ipek Ozkaya
Ipek Ozkaya explores tactics about how organizations can better take advantage of software architecting for large-scale agile software-development efforts.
LISTEN -
Architecting in a Complex World: Eliciting and Specifying Quality Attribute Requirements
• Webcast
By Robert Wojcik
Rob Wojcik describes the Quality Attribute Workshop, a scenario-based approach for eliciting requirements for quality attributes (non-functional system qualities such as performance, availability, and security).
LISTEN -
Architecting in a Complex World: Uncovering Architectural Challenges in a System of Systems
• Webcast
By Michael J. Gagliardi
Mike Gagliardi describes development challenges in usability/automation, capability gaps, resource management, training, migration of legacy systems, and collaboration that they have identified from 46 Mission Thread Workshops.
LISTEN -
Architecture and Design of Service-Oriented Systems (Part 2)
• Webcast
By Grace Lewis
The second part will focus on SOA infrastructure-design considerations, decomposition of an enterprise service bus (ESB) into patterns and tactics as an example of SOA infrastructure, and principles of service …
LISTEN -
Architecture and Design of Service-Oriented Systems (Part 1)
• Webcast
By Grace Lewis
The objective of this tutorial is to provide guidance on the architecture and design of service-oriented systems. Part I covers basic concepts and impact.
LISTEN -
Quantifying Uncertainty in Early Lifecycle Cost Estimation
• Webcast
By James McCurley, Robert W. Stoddard
In this presentation we describe a new, integrative approach for pre-Milestone A cost estimation, which we call QUELCE (Quantifying Uncertainty in Early Lifecycle Cost Estimation).
LISTEN -
SEI Agile Research Forum: DOD CIO, Teri Takai, Keynote Address
• Webcast
By None
Teri Takai discusses the introduction of agile methods into the DoD software acquisition and development environment.
LISTEN -
Source Code Analysis Laboratory (SCALe)
• Webcast
By Robert C. Seacord
In this webinar, Robert Seacord discusses SCALe, a demonstration that software systems can be tested for conformance to secure coding standards.
LISTEN -
SEI Agile Research Forum: The Importance of Applying Agile Technologies to Key DoD Software Initiatives
• Webcast
By Douglas Schmidt (Vanderbilt University)
Douglas Schmidt explores what's at stake for a large-scale development organization that is considering or adopting Agile technologies.
LISTEN -
SEI Agile Research Forum: Strategic Management of Architectural Technical Debt
• Webcast
By Ipek Ozkaya
Ipek Ozkaya shows you how to spot the sources of technical debt in your project, track it, and use it to your advantage.
LISTEN -
SEI Agile Research Forum: Agile Methods: Agile Methods:Tools, Techniques, and Practices for the DoD Community
• Webcast
By Mary Ann Lapham
Mary Ann Lapham describes research into ways that help the DoD overcome technical and cultural resistance to Agile methods.
LISTEN -
Architecting Software the SEI Way - Analyzing and Evaluating Enterprise Architectures
• Webcast
By John Klein
John Klein reviews the SEI perspective on architecture-centric engineering, and discusses how this approach scales from its original software context through systems-of-systems.
LISTEN -
Architecting Software the SEI Way - Architecture Evaluation: A Tool for Designing Systems That Meet Users' Needs
• Webcast
By Felix Bachmann
At this 2012 event, Felix Bachmann discussed the concepts used by an Architecture Tradeoff Analysis Method (ATAM) that make an evaluation successful, which can be integrated into the architecture design …
LISTEN -
Architecting Software the SEI Way - Software Architecture Fundamentals: Technical, Business, and Social Influences
• Webcast
By Robert Wojcik
Although software architecture is a key factor in determining the success or failure of a software system, software professionals throughout the industry continue to struggle with questions like: What exactly …
LISTEN