search menu icon-carat-right cmu-wordmark

Webcasts

Stay informed of the latest research and solutions to software engineering, cybersecurity, and AI engineering problems with SEI webcasts. Whether you're interested in DevOps, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webcast series has you covered.

Subscribe

Filter by

  • Secure Systems Don’t Happen by Accident

    Webcast
    By Timothy A. Chick

    In this webcast, Tim Chick discusses how security is an integral aspect of the entire software lifecycle.

    LISTEN
  • Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance

    Webcast
    By Crisanne Nolan , Nicholas Testa , David James Shepard , Linda Parker Gates , Suzanne Miller , Michael D. Konrad

    In this webcast, SEI researchers discuss a new AI Robustness (AIR) tool that allows users to gauge AI and ML classifier performance with confidence.

    LISTEN
  • Using a Scenario to Reason About Implementing a Zero Trust Strategy

    Webcast
    By Timothy Morrow , Rhonda Brown , Elias Miller

    In this webcast, Tim Morrow, Rhonda Brown and Elias Miller discuss an approach organizations can use to help develop the contextual awareness needed to apply a zero trust strategy.

    LISTEN
  • Ask Us Anything: Supply Chain Risk Management

    Webcast
    By Brett Tucker , Matthew J. Butkovic

    In this webcast, Brett Tucker and Matthew Butkovic, answer your enterprise risk management questions to help your organization achieve operational resilience in the cyber supply chain.

    LISTEN
  • The Future of Software Engineering and Acquisition with Generative AI

    Webcast
    By Douglas Schmidt (Vanderbilt University) , Ipek Ozkaya , Anita Carleton , John E. Robert , James Ivers , Shen Zhang

    In this webcast, SEI researchers explore the future of software engineering and acquisition using generative AI technologies.

    LISTEN
  • Connecting Stakeholders for DoD Software Systems

    Webcast
    By Hasan Yasar

    In this webcast, we highlight how the upcoming DoD Weapon Systems Software Summit will play a pivotal role in creating effective solutions for securely delivering robust software capabilities on time …

    LISTEN
  • Cyber Supply Chain Risk Management: No Silver Bullet

    Webcast
    By Brett Tucker

    In this webcast, Brett Tucker renews an emphasis on using robust enterprise risk management to achieve operational resilience in the cyber supply chain.

    LISTEN
  • Ask Us Anything: Generative AI Edition

    Webcast
    By Douglas Schmidt (Vanderbilt University) , Jasmine Ratchford , Matthew Walsh , John E. Robert , Rachel Dzombak , Shing-hon Lau

    In this webcast, SEI researchers answered audience questions and discussed what generative AI does well and the associated risk and opportunities.

    LISTEN
  • Evaluating Trustworthiness of AI Systems

    Webcast
    By Carol J. Smith , Carrie Gardner

    In this webcast, SEI researchers discuss how to evaluate trustworthiness of AI systems given their dynamic nature and the challenges of managing ongoing responsibility for maintaining trustworthiness.

    LISTEN
  • Leveraging Software Bill of Materials Practices for Risk Reduction

    Webcast
    By Carol Woody , Michael S. Bandor , Charles M. Wallen

    In this webcast, Charles Wallen, Carol Woody, and Michael Bandor discuss how organizations can connect Software Bill of Materials (SBOM) to acquisition and development.

    LISTEN
  • Institutionalizing the Fundamentals of Insider Risk Management

    Webcast
    By Daniel L. Costa

    In this webcast, Dan Costa identifies themes of best practices observed over two decades of researching insider threat.

    LISTEN
  • What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems?

    Webcast
    By Alfred Schenker , Jerome Hugues , Linda Parker Gates

    In this webcast, Fred Schenker, Jerome Hugues, and Linda Parker Gates discuss the benefits of using a model-based approach to improve the design of a CPS’ embedded computing resources.

    LISTEN
  • Will Rust Solve Software Security?

    Webcast
    By David Svoboda , Joe Sible

    In this webcast, David Svoboda and Joe Sible evaluate the Rust programming language from a cybersecurity perspective.

    LISTEN
  • Top 5 Challenges to Overcome on Your DevSecOps Journey

    Webcast
    By Hasan Yasar , Joe Yankel

    In this webcast, Hasan Yasar and Joe Yankel discuss the top 5 challenges and barriers to implementing DevSecOps practices.

    LISTEN
  • Improving Analytics Using Enriched Network Flow Data

    Webcast
    By Timothy J. Shimeall , Katherine Prevost

    In this webcast, Tim Shimeall and Katherine Prevost discuss how to use IPFIX-formatted data with detail derived from deep packet inspection (DPI) to provide increased confidence in identifying behavior.

    LISTEN
  • How Can Data Science Solve Cybersecurity Challenges?

    Webcast
    By Software Engineering Institute

    In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges.

    LISTEN
  • AI Next Generation Architecture

    Webcast
    By Michael Mattarock

    During this webcast, Mike Mattarock discusses some of the primary quality attributes guiding design, and how a Next Generation Architecture can facilitate an integrated future state.

    LISTEN
  • Addressing Supply Chain Risk and Resilience for Software-Reliant Systems

    Webcast
    By Charles M. Wallen , Carol Woody

    In this webcast, Carol Woody and Charles Wallen discuss the Acquisition Security Framework (ASF) and how the ASF provides a roadmap to help organizations build security and resilience into a …

    LISTEN
  • Does your DevSecOps Pipeline only Function as Intended?

    Webcast
    By Timothy A. Chick

    In this webcast, Tim Chick discusses how using Model Based Systems Engineering, a DevSecOps model can be built.

    LISTEN
  • Finding Your Way with Software Engineering Buzzwords

    Webcast
    By Hasan Yasar

    In this webcast, Hasan Yasar discusses the new technologies and buzzwords that are required to implement a complete software delivery pipeline.

    LISTEN
  • Infrastructure as Code Through Ansible

    Webcast
    By Matthew Heckathorn

    In this webcast, Matthew Heckathorn discusses how Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning of IT infrastructure.

    LISTEN
  • Applying the Principles of Agile to Strengthen the Federal Cyber Workforce

    Webcast
    By Josh Hammerstein

    In this webcast, Josh Hammerstein discusses how to use principles and concepts from Agile development to help cyber workforce development initiatives remain adaptable.

    LISTEN
  • Ransomware: Defense and Resilience Strategies

    Webcast
    By Brett Tucker

    In this webcast, Brett Tucker will discuss a novel means for assessing an organization to determine its susceptibility to ransomware.

    LISTEN
  • Using Open Source to Shrink the Cyber Workforce Gap

    Webcast
    By Matt Kaar

    In this webcast, Matt Kaar and Jarrett Booz discuss open source initiatives that bring innovative ideas to cybersecurity modeling and simulation.

    LISTEN
  • Exploring an AI Engineering Body of Knowledge

    Webcast
    By Michael Mattarock , Carol J. Smith

    In this webcast, Carol Smith, Carrie Gardner, and Michael Mattarock discuss maturing artificial intelligence (AI) practices based on the current body of knowledge from the AI Division.

    LISTEN
  • What are Deepfakes, and How Can We Detect Them?

    Webcast
    By Software Engineering Institute

    In this webcast, Shannon Gallagher and Dominic Ross discuss deepfakes, and what makes them distinguishable as fake for people and computers.

    LISTEN
  • Adapting Agile and DevSecOps to Improve Non-Software Development Teams

    Webcast
    By David Sweeney , Lyndsi A. Hughes

    In this webcast, Lyndsi Hughes and David Sweeney share their experiences applying Agile and DevSecOps practices in atypical ways.

    LISTEN
  • Predictable Use of Multicore in the Army and Beyond

    Webcast
    By Dionisio de Niz , Bjorn Andersson

    In this webcast, SEI staff members Bjorn Andersson, PhD, Dionisio de Niz, PhD, and William Vance of the U.S. Army Combat Capabilities Development Command Aviation & Missile Center will discuss …

    LISTEN
  • Developing Models to Support DoD Technical Reviews

    Webcast
    By Robert Wojcik , Julie B. Cohen , Linda Parker Gates

    In this webcast, Julie Cohen, Rob Wojcik and Linda Parker Gates discuss guidelines that contractors can use to develop models to support System Engineering Technical Reviews.

    LISTEN
  • Ask Us Anything: Zero Trust Edition

    Webcast
    By Greg Touhill

    In this webcast, SEI CERT Division Director Greg Touhill, and Dr. Chase Cunningham, chief strategy officer at Ericom Software, answered questions and discussed what you need to implement a Zero …

    LISTEN
  • Acquisition Disasters? Ideas For Reducing Acquisition Risk

    Webcast
    By Linda Parker Gates , Alfred Schenker

    In this webcast, Fred Schenker and Linda Parker Gates discuss the status quo, alternative approaches, and how the community of Cyber Physical System acquirers and suppliers can improve.

    LISTEN
  • A Cybersecurity Engineering Strategy for DevSecOps

    Webcast
    By Carol Woody

    In this webcast, Carol Woody presents a strategy for cybersecurity engineering in DevSecOps environments.

    LISTEN
  • CRO Success Factors in the Age of COVID

    Webcast
    By Brett Tucker

    In this webcast, Brett Tucker, Ryan Zanin, and Abid Adam discuss the critical factors for risk executives to be successful to not only protect critical assets but also to take …

    LISTEN
  • Zero Trust Journey

    Webcast
    By Geoff Sanders , Timothy Morrow

    In this webcast, Geoffrey Sanders and Tim Morrow discuss the purpose of and how to think about Zero Trust Architecture transition.

    LISTEN
  • The Future of AI: Scaling AI Through AI Engineering

    Webcast
    By Matt Gaston

    Dr. Matt Gaston, Director of the SEI AI Division interviews Dr. Steve Chien and Dr. Jane Pinelis on scaling AI.

    LISTEN
  • AI Engineering: Ask Us Anything About Building AI Better

    Webcast
    By Matt Gaston , Rachel Dzombak

    In this webcast, Rachel Dzombak and Matt Gaston take your questions and discuss what is needed to create, deploy, and maintain AI systems we can trust.

    LISTEN
  • Balanced Approaches to Insider Risk Management

    Webcast
    By Randall F. Trzeciak , Daniel L. Costa

    In this webcast, Randy Trzeciak and Dan Costa provide an overview of the ongoing research in this area, and answer questions about how the threat landscape continues to evolve, and …

    LISTEN
  • Software Development Open Forum: Ask Hasan Anything!

    Webcast
    By Hasan Yasar

    Hasan Yasar answers attendee questions on the software development lifecycle, DevSecOps, SBOM, career training, and the DoD Enterprise DevSecOps Initiative.

    LISTEN
  • Software Supply Chain Concerns for DevSecOps Programs

    Webcast
    By Aaron K. Reffett , Richard Laughlin

    In this webcast, Aaron Reffett and Richard Laughlin explore the important architectural aspects of DevSecOps that are impacted by the software supply chain.

    LISTEN
  • How Do We Teach Cybersecurity?

    Webcast
    By Rotem D. Guttman , Josh Hammerstein

    Rotem Guttman shares the lessons he's learned over a decade of developing engaging, immersive training and evaluation environments.

    LISTEN
  • How I Learned to Stop Worrying and Love SLAs

    Webcast
    By Matthew J. Butkovic

    In this webcast, Matt Butkovic and Alan Levine discuss how cybersecurity SLAs are vital to the success of third-party relationships and a core component of sound governance.

    LISTEN
  • Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems

    Webcast
    By Hasan Yasar

    In this webcast, our panel discusses personal experience applying DevOps principles and practices in organizations.

    LISTEN
  • AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI

    Webcast
    By Matt Gaston , Frank Redner , Rachel Dzombak

    In this webcast, Rachel Dzombak, Matt Gaston and Frank Redner discuss the national initiative for human-centered, robust and secure, and scalable AI.

    LISTEN
  • Amplifying Your Privacy Program: Strategies for Success

    Webcast
    By Carrie Gardner , Daniel L. Costa

    In this webcast, Dan Costa and Carrie Gardner highlight best practices for privacy program planning and implementation.

    LISTEN
  • DevOps Enables Digital Engineering

    Webcast
    By Hasan Yasar , David James Shepard

    In this webcast, Hasan Yasar and David Shepard introduce the relatively new concept of Digital Engineering and how they believe DevOps complements/enables Digital Engineering.

    LISTEN
  • Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency

    Webcast
    By Aaron K. Reffett , Nataliya Shevchenko , Joe Yankel

    In this webcast, we discuss why an authoritative reference, or Platform Independent Model, is needed to design an integrated DevSecOps strategy.

    LISTEN
  • SolarWinds Hack: Fallout, Recovery, and Prevention

    Webcast
    By Art Manion , Matthew J. Butkovic

    The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains.

    LISTEN
  • Software Engineering for Machine Learning

    Webcast
    By Grace Lewis , Ipek Ozkaya

    In this webcast, Grace Lewis provides perspectives involved in the development and operation of ML systems.

    LISTEN
  • Busting the Myths of Programmer Productivity

    Webcast
    By Bill Nichols

    Are the great programmers really 10 times faster than the rest? What does this difference in productivity even mean?

    LISTEN
  • What Is Cybersecurity Engineering and Why Do I Need It?

    Webcast
    By Rita C. Creel , Carol Woody

    In this webcast, Carol Woody and Rita Creel discuss how cybersecurity engineering knowledge, methods, and tools throughout the lifecycle of software-intensive systems will reduce their inherent cyber risk and increase …

    LISTEN
  • Threats for Machine Learning

    Webcast
    By Mark Sherman

    Mark Sherman explains where machine learning applications can be attacked, the means for carrying out the attack and some mitigations you can use.

    LISTEN
  • Follow the CUI: Setting the Boundaries for Your CMMC Assessment 1.0 (CMMC 1.0)

    Webcast
    By Matthew Trevors , Gavin Jurecko

    In this webcast, Model Architects Gavin Jurecko and Matt Trevors reviewed several steps for identifying CUI exposure in terms of their critical services and the assets that support them.

    LISTEN
  • Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks?

    Webcast
    By Matthew J. Butkovic , Brett Tucker

    In this webcast, Brett Tucker and Matthew Butkovic discuss the OCTAVE FORTE process. Attendees learned about the fundamental steps of the process and how they might apply them in their …

    LISTEN
  • Quality Attribute Concerns for Microservices at the Edge

    Webcast
    By Marc Novakouski , Grace Lewis

    In this webcast, Marc Novakouski and Grace Lewis reviewed characteristics of edge environments with a focus on architectural qualities.

    LISTEN
  • Agile in Government: Go for Insight, Not Just Oversight

    Webcast
    By Suzanne Miller

    This webcast provided practical insights into how a Government Program Office can productively engage with a contractor using Agile and Lean methods.

    LISTEN
  • Organizational Resilience in a Time of Crisis

    Webcast
    By Matthew J. Butkovic , Roberta (Bobbie) Stempfley

    An organization can demonstrate operational resilience, when faced with both cyber and physical disruptions, if it focuses on the fundamentals and makes data-driven risk decisions.

    LISTEN
  • Solving Current Cyber Challenges: Academic and Industry Collaboration

    Webcast
    By Timothy J. Shimeall , Timur D. Snoke

    The chasm between what academia researches and what industry uses in cyber is wide. By building mutually beneficial collaborations between the two, we can improve algorithms, datasets and techniques that …

    LISTEN
  • A Discussion on DoD Software Advances and What’s Next from SEI

    Webcast
    By Thomas A. Longstaff , Jeff Boleng

    SEI Chief Technology Officer Tom Longstaff interviewed Jeff Boleng, a senior advisor to the U.S. Department of Defense, on recent DoD software advances and accomplishments.

    LISTEN
  • Top 5 Considerations Before Boarding the Container Ship

    Webcast
    By Aaron Volkmann , David James Shepard

    In this webcast, David Shepard and Aaron Volkmann discussed some of the potential pitfalls of using containers and provide some food for thought to software teams considering embarking on a …

    LISTEN
  • Trust, Verify & Authorize with DevSecOps

    Webcast
    By Hasan Yasar

    Hasan Yasar and Eric Bram discussed how the continuous aspect of communication and collaboration among developers and information security teams reinforces core DevOps principles.

    LISTEN
  • Adopting a DevSecOps Culture in the DoD

    Webcast
    By Jeffrey Hamed , Shane Ficorilli

    In this webcast, Jeffrey Hamed and Shane Ficorilli discussed the foundational blocks for building a successful DevSecOps culture within a DoD software engineering group.

    LISTEN
  • Hitting the Ground Running: Reviewing the 17 CMMC Level 1.O Practices (CMMC 1.0)

    Webcast
    By Matthew Trevors , Gavin Jurecko

    In this webcast, CMMC Architects, Gavin Jurecko, and Matt Trevors provide insight on how to evaluate and assess your organization's readiness for meeting the practice requirements of CMMC Level 1.

    LISTEN
  • The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 1.0 (CMMC 1.0)

    Webcast
    By Katie C. Stewart , Andrew F. Hoover

    This webcast provides insight into how organizations can prepare for CMMC.

    LISTEN
  • Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite

    Webcast
    By Brett Tucker , Matthew Trevors

    This webcast discussed how professionals and executives communicate risk concerns despite the cacophony and distraction posed by technical details and other organizational demands using the new OCTAVE FORTE approach.

    LISTEN
  • At What Point Does DevSecOps Become Too Risky for the Business?

    Webcast
    By Hasan Yasar

    This webcast covered the implementation of an automated, continuous risk pipeline that demonstrates how cyber-resiliency and compliance risk can be traced to and from DevSecOps teams working in the SDLC …

    LISTEN
  • Designing Trustworthy AI: A User Experience (UX) Framework

    Webcast
    By Carol J. Smith

    This webcast introduced a new user experience (UX) framework to guide the creation of AI systems that are accountable, de-risked, respectful, secure, honest and usable.

    LISTEN
  • Becoming a Better Software Architect

    Webcast
    By Ipek Ozkaya , Keegan M. Williams , James Ivers , Philip Bianco

    In this session, a panel of architects discussed their personal paths to becoming software architects and how they have helped others on that journey.

    LISTEN
  • Cyber Hygiene: Why the Fundamentals Matter

    Webcast
    By Matthew J. Butkovic , Matthew Trevors , Randall F. Trzeciak

    In this webcast, as a part of National Cybersecurity Awareness Month, our experts provided an overview of the concept of cyber hygiene, which addresses simple sets of actions that users …

    LISTEN
  • Insider Threats: Your Questions. Our Answers.

    Webcast
    By Randall F. Trzeciak , Daniel L. Costa , Matthew J. Butkovic

    In this webcast, as a part of National Insider Threat Awareness Month, our experts provided an overview of the ongoing research in this area, and answered questions about how the …

    LISTEN
  • Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them

    Webcast
    By Timothy Morrow , Eileen Wrubel , Dale Alleshouse

    This webcast addressed a few of the causes for cloud transition issues, as well as identified some practices that will assist organizations as they plan to transition assets and capabilities …

    LISTEN
  • Secure Your Code with AI and NLP

    Webcast
    By Nathan M. VanHoudnos , Eliezer Kanal

    In this talk, we discussed how a branch of artificial intelligence called Natural Language Processing, or NLP, is being applied to computer code.

    LISTEN
  • DevSecOps Implementation in the DoD: Barriers and Enablers

    Webcast
    By Hasan Yasar , Jeff Boleng , Eileen Wrubel

    In this webcast, panelists discuss potential enablers of and barriers to using modern software development techniques and processes in the DoD or similar segregated environments.

    LISTEN
  • What Makes a Good Software Architect (2019 Edition)?

    Webcast
    By Suzanne Miller , Felix Bachmann , Ipek Ozkaya , John Klein

    The architect's role continues to evolve; in this webcast we revisited the question in the context of today's role and responsibilities.

    LISTEN
  • Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator

    Webcast
    By Gabriel Somlo , Jeff Mattson , Christopher May , Adam Welle , Geoffrey B. Dobson

    Throughout this talk, our team of researchers and engineers discuss the solutions we developed to help achieve a new level of realism in simulated cyber environments.

    LISTEN
  • Improve Your Static Analysis Audits Using CERT SCALe’s New Features

    Webcast
    By Lori Flynn

    In this webcast, Lori Flynn, a CERT senior software security researcher, describes the new features in SCALe v3, a research prototype tool.

    LISTEN
  • Five Ways to Boost Cybersecurity with DevOps

    Webcast
    By Doug Reynolds , Aaron Volkmann

    In this webcast, Doug Reynolds and Aaron Volkmann discuss key DevOps principles, including cross-team collaboration, task automation, tool integration, continuous integration and deployment, and continuous monitoring.

    LISTEN
  • Next Steps with Blockchain Technology

    Webcast
    By Gabriel Somlo , Eliezer Kanal

    In this webcast, Elli Kanal and Gabe Somlo discussed some blockchain successes, including a number of interesting applications they have encountered in their work at SEI.

    LISTEN
  • Digital Footprints: Managing Privacy and Security

    Webcast
    By Matthew J. Butkovic , Lena Pons

    With the recent Cambridge Analytica news and the rollout of the General Data Privacy Rule (GDPR) in Europe, there are many questions about how social media data privacy is managed …

    LISTEN
  • Digital Footprints: What Can be Learned from the Traces We Leave on Social Networks

    Webcast
    By April Galyardt , Carson Sestili

    In this first webcast in a two-part series, April Galyardt and Carson Sestili described what metadata is and what information can be gleaned from it.

    LISTEN
  • Blockchain: Your Questions. Our Answers.

    Webcast
    By Eliezer Kanal , Gabriel Somlo

    In this webcast, we explain how the technology works and what makes it fundamentally different than its predecessors. We discuss where it fits (and where it doesn't fit) and help …

    LISTEN
  • Three Software Innovations that DoD Needs Now

    Webcast
    By Jeff Boleng , Sam Procter , Robert Schiela , Lena Pons , Nathan M. VanHoudnos

    Watch Jeff Boleng, Robert Schiela, Samuel Procter, Lena Pons, and Nathan VanHoudnos discuss "Three Software Innovations that DoD Needs Now".

    LISTEN
  • Agile and DevOps: Your Questions. Our Answers.

    Webcast
    By Eileen Wrubel , Hasan Yasar

    Watch this lively discussion in which we answered attendee questions on all things Agile and DevOps.

    LISTEN
  • Is Software Spoiling Us?

    Webcast
    By Satya Venneti , Jeff Boleng , Joe Yankel , Grace Lewis , Eliezer Kanal

    Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?

    LISTEN
  • Four Valuable Data Sources for Network Security Analytics

    Webcast
    By Timothy J. Shimeall

    This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and …

    LISTEN
  • Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability

    Webcast
    By Greg Shannon

    During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience …

    LISTEN
  • Three Secrets to Successful Agile Metrics

    Webcast
    By Will Hayes

    Watch this webcast to gain insights into effective metrics programs in government settings.

    LISTEN
  • Five Keys to Effective Agile Test Automation for Government Programs

    Webcast
    By Robert V. Binder , Suzanne Miller

    In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss five key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment …

    LISTEN
  • The Evolving Role of the Chief Risk Officer

    Webcast
    By Summer C. Fowler , Greg Porter (Heinz College at Carnegie Mellon University)

    In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.

    LISTEN
  • Practical Considerations in Adopting Agile/Lean in Government Settings

    Webcast
    By Suzanne Miller , Eileen Wrubel

    This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.

    LISTEN
  • Building Analytics for Network Flow Records

    Webcast
    By Matthew Heckathorn , Timothy J. Shimeall

    Learn how to identify network flow characteristics and metrics that support understanding traffic

    LISTEN
  • 5 Things You Need to Know About Leading a Successful Large IT Modernization Project

    Webcast
    By Will Hayes , Felix Bachmann , Stephany Bellomo

    In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.

    LISTEN
  • Building and Scaling a Malware Analysis System

    Webcast
    By Brent Frye

    This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.

    LISTEN
  • How to Reduce the Graveyard of Software Tools with UI/UX Capability

    Webcast
    By Michael Szegedy , Jennifer Cowley

    For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this …

    LISTEN
  • From Secure Coding to Secure Software

    Webcast
    By Robert Schiela , Mark Sherman

    In this webinar, we discussed how you can improve your organization's secure coding capabilities.

    LISTEN
  • Security Practitioner Perspective on DevOps for Building Secure Solutions

    Webcast
    By Hasan Yasar

    This webinar covered the perspectives of security practitioners on building secure software using the DevOps development process and modern security approach.

    LISTEN
  • Data Science: What It Is and How It Can Help Your Company

    Webcast
    By Eliezer Kanal , Brian Lindauer

    In this webinar, we discussed what the term “data science” means, what skills a data scientist brings to the table, and what competitive edge data science can bring to your …

    LISTEN
  • How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate

    Webcast
    By Randall F. Trzeciak

    In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have …

    LISTEN
  • Secure Software Development Landscape

    Webcast
    By Mark Sherman

    Examine how security can be introduced throughout the software development lifecycle to blunt vulnerabilities.

    LISTEN
  • Coordinated Vulnerability Disclosure

    Webcast
    By Dan J. Klinedinst

    Learn how to develop a vulnerability coordination capability, which helps you respond to vulnerabilities and demonstrates that you are serious about fixing them.

    LISTEN
  • Continuous Integration (Secure DevOps)

    Webcast
    By Hasan Yasar

    Learn how to better identify process improvements at your organization through new perspectives on secure software development and delivery.

    LISTEN
  • Security Requirements Engineering

    Webcast
    By Christopher J. Alberts

    Learn the importance of developing security requirements in the same time frame as functional requirements.

    LISTEN
  • Secure Coding Best Practices

    Webcast
    By Robert Schiela

    Learn why secure coding practices are important to reduce common programming errors that lead to vulnerabilities.

    LISTEN
  • What Makes a Good Software Architect?

    Webcast
    By Ipek Ozkaya , John Klein , Andrew Kotov

    In this webinar, SEI researchers and an industry colleague discussed in two talks What Makes a Good Software Architect?

    LISTEN
  • Structuring the Chief Information Security Officer Organization

    Webcast
    By Julia H. Allen , Nader Mehravari

    This webinar described a CISO organizational structure and functions for a typical large, diverse organization using input from CISOs, policies, frameworks, maturity models, standards, and codes of practice.

    LISTEN
  • Using Network Flow to Gain Cyber Situational Awareness

    Webcast
    By Sid Faber

    During this webinar we discussed the foundations of cyber situational awareness and how to apply situational awareness concepts to the cyber domain.

    LISTEN
  • Context Enabled Computing

    Webcast
    By Jeff Boleng , Marc Novakouski

    In this webinar, we covered a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.

    LISTEN
  • Intelligence Preparation for Operational Resilience

    Webcast
    By Software Engineering Institute

    This webinar proposed the Intelligence Preparation for Operational Resilience (IPOR) framework to create a model for structured analysis of your intelligence needs and a way to operationalize threat intelligence once …

    LISTEN
  • DevOps Security: Ignore it as Much You Would Ignore Normal Security

    Webcast
    By Chris Taschner , Tim Palko

    In this presentation, Tim Palko and Chris Taschner explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices.

    LISTEN
  • A Taxonomy of Testing Types

    Webcast
    By Donald Firesmith

    Watch Donald Firesmith discuss a taxonomy of testing types to clarify the grand scope of testing and enable attendees to better select the appropriate types of testing for their specific …

    LISTEN
  • Cyber-Vulnerabilities in Aviation Today

    Webcast
    By Robert Behler

    SEI Chief Operating Officer, Robert F. Behler discusses Cyber-Vulnerabilities in Aviation Today.

    LISTEN
  • Web Traffic Analysis with CERT Tapioca

    Webcast
    By Will Dormann

    Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.

    LISTEN
  • Enhancing Mobile Device Security

    Webcast
    By Jose A. Morales

    Jose Morales discusses mobile device security enhancements with defensive and offensive uses.

    LISTEN
  • Generalized Automated Cyber-Readiness Evaluator (ACE)

    Webcast
    By Rotem D. Guttman

    Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.

    LISTEN
  • Finding Related Malware Samples Using Run-Time Features

    Webcast
    By Rhiannon Weaver

    Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.

    LISTEN
  • Resilience Panel Discussion

    Webcast
    By Matthew J. Butkovic , Katie C. Stewart

    Watch a panel of CERT researchers, led by Technical Manager Matt Butkovic, discuss risk management and resilience.

    LISTEN
  • DevOps Panel Discussion

    Webcast
    By Kevin Fall , Joe Yankel , Hasan Yasar

    CERT researchers discuss DevOps and its relationship to cybersecurity and the dynamic threat.

    LISTEN
  • Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps

    Webcast
    By William Klieber , Lori Flynn

    Will Klieber and Lori Flynn discuss undesired flows of sensitive information within and between Android apps.

    LISTEN
  • CERT® Alignment with Cyber COI Challenges and Gaps

    Webcast
    By Greg Shannon

    Greg Shannon discusses the CERT Division's current work associated with cyber community of interest (COI).

    LISTEN
  • Culture Shock: Unlocking DevOps with Collaboration and Communication

    Webcast
    By Aaron Volkmann , Todd Waits

    Watch a discussion about ways to shift organizational culture to achieve DevOps. We highlighted communication tools and movements, such as ChatOps.

    LISTEN
  • What DevOps Is Not!

    Webcast
    By Hasan Yasar

    In this webinar, we'll talk about DevOps, its common misconceptions and roadblocks, and how you can use DevOps to help your organization reach new heights of efficiency and productivity.

    LISTEN
  • Approaching Security from an "Architecture First" Perspective

    Webcast
    By Rick Kazman

    In this talk we report on three case studies of real-world projects—two industrial and one open-source—where we attempted to measure the consequences of various architectural approaches to security.

    LISTEN
  • Trends and New Directions in Software Architecture

    Webcast
    By Linda M. Northrop

    This talk shares a perspective on the trends influencing the need for change, the related architectural challenges, and the applicable research and practices.

    LISTEN
  • Advancing Cyber Intelligence Practices Through the SEI's Consortium

    Webcast
    By Jay McAllister , Melissa Ludwick

    Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help …

    LISTEN
  • Tactical Cloudlets: Moving Cloud Computing to the Edge

    Webcast
    By Grace Lewis

    This webinar presents the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms.

    LISTEN
  • Risk Priority Number (RPN) – A Method for Software Defect Report Analysis

    Webcast
    By Julie B. Cohen , Will Hayes

    This webinar will explain the component used in RPN and how it can help a program select between competing defects to best utilize constrained resources to help lower overall system …

    LISTEN
  • Lessons in External Dependency and Supply Chain Risk Management

    Webcast
    By John Haller , Matthew J. Butkovic

    In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will discuss real-world incidents, including recent industrial control system attacks and incidents affecting …

    LISTEN
  • Architecture Analysis with AADL

    Webcast
    By Julien Delange

    This webinar introduces the Architecture Analysis and Design Language (AADL), the architecture modeling language used to specify safety-critical systems. We show its use in the Open Source AADL Tool Environment …

    LISTEN
  • Software Architecture for Big Data Systems

    Webcast
    By Ian Gorton

    Watch Ian Gorton discuss software architecture for big data systems.

    LISTEN
  • Architectural Implications of DevOps

    Webcast
    By Stephany Bellomo

    Watch Stephany Bellomo discuss the architectural implications of DevOps.

    LISTEN
  • The Smart Grid Maturity Model Around the World

    Webcast
    By Jeffrey H. Ferris (IBM)

    This webinar will introduce the Smart Grid Maturity Model (SGMM), a management tool designed to help any utility, anywhere, plan its journey toward grid modernization-no customization required.

    LISTEN
  • When Measurement Benefits the Measured

    Webcast
    By Bill Nichols , Mark Kasunic

    During this webinar, we shared the performance results of over 100 software teams that have carefully tracked their schedule performance and the quality of their work.

    LISTEN
  • CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin

    Webcast
    By Matthew J. Butkovic

    Watch the CERT® RMM User Panel discuss their experiences implementing RMM from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

    LISTEN
  • Department of Homeland Security Cyber Resilience Review (Case Study)

    Webcast
    By Matthew J. Butkovic

    Watch Matthew Butkovic discuss the "Department of Homeland Security Cyber Resilience Review (Case Study)" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

    LISTEN
  • United States Postal Inspection Service (USPIS)

    Webcast
    By Julia H. Allen

    Watch Julia Allen discuss the United States Postal Inspection Service (USPIS) (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

    LISTEN
  • Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape

    Webcast
    By Nader Mehravari

    Watch Nader Mehravari discuss "Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

    LISTEN
  • Overview of the CERT® Resilience Management Model (CERT®-RMM)

    Webcast
    By James J. Cebula

    Watch James Cebula discuss the "Overview of the CERT® Resilience Management Model" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

    LISTEN
  • ABCs of Operational Resilience

    Webcast
    By Nader Mehravari

    Watch Nader Mehravari discuss the "ABCs of Operational Resilience" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.

    LISTEN
  • Heartbleed: Analysis, Thoughts, and Actions

    Webcast
    By Bill Nichols , Will Dormann , Robert C. Seacord , Robert Floodeen , Brent Kennedy , Jason McCormick

    Panelists discussed the impact of Heartbleed, methods to mitigate the vulnerability, and ways to prevent crises like this in the future.

    LISTEN
  • Taking Advantage of Agile while Minimizing Risk

    Webcast
    By David Zubrow

    Watch Dave Zubrow discuss “Taking Advantage of Agile while Minimizing Risk” at the Agile for Government Summit.

    LISTEN
  • SEI Webinar Series: CheckPoint Diagnostic

    Webcast
    By Software Engineering Institute

    This webinar will introduce the methodology and outputs of SEI's latest investigative approach: the Checkpoint Diagnostic (CPD).

    LISTEN
  • Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    Webcast
    By Kurt C. Wallnau , William R. Claycomb , Andrew P. Moore , Randall F. Trzeciak , Robert Floodeen , Alex Nicoll

    In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.

    LISTEN
  • Illicit Cyber Activity Involving Fraud

    Webcast
    By Randall F. Trzeciak

    In this webinar, Randy Trzeciak discusses a study to develop insights and risk indicators related to malicious insider activity in the banking and finance sector.

    LISTEN
  • Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Webcast
    By Kurt C. Wallnau

    In this webinar, Kurt Wallnau discusses insider threat controls and how to test systems whose dynamics are based in human nature that is only partially understood.

    LISTEN
  • Emerging Trends

    Webcast
    By Andrew P. Moore , William R. Claycomb

    In this November 2013 webinar, Bill Claycomb and Andrew Moore discuss how technology in emerging trends enables new types of insider attacks.

    LISTEN
  • Components and Considerations in Building an Insider Threat Program

    Webcast
    By Carly L. Huth , Robin Ruefle

    In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.

    LISTEN
  • Best Practices and Controls for Mitigating Insider Threats

    Webcast
    By George Silowash , Alex Nicoll

    In this 2013 webinar, Alex Nicoll and George Silowash discuss how the CERT division develops, inspects, and transitions insider threat controls to the public.

    LISTEN
  • Overview of the Threat Posed by Insiders to Critical Assets

    Webcast
    By Dave Mundie , Randall F. Trzeciak

    In this 2013 webinar, Randy Trzeciak and David Mundie discuss the challenges organizations face as they try to address insider threat.

    LISTEN
  • 20+ Years of Cyber (in)Security

    Webcast
    By Richard D. Pethia

    In this webinar, Rich Pethia discusses how cybersecurity has changed over the past 20 years.

    LISTEN
  • Achieving Mission Assurance Through Resilience Management

    Webcast
    By Nader Mehravari

    In this August 2013 webinar, Nader Mehravari discusses how to protect and sustain the mission and business operations of an organization.

    LISTEN
  • Observations of Successful Cyber Security Operations

    Webcast
    By Roman Danyliw

    In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.

    LISTEN
  • Responding to a Large-Scale Cybersecurity Incident

    Webcast
    By Christian Roylo

    In this 2013 webinar, Christian Roylo discusses the role of technology in responding to large-scale cyber incidents.

    LISTEN
  • Developing Your Cyber Workforce

    Webcast
    By Christopher May

    In this 2013 webinar, Chris May discusses ways to research and develop solutions approaching the cyber workforce development challenge.

    LISTEN
  • The Cyber Security R&D Pipeline – Building Capability Through Science

    Webcast
    By Greg Shannon

    In this 2013 webinar, Dr. Greg Shannon describes advances in software engineering to build systems with predictable and improved quality, cost, and schedule.

    LISTEN
  • Architecting in a Complex World: Achieving Agility and Stability in Large-Scale Software Development

    Webcast
    By Ipek Ozkaya

    Ipek Ozkaya explores tactics about how organizations can better take advantage of software architecting for large-scale agile software-development efforts.

    LISTEN
  • Architecting in a Complex World: Eliciting and Specifying Quality Attribute Requirements

    Webcast
    By Robert Wojcik

    Rob Wojcik describes the Quality Attribute Workshop, a scenario-based approach for eliciting requirements for quality attributes (non-functional system qualities such as performance, availability, and security).

    LISTEN
  • Architecting in a Complex World: Uncovering Architectural Challenges in a System of Systems

    Webcast
    By Michael J. Gagliardi

    Mike Gagliardi describes development challenges in usability/automation, capability gaps, resource management, training, migration of legacy systems, and collaboration that they have identified from 46 Mission Thread Workshops.

    LISTEN
  • Architecture and Design of Service-Oriented Systems (Part 2)

    Webcast
    By Grace Lewis

    The second part will focus on SOA infrastructure-design considerations, decomposition of an enterprise service bus (ESB) into patterns and tactics as an example of SOA infrastructure, and principles of service …

    LISTEN
  • Architecture and Design of Service-Oriented Systems (Part 1)

    Webcast
    By Grace Lewis

    The objective of this tutorial is to provide guidance on the architecture and design of service-oriented systems. Part I covers basic concepts and impact.

    LISTEN
  • Quantifying Uncertainty in Early Lifecycle Cost Estimation

    Webcast
    By Robert W. Stoddard , James McCurley

    In this presentation we describe a new, integrative approach for pre-Milestone A cost estimation, which we call QUELCE (Quantifying Uncertainty in Early Lifecycle Cost Estimation).

    LISTEN
  • SEI Agile Research Forum: DOD CIO, Teri Takai, Keynote Address

    Webcast
    By Software Engineering Institute

    Teri Takai discusses the introduction of agile methods into the DoD software acquisition and development environment.

    LISTEN
  • Source Code Analysis Laboratory (SCALe)

    Webcast
    By Robert C. Seacord

    In this webinar, Robert Seacord discusses SCALe, a demonstration that software systems can be tested for conformance to secure coding standards.

    LISTEN
  • SEI Agile Research Forum: The Importance of Applying Agile Technologies to Key DoD Software Initiatives

    Webcast
    By Douglas Schmidt (Vanderbilt University)

    Douglas Schmidt explores what's at stake for a large-scale development organization that is considering or adopting Agile technologies.

    LISTEN
  • SEI Agile Research Forum: Strategic Management of Architectural Technical Debt

    Webcast
    By Ipek Ozkaya

    Ipek Ozkaya shows you how to spot the sources of technical debt in your project, track it, and use it to your advantage.

    LISTEN
  • SEI Agile Research Forum: Agile Methods: Agile Methods:Tools, Techniques, and Practices for the DoD Community

    Webcast
    By Mary Ann Lapham

    Mary Ann Lapham describes research into ways that help the DoD overcome technical and cultural resistance to Agile methods.

    LISTEN
  • Architecting Software the SEI Way - Analyzing and Evaluating Enterprise Architectures

    Webcast
    By John Klein

    John Klein reviews the SEI perspective on architecture-centric engineering, and discusses how this approach scales from its original software context through systems-of-systems.

    LISTEN
  • Architecting Software the SEI Way - Architecture Evaluation: A Tool for Designing Systems That Meet Users' Needs

    Webcast
    By Felix Bachmann

    At this 2012 event, Felix Bachmann discussed the concepts used by an Architecture Tradeoff Analysis Method (ATAM) that make an evaluation successful, which can be integrated into the architecture design …

    LISTEN
  • Architecting Software the SEI Way - Software Architecture Fundamentals: Technical, Business, and Social Influences

    Webcast
    By Robert Wojcik

    Although software architecture is a key factor in determining the success or failure of a software system, software professionals throughout the industry continue to struggle with questions like: What exactly …

    LISTEN