Software Engineering Institute (SEI) Podcast Series

Software Engineering Institute (SEI) Podcast Series

333 episodes

The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.

Podcasts

Capability-based Planning for Early-Stage Software Development

Published: July 18, 2024, 1:34 p.m.
Duration: 33 minutes 55 seconds

Listed in: Technology

Safeguarding Against Recent Vulnerabilities Related to Rust

Published: July 1, 2024, 1:06 p.m.
Duration: 26 minutes 25 seconds

Listed in: Technology

Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)

Published: June 21, 2024, 1:26 p.m.
Duration: 30 minutes 51 seconds

Listed in: Technology

Automated Repair of Static Analysis Alerts

Published: May 31, 2024, 5:29 p.m.
Duration: 27 minutes 5 seconds

Listed in: Technology

Cyber Career Pathways and Opportunities

Published: May 28, 2024, 7:14 p.m.
Duration: 31 minutes 23 seconds

Listed in: Technology

My Story in Computing with Sam Procter

Published: April 24, 2024, 3:42 p.m.
Duration: 37 minutes 15 seconds

Listed in: Technology

Developing and Using a Software Bill of Materials Framework

Published: April 4, 2024, 5:58 p.m.
Duration: 37 minutes 37 seconds

Listed in: Technology

The Importance of Diversity in Cybersecurity: Carol Ware

Published: March 21, 2024, 1:11 p.m.
Duration: 26 minutes 37 seconds

Listed in: Technology

The Importance of Diversity in Software Engineering: Suzanne Miller

Published: March 21, 2024, 4:09 a.m.
Duration: 29 minutes 2 seconds

Listed in: Technology

The Importance of Diversity in Artificial Intelligence: Violet Turri

Published: March 15, 2024, 2:20 p.m.
Duration: 16 minutes 57 seconds

Listed in: Technology

Using Large Language Models in the National Security Realm

Published: Feb. 16, 2024, 2:51 a.m.
Duration: 34 minutes 45 seconds

Listed in: Technology

Atypical Applications of Agile and DevSecOps Principles

Published: Feb. 9, 2024, 5:37 p.m.
Duration: 33 minutes 41 seconds

Listed in: Technology

When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction

Published: Jan. 31, 2024, 3:11 p.m.
Duration: 35 minutes 21 seconds

Listed in: Technology

The Impact of Architecture on Cyber-Physical Systems Safety

Published: Jan. 24, 2024, 7:56 p.m.
Duration: 34 minutes 5 seconds

Listed in: Technology

ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies

Published: Dec. 14, 2023, 9:15 p.m.
Duration: 46 minutes 22 seconds

Listed in: Technology

The Cybersecurity of Quantum Computing: 6 Areas of Research

Published: Nov. 28, 2023, 8:42 p.m.
Duration: 23 minutes 1 second

Listed in: Technology

User-Centric Metrics for Agile

Published: Nov. 16, 2023, 2:36 p.m.
Duration: 31 minutes 41 seconds

Listed in: Technology

The Product Managers Evolving Role in Software and Systems Development

Published: Nov. 10, 2023, 1:41 a.m.
Duration: 24 minutes 19 seconds

Listed in: Technology

Measuring the Trustworthiness of AI Systems

Published: Oct. 12, 2023, 7:51 p.m.
Duration: 19 minutes 27 seconds

Listed in: Technology

Actionable Data in the DevSecOps Pipeline

Published: Sept. 13, 2023, 2:57 p.m.
Duration: 31 minutes 58 seconds

Listed in: Technology

Insider Risk Management in the Post-Pandemic Workplace

Published: Sept. 8, 2023, 1:51 p.m.
Duration: 47 minutes 34 seconds

Listed in: Technology

An Agile Approach to Independent Verification and Validation

Published: Aug. 9, 2023, 3:48 p.m.
Duration: 31 minutes 57 seconds

Listed in: Technology

Zero Trust Architecture: Best Practices Observed in Industry

Published: July 26, 2023, 5:16 p.m.
Duration: 27 minutes 53 seconds

Listed in: Technology

Automating Infrastructure as Code with Ansible and Molecule

Published: July 10, 2023, 11:32 a.m.
Duration: 39 minutes 38 seconds

Listed in: Technology

Identifying and Preventing the Next SolarWinds

Published: June 20, 2023, 3:20 p.m.
Duration: 46 minutes 4 seconds

Listed in: Technology

A Penetration Testing Findings Repository

Published: June 13, 2023, 8:01 p.m.
Duration: 25 minutes 47 seconds

Listed in: Technology

Understanding Vulnerabilities in the Rust Programming Language

Published: June 8, 2023, 6:17 p.m.
Duration: 36 minutes 45 seconds

Listed in: Technology

We Live in Software: Engineering Societal-Scale Systems

Published: May 18, 2023, 7:25 p.m.
Duration: 39 minutes 31 seconds

Listed in: Technology

Secure by Design, Secure by Default

Published: May 10, 2023, 2:58 p.m.
Duration: 54 minutes 5 seconds

Listed in: Technology

Key Steps to Integrate Secure by Design into Acquisition and Development

Published: May 2, 2023, 8:36 p.m.
Duration: 48 minutes 50 seconds

Listed in: Technology

An Exploration of Enterprise Technical Debt

Published: April 18, 2023, 2:18 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

The Messy Middle of Large Language Models

Published: March 29, 2023, 6:44 p.m.
Duration: 33 minutes 46 seconds

Listed in: Technology

An Infrastructure-Focused Framework for Adopting DevSecOps

Published: March 21, 2023, 3:20 p.m.
Duration: 43 minutes 35 seconds

Listed in: Technology

Software Security in Rust

Published: March 15, 2023, 1:53 p.m.
Duration: 18 minutes 9 seconds

Listed in: Technology

Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron

Published: Feb. 24, 2023, 6:56 p.m.
Duration: 51 minutes 16 seconds

Listed in: Technology

Asking the Right Questions to Coordinate Security in the Supply Chain

Published: Feb. 7, 2023, 10:02 p.m.
Duration: 31 minutes 11 seconds

Listed in: Technology

Securing Open Source Software in the DoD

Published: Jan. 26, 2023, 2:59 p.m.
Duration: 35 minutes 33 seconds

Listed in: Technology

A Model-Based Tool for Designing Safety-Critical Systems

Published: Dec. 13, 2022, 8:45 p.m.
Duration: 48 minutes 43 seconds

Listed in: Technology

Managing Developer Velocity and System Security with DevSecOps

Published: Dec. 7, 2022, 4:32 p.m.
Duration: 32 minutes 55 seconds

Listed in: Technology

A Method for Assessing Cloud Adoption Risks

Published: Nov. 17, 2022, 7:57 p.m.
Duration: 21 minutes 47 seconds

Listed in: Technology

Software Architecture Patterns for Deployability

Published: Nov. 15, 2022, 8:07 p.m.
Duration: 29 minutes 9 seconds

Listed in: Technology

ML-Driven Decision Making in Realistic Cyber Exercises

Published: Oct. 13, 2022, 2:37 p.m.
Duration: 48 minutes 58 seconds

Listed in: Technology

A Roadmap for Creating and Using Virtual Prototyping Software

Published: Oct. 6, 2022, 11:50 p.m.
Duration: 56 minutes 30 seconds

Listed in: Technology

Software Architecture Patterns for Robustness

Published: Sept. 15, 2022, 7:17 p.m.
Duration: 31 minutes 13 seconds

Listed in: Technology

A Platform-Independent Model for DevSecOps

Published: Sept. 8, 2022, 5:30 p.m.
Duration: 23 minutes 41 seconds

Listed in: Technology

Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems

Published: Aug. 18, 2022, 12:12 p.m.
Duration: 27 minutes 36 seconds

Listed in: Technology

Trust and AI Systems

Published: Aug. 5, 2022, 11:24 a.m.
Duration: 35 minutes 24 seconds

Listed in: Technology

A Dive into Deepfakes

Published: July 28, 2022, 5:41 p.m.
Duration: 31 minutes 58 seconds

Listed in: Technology

Challenges and Metrics in Digital Engineering

Published: July 13, 2022, 1:51 p.m.
Duration: 42 minutes 18 seconds

Listed in: Technology

The 4 Phases of the Zero Trust Journey

Published: July 5, 2022, 10:55 a.m.
Duration: 34 minutes 28 seconds

Listed in: Technology

DevSecOps for AI Engineering

Published: June 21, 2022, 7:01 p.m.
Duration: 43 minutes 13 seconds

Listed in: Technology

Undiscovered Vulnerabilities: Not Just for Critical Software

Published: June 2, 2022, 1:56 p.m.
Duration: 35 minutes 26 seconds

Listed in: Technology

Explainable AI Explained

Published: May 16, 2022, 6:02 p.m.
Duration: 25 minutes 49 seconds

Listed in: Technology

Model-Based Systems Engineering Meets DevSecOps

Published: April 5, 2022, 3:29 p.m.
Duration: 34 minutes 10 seconds

Listed in: Technology

Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy

Published: March 22, 2022, 3:23 p.m.
Duration: 31 minutes 46 seconds

Listed in: Technology

Software and Systems Collaboration in the Era of Smart Systems

Published: March 9, 2022, 3:30 p.m.
Duration: 26 minutes 4 seconds

Listed in: Technology

Securing the Supply Chain for the Defense Industrial Base

Published: Feb. 22, 2022, 3:26 p.m.
Duration: 18 minutes 37 seconds

Listed in: Technology

Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis

Published: Feb. 8, 2022, 5:58 p.m.
Duration: 23 minutes 24 seconds

Listed in: Technology

Envisioning the Future of Software Engineering

Published: Jan. 20, 2022, 3:45 p.m.
Duration: 40 minutes 11 seconds

Listed in: Technology

Implementing the DoD's Ethical AI Principles

Published: Jan. 11, 2022, 4:55 p.m.
Duration: 23 minutes 17 seconds

Listed in: Technology

Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems

Published: Dec. 3, 2021, 4:04 p.m.
Duration: 39 minutes 36 seconds

Listed in: Technology

Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems

Published: Nov. 18, 2021, 9:47 p.m.
Duration: 30 minutes 19 seconds

Listed in: Technology

A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad

Published: Nov. 11, 2021, 7:45 p.m.
Duration: 37 minutes 17 seconds

Listed in: Technology

Enabling Transition From Sustainment to Engineering Within the DoD

Published: Nov. 3, 2021, 2:58 p.m.
Duration: 31 minutes 22 seconds

Listed in: Technology

The Silver Thread of Cyber in the Global Supply Chain

Published: Oct. 25, 2021, 6:56 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Measuring DevSecOps: The Way Forward

Published: Oct. 15, 2021, 2:29 p.m.
Duration: 39 minutes 32 seconds

Listed in: Technology

Bias in AI: Impact, Challenges, and Opportunities

Published: Sept. 23, 2021, 2:35 p.m.
Duration: 24 minutes 58 seconds

Listed in: Technology

My Story in Computing with Rachel Dzombak

Published: Sept. 17, 2021, 3:25 p.m.
Duration: 35 minutes 4 seconds

Listed in: Technology

Agile Strategic Planning: Concepts and Methods for Success

Published: Sept. 9, 2021, 3:50 p.m.
Duration: 29 minutes 50 seconds

Listed in: Technology

Applying Scientific Methods in Cybersecurity

Published: Aug. 24, 2021, 4:12 p.m.
Duration: 39 minutes 49 seconds

Listed in: Technology

Zero Trust Adoption: Benefits, Applications, and Resources

Published: Aug. 13, 2021, 1:38 p.m.
Duration: 30 minutes 25 seconds

Listed in: Technology

Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions

Published: Aug. 6, 2021, 12:01 p.m.
Duration: 31 minutes 40 seconds

Listed in: Technology

11 Rules for Ensuring a Security Model with AADL and BellLaPadula

Published: July 29, 2021, 2:05 p.m.
Duration: 48 minutes 5 seconds

Listed in: Technology

Benefits and Challenges of Model-Based Systems Engineering

Published: July 23, 2021, 2:53 p.m.
Duration: 33 minutes 10 seconds

Listed in: Technology

Fostering Diversity in Software Engineering

Published: July 16, 2021, 2:41 p.m.
Duration: 29 minutes 21 seconds

Listed in: Technology

Can DevSecOps Make Developers Happier?

Published: June 24, 2021, 2:01 p.m.
Duration: 41 minutes 17 seconds

Listed in: Technology

Is Your Organization Ready for AI?

Published: June 22, 2021, 8:49 p.m.
Duration: 30 minutes 20 seconds

Listed in: Technology

My Story in Computing with Marisa Midler

Published: June 11, 2021, 7:40 p.m.
Duration: 27 minutes 11 seconds

Listed in: Technology

Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems

Published: June 4, 2021, 2:44 p.m.
Duration: 40 minutes 59 seconds

Listed in: Technology

AI Workforce Development

Published: May 20, 2021, 11:30 p.m.
Duration: 35 minutes 18 seconds

Listed in: Technology

Moving from DevOps to DevSecOps

Published: May 13, 2021, 11:21 a.m.
Duration: 40 minutes 41 seconds

Listed in: Technology

My Story in Computing with David Zubrow

Published: April 29, 2021, 8:51 p.m.
Duration: 37 minutes 27 seconds

Listed in: Technology

Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs

Published: April 23, 2021, 7:08 p.m.
Duration: 13 minutes 18 seconds

Listed in: Technology

My Story in Computing with Carol Smith

Published: April 9, 2021, 2:48 p.m.
Duration: 16 minutes 41 seconds

Listed in: Technology

Digital Engineering and DevSecOps

Published: March 16, 2021, 12:55 p.m.
Duration: 30 minutes 45 seconds

Listed in: Technology

A 10-Step Framework for Managing Risk

Published: March 9, 2021, 1:48 p.m.
Duration: 30 minutes 31 seconds

Listed in: Technology

7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts

Published: Feb. 23, 2021, 3:12 p.m.
Duration: 20 minutes 23 seconds

Listed in: Technology

Ransomware: Evolution, Rise, and Response

Published: Feb. 16, 2021, 6:22 p.m.
Duration: 32 minutes 50 seconds

Listed in: Technology

VINCE: A Software Vulnerability Coordination Platform

Published: Jan. 21, 2021, 4:11 p.m.
Duration: 38 minutes 14 seconds

Listed in: Technology

Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network

Published: Jan. 6, 2021, 6:40 p.m.
Duration: 46 minutes 17 seconds

Listed in: Technology

An Introduction to CMMC Assessment Guides

Published: Dec. 8, 2020, 6:25 p.m.
Duration: 8 minutes 14 seconds

Listed in: Technology

The CMMC Level 3 Assessment Guide: A Closer Look

Published: Dec. 7, 2020, 4:11 p.m.
Duration: 13 minutes 45 seconds

Listed in: Technology

The CMMC Level 1 Assessment Guide: A Closer Look

Published: Dec. 7, 2020, 3:13 p.m.
Duration: 20 minutes 37 seconds

Listed in: Technology

Achieving Continuous Authority to Operate (ATO)

Published: Nov. 24, 2020, 11:24 p.m.
Duration: 33 minutes 29 seconds

Listed in: Technology

Challenging the Myth of the 10x Programmer

Published: Nov. 9, 2020, 3:41 p.m.
Duration: 16 minutes 51 seconds

Listed in: Technology

A Stakeholder-Specific Approach to Vulnerability Management

Published: Oct. 27, 2020, 11:43 a.m.
Duration: 37 minutes 11 seconds

Listed in: Technology

Optimizing Process Maturity in CMMC Level 5

Published: Oct. 13, 2020, 4:06 p.m.
Duration: 9 minutes 17 seconds

Listed in: Technology

Reviewing and Measuring Activities for Effectiveness in CMMC Level 4

Published: Oct. 7, 2020, 2:17 p.m.
Duration: 13 minutes 13 seconds

Listed in: Technology

Situational Awareness for Cybersecurity: Beyond the Network

Published: Sept. 30, 2020, 8:22 p.m.
Duration: 25 minutes 35 seconds

Listed in: Technology

Quantum Computing: The Quantum Advantage

Published: Sept. 17, 2020, 5:31 p.m.
Duration: 30 minutes 34 seconds

Listed in: Technology

CMMC Scoring 101

Published: Sept. 2, 2020, 7:32 p.m.
Duration: 10 minutes 52 seconds

Listed in: Technology

Developing an Effective CMMC Policy

Published: Aug. 17, 2020, 1:20 p.m.
Duration: 10 minutes 25 seconds

Listed in: Technology

The Future of Cyber: Educating the Cybersecurity Workforce

Published: Aug. 10, 2020, 2:37 p.m.
Duration: 28 minutes 10 seconds

Listed in: Technology

Documenting Process for CMMC

Published: July 30, 2020, 2:06 p.m.
Duration: 9 minutes 47 seconds

Listed in: Technology

Agile Cybersecurity

Published: July 20, 2020, 7:55 p.m.
Duration: 25 minutes 47 seconds

Listed in: Technology

CMMC Levels 1-3: Going Beyond NIST SP-171

Published: July 1, 2020, 3:22 p.m.
Duration: 12 minutes 56 seconds

Listed in: Technology

The Future of Cyber: Secure Coding

Published: June 15, 2020, 2:54 p.m.
Duration: 41 minutes 16 seconds

Listed in: Technology

Challenges to Implementing DevOps in Highly Regulated Environments

Published: May 28, 2020, 2:25 p.m.
Duration: 38 minutes 42 seconds

Listed in: Technology

The Future of Cyber: Cybercrime

Published: May 7, 2020, 4:23 p.m.
Duration: 35 minutes 3 seconds

Listed in: Technology

An Ethical AI Framework

Published: April 28, 2020, 7:49 p.m.
Duration: 15 minutes 58 seconds

Listed in: Technology

My Story in Computing: Madison Quinn Oliver

Published: April 13, 2020, 4:50 p.m.
Duration: 23 minutes 9 seconds

Listed in: Technology

The CERT Guide to Coordinated Vulnerability Disclosure

Published: March 26, 2020, 2:37 p.m.
Duration: 35 minutes 1 second

Listed in: Technology

Women in Software and Cybersecurity: Dr. April Galyardt

Published: March 11, 2020, 6:12 p.m.
Duration: 13 minutes 29 seconds

Listed in: Technology

The Future of Cyber: Security and Privacy

Published: Feb. 26, 2020, 3 p.m.
Duration: 24 minutes 57 seconds

Listed in: Technology

The Future of Cyber: Security and Resilience

Published: Feb. 14, 2020, 2:29 p.m.
Duration: 33 minutes 19 seconds

Listed in: Technology

Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools

Published: Feb. 7, 2020, 4:04 p.m.
Duration: 7 minutes 40 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Carol Woody

Published: Jan. 29, 2020, 7:58 p.m.
Duration: 25 minutes 7 seconds

Listed in: Technology

Benchmarking Organizational Incident Management Practices

Published: Dec. 17, 2019, 5:57 p.m.
Duration: 35 minutes 8 seconds

Listed in: Technology

Machine Learning in Cybersecurity: 7 Questions for Decision Makers

Published: Dec. 11, 2019, 11:01 p.m.
Duration: 27 minutes 49 seconds

Listed in: Technology

Women in Software and Cybersecurity: Kristi Roth

Published: Nov. 26, 2019, 8:02 p.m.
Duration: 18 minutes 25 seconds

Listed in: Technology

Human Factors in Software Engineering

Published: Nov. 12, 2019, 6:28 p.m.
Duration: 47 minutes 24 seconds

Listed in: Technology

Women in Software and Cybersecurity: Anita Carleton

Published: Oct. 15, 2019, 5:36 p.m.
Duration: 29 minutes 11 seconds

Listed in: Technology

Improving the Common Vulnerability Scoring System

Published: Oct. 4, 2019, 6:41 p.m.
Duration: 21 minutes 4 seconds

Listed in: Technology

Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities

Published: Oct. 1, 2019, 10:36 a.m.
Duration: 22 minutes 7 seconds

Listed in: Technology

Selecting Metrics for Software Assurance

Published: Sept. 24, 2019, 7:33 p.m.
Duration: 18 minutes 37 seconds

Listed in: Technology

AI in Humanitarian Assistance and Disaster Response

Published: Sept. 18, 2019, 3:23 p.m.
Duration: 22 minutes 16 seconds

Listed in: Technology

The AADL Error Library: 4 Families of Systems Errors

Published: Aug. 30, 2019, 2:46 p.m.
Duration: 23 minutes 33 seconds

Listed in: Technology

Women in Software and Cybersecurity: Suzanne Miller

Published: Aug. 22, 2019, 6:22 p.m.
Duration: 26 minutes 47 seconds

Listed in: Technology

Privacy in the Blockchain Era

Published: July 29, 2019, 6:13 p.m.
Duration: 28 minutes 4 seconds

Listed in: Technology

Cyber Intelligence: Best Practices and Biggest Challenges

Published: July 25, 2019, 6:32 p.m.
Duration: 35 minutes 54 seconds

Listed in: Technology

Assessing Cybersecurity Training

Published: July 12, 2019, 2:39 p.m.
Duration: 13 minutes 43 seconds

Listed in: Technology

DevOps in Highly Regulated Environments

Published: June 27, 2019, 6:47 p.m.
Duration: 40 minutes 48 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Ipek Ozkaya

Published: June 20, 2019, 3:59 p.m.
Duration: 32 minutes 24 seconds

Listed in: Technology

The Role of the Software Factory in Acquisition and Sustainment

Published: June 11, 2019, 5:24 p.m.
Duration: 25 minutes 19 seconds

Listed in: Technology

Defending Your Organization Against Business Email Compromise

Published: May 30, 2019, 8:06 p.m.
Duration: 44 minutes 24 seconds

Listed in: Technology

My Story in Computing with Dr. Eliezer Kanal

Published: May 21, 2019, 5:27 p.m.
Duration: 30 minutes 28 seconds

Listed in: Technology

Women in Software and Cybersecurity: Eileen Wrubel

Published: April 19, 2019, 7:39 p.m.
Duration: 27 minutes 29 seconds

Listed in: Technology

Managing Technical Debt: A Focus on Automation, Design, and Architecture

Published: March 21, 2019, 8:16 p.m.
Duration: 35 minutes 15 seconds

Listed in: Technology

Women in Software and Cybersecurity: Grace Lewis

Published: March 14, 2019, 8:08 p.m.
Duration: 15 minutes 32 seconds

Listed in: Technology

Women in Software and Cybersecurity: Bobbie Stempfley

Published: March 1, 2019, 6:47 p.m.
Duration: 17 minutes 9 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Lorrie Cranor

Published: March 1, 2019, 6:44 p.m.
Duration: 17 minutes 36 seconds

Listed in: Technology

Applying Best Practices in Network Traffic Analysis

Published: Feb. 27, 2019, 4:40 p.m.
Duration: 22 minutes 12 seconds

Listed in: Technology

10 Types of Application Security Testing Tools and How to Use Them

Published: Feb. 25, 2019, 9:07 p.m.
Duration: 20 minutes 11 seconds

Listed in: Technology

Using Test Suites for Static Analysis Alert Classifiers

Published: Feb. 18, 2019, 8:28 p.m.
Duration: 30 minutes 11 seconds

Listed in: Technology

Blockchain at CMU and Beyond

Published: Feb. 18, 2019, 8:09 p.m.
Duration: 46 minutes 29 seconds

Listed in: Technology

Leading in the Age of Artificial Intelligence

Published: Feb. 15, 2019, 3:32 p.m.
Duration: 21 minutes 47 seconds

Listed in: Technology

Deep Learning in Depth: The Future of Deep Learning

Published: Nov. 28, 2018, 5 p.m.
Duration: 6 minutes 28 seconds

Listed in: Technology

Deep Learning in Depth: Adversarial Machine Learning

Published: Nov. 27, 2018, 5 p.m.
Duration: 12 minutes 47 seconds

Listed in: Technology

System Architecture Virtual Integration: ROI on Early Discovery of Defects

Published: Nov. 15, 2018, 5 p.m.
Duration: 29 minutes 13 seconds

Listed in: Technology

Deep Learning in Depth: The Importance of Diverse Perspectives

Published: Nov. 7, 2018, 5 p.m.
Duration: 9 minutes 3 seconds

Listed in: Technology

A Technical Strategy for Cybersecurity

Published: Nov. 4, 2018, 5 p.m.
Duration: 14 minutes 51 seconds

Listed in: Technology

Best Practices for Security in Cloud Computing

Published: Oct. 26, 2018, 4 p.m.
Duration: 19 minutes 20 seconds

Listed in: Technology

Risks, Threats, and Vulnerabilities in Moving to the Cloud

Published: Oct. 22, 2018, 4 p.m.
Duration: 18 minutes 11 seconds

Listed in: Technology

Deep Learning in Depth: IARPA's Functional Map of the World Challenge

Published: Oct. 12, 2018, 4 p.m.
Duration: 12 minutes 41 seconds

Listed in: Technology

Deep Learning in Depth: Deep Learning versus Machine Learning

Published: Oct. 5, 2018, 4 p.m.
Duration: 13 minutes 11 seconds

Listed in: Technology

How to Be a Network Traffic Analyst

Published: Sept. 14, 2018, 4 p.m.
Duration: 21 minutes 10 seconds

Listed in: Technology

Workplace Violence and Insider Threat

Published: Aug. 28, 2018, 4 p.m.
Duration: 15 minutes 2 seconds

Listed in: Technology

Why Does Software Cost So Much?

Published: Aug. 2, 2018, 4 p.m.
Duration: 31 minutes 17 seconds

Listed in: Technology

Cybersecurity Engineering & Software Assurance: Opportunities & Risks

Published: July 26, 2018, 5 p.m.
Duration: 8 minutes 55 seconds

Listed in: Technology

Software Sustainment and Product Lines

Published: July 10, 2018, 5 p.m.
Duration: 28 minutes 22 seconds

Listed in: Technology

Best Practices in Cyber Intelligence

Published: June 25, 2018, 5 p.m.
Duration: 19 minutes 26 seconds

Listed in: Technology

Deep Learning in Depth: The Good, the Bad, and the Future

Published: June 7, 2018, 5 p.m.
Duration: 51 minutes 55 seconds

Listed in: Technology

The Evolving Role of the Chief Risk Officer

Published: May 24, 2018, 5 p.m.
Duration: 28 minutes 22 seconds

Listed in: Technology

Obsidian: A Safer Blockchain Programming Language

Published: May 10, 2018, 5 p.m.
Duration: 31 minutes 36 seconds

Listed in: Technology

Agile DevOps

Published: April 19, 2018, 5 p.m.
Duration: 33 minutes 11 seconds

Listed in: Technology

Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University

Published: April 5, 2018, 5 p.m.
Duration: 28 minutes 34 seconds

Listed in: Technology

Is Software Spoiling Us? Technical Innovations in the Department of Defense

Published: March 15, 2018, 5 p.m.
Duration: 21 minutes 14 seconds

Listed in: Technology

Is Software Spoiling Us? Innovations in Daily Life from Software

Published: Feb. 8, 2018, 5 p.m.
Duration: 16 minutes 44 seconds

Listed in: Technology

How Risk Management Fits into Agile & DevOps in Government

Published: Feb. 1, 2018, 5 p.m.
Duration: 34 minutes 17 seconds

Listed in: Technology

5 Best Practices for Preventing and Responding to Insider Threat

Published: Dec. 28, 2017, 5 p.m.
Duration: 11 minutes 13 seconds

Listed in: Technology

Pharos Binary Static Analysis: An Update

Published: Dec. 12, 2017, 5 p.m.
Duration: 10 minutes 3 seconds

Listed in: Technology

Positive Incentives for Reducing Insider Threat

Published: Nov. 30, 2017, 5 p.m.
Duration: 24 minutes 10 seconds

Listed in: Technology

Mission-Practical Biometrics

Published: Nov. 16, 2017, 5 p.m.
Duration: 20 minutes 33 seconds

Listed in: Technology

At Risk Emerging Technology Domains

Published: Oct. 24, 2017, 5 p.m.
Duration: 10 minutes 37 seconds

Listed in: Technology

DNS Blocking to Disrupt Malware

Published: Oct. 12, 2017, 5 p.m.
Duration: 15 minutes 5 seconds

Listed in: Technology

Best Practices: Network Border Protection

Published: Sept. 21, 2017, 5 p.m.
Duration: 24 minutes 6 seconds

Listed in: Technology

Verifying Software Assurance with IBMs Watson

Published: Sept. 7, 2017, 5 p.m.
Duration: 19 minutes 41 seconds

Listed in: Technology

The CERT Software Assurance Framework

Published: Aug. 31, 2017, 5 p.m.
Duration: 19 minutes 8 seconds

Listed in: Technology

Scaling Agile Methods

Published: Aug. 3, 2017, 5 p.m.
Duration: 24 minutes 27 seconds

Listed in: Technology

Ransomware: Best Practices for Prevention and Response

Published: July 14, 2017, 5 p.m.
Duration: 30 minutes 18 seconds

Listed in: Technology

Integrating Security in DevOps

Published: June 29, 2017, 5 p.m.
Duration: 28 minutes 50 seconds

Listed in: Technology

SEI Fellows Series: Peter Feiler

Published: June 15, 2017, 5 p.m.
Duration: 40 minutes 46 seconds

Listed in: Technology

NTP Best Practices

Published: May 25, 2017, 5 p.m.
Duration: 12 minutes 20 seconds

Listed in: Technology

Establishing Trust in Disconnected Environments

Published: May 18, 2017, 5 p.m.
Duration: 17 minutes 46 seconds

Listed in: Technology

Distributed Artificial Intelligence in Space

Published: April 20, 2017, 5 p.m.
Duration: 18 minutes 6 seconds

Listed in: Technology

Verifying Distributed Adaptive Real-Time Systems

Published: March 27, 2017, 5 p.m.
Duration: 47 minutes 2 seconds

Listed in: Technology

10 At-Risk Emerging Technologies

Published: March 23, 2017, 5 p.m.
Duration: 17 minutes 12 seconds

Listed in: Technology

Technical Debt as a Core Software Engineering Practice

Published: Feb. 27, 2017, 5 p.m.
Duration: 23 minutes 4 seconds

Listed in: Technology

DNS Best Practices

Published: Feb. 23, 2017, 5 p.m.
Duration: 27 minutes 5 seconds

Listed in: Technology

Three Roles and Three Failure Patterns of Software Architects

Published: Jan. 26, 2017, 5 p.m.
Duration: 13 minutes 35 seconds

Listed in: Technology

Security Modeling Tools

Published: Jan. 12, 2017, 5 p.m.
Duration: 23 minutes 49 seconds

Listed in: Technology

Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks

Published: Dec. 19, 2016, 5 p.m.
Duration: 33 minutes 3 seconds

Listed in: Technology

Cyber Security Engineering for Software and Systems Assurance

Published: Dec. 8, 2016, 5 p.m.
Duration: 18 minutes 12 seconds

Listed in: Technology

Moving Target Defense

Published: Nov. 30, 2016, 5 p.m.
Duration: 13 minutes 5 seconds

Listed in: Technology

Improving Cybersecurity Through Cyber Intelligence

Published: Nov. 10, 2016, 5 p.m.
Duration: 18 minutes 47 seconds

Listed in: Technology

A Requirement Specification Language for AADL

Published: Oct. 27, 2016, 5 p.m.
Duration: 30 minutes 44 seconds

Listed in: Technology

Becoming a CISO: Formal and Informal Requirements

Published: Oct. 19, 2016, 5 p.m.
Duration: 23 minutes 32 seconds

Listed in: Technology

Predicting Quality Assurance with Software Metrics and Security Methods

Published: Oct. 13, 2016, 5 p.m.
Duration: 11 minutes 24 seconds

Listed in: Technology

Network Flow and Beyond

Published: Sept. 29, 2016, 5 p.m.
Duration: 24 minutes 40 seconds

Listed in: Technology

A Community College Curriculum for Secure Software Development

Published: Sept. 15, 2016, 5 p.m.
Duration: 20 minutes 23 seconds

Listed in: Technology

Security and the Internet of Things

Published: Aug. 25, 2016, 5 p.m.
Duration: 17 minutes 9 seconds

Listed in: Technology

The SEI Fellow Series: Nancy Mead

Published: Aug. 10, 2016, 5 p.m.
Duration: 28 minutes 37 seconds

Listed in: Technology

An Open Source Tool for Fault Tree Analysis

Published: July 28, 2016, 5 p.m.
Duration: 14 minutes 19 seconds

Listed in: Technology

Global Value Chain An Expanded View of the ICT Supply Chain

Published: July 18, 2016, 5 p.m.
Duration: 30 minutes 12 seconds

Listed in: Technology

Intelligence Preparation for Operational Resilience

Published: June 21, 2016, 5 p.m.
Duration: 27 minutes

Listed in: Technology

Evolving Air Force Intelligence with Agile Techniques

Published: May 26, 2016, 5 p.m.
Duration: 17 minutes

Listed in: Technology

Threat Modeling and the Internet of Things

Published: May 12, 2016, 5 p.m.
Duration: 17 minutes 39 seconds

Listed in: Technology

Open Systems Architectures: When & Where to Be Closed

Published: April 14, 2016, 5 p.m.
Duration: 19 minutes 52 seconds

Listed in: Technology

Effective Reduction of Avoidable Complexity in Embedded Systems

Published: March 18, 2016, 5 p.m.
Duration: 18 minutes 32 seconds

Listed in: Technology

Toward Efficient and Effective Software Sustainment

Published: March 18, 2016, 5 p.m.
Duration: 23 minutes 20 seconds

Listed in: Technology

Quality Attribute Refinement and Allocation

Published: March 8, 2016, 5 p.m.
Duration: 24 minutes

Listed in: Technology

Is Java More Secure Than C?

Published: Feb. 19, 2016, 5 p.m.
Duration: 17 minutes 48 seconds

Listed in: Technology

Identifying the Architectural Roots of Vulnerabilities

Published: Feb. 4, 2016, 5 p.m.
Duration: 23 minutes 43 seconds

Listed in: Technology

Build Security In Maturity Model (BSIMM) Practices from Seventy Eight Organizations

Published: Feb. 3, 2016, 5 p.m.
Duration: 31 minutes 27 seconds

Listed in: Technology

An Interview with Grady Booch

Published: Jan. 12, 2016, 5 p.m.
Duration: 18 minutes 11 seconds

Listed in: Technology

Structuring the Chief Information Security Officer Organization

Published: Dec. 23, 2015, 5 p.m.
Duration: 31 minutes 23 seconds

Listed in: Technology

How Cyber Insurance Is Driving Risk and Technology Management

Published: Nov. 9, 2015, 5 p.m.
Duration: 21 minutes 23 seconds

Listed in: Technology

A Field Study of Technical Debt

Published: Oct. 15, 2015, 5 p.m.
Duration: 19 minutes 59 seconds

Listed in: Technology

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework

Published: Oct. 1, 2015, 5 p.m.
Duration: 23 minutes 46 seconds

Listed in: Technology

A Software Assurance Curriculum for Future Engineers

Published: Sept. 24, 2015, 5 p.m.
Duration: 19 minutes 34 seconds

Listed in: Technology

Four Types of Shift Left Testing

Published: Sept. 10, 2015, 5 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Toward Speed and Simplicity: Creating a Software Library for Graph Analytics

Published: Aug. 27, 2015, 5 p.m.
Duration: 15 minutes 37 seconds

Listed in: Technology

Capturing the Expertise of Cybersecurity Incident Handlers

Published: Aug. 27, 2015, 5 p.m.
Duration: 26 minutes 1 second

Listed in: Technology

Improving Quality Using Architecture Fault Analysis with Confidence Arguments

Published: Aug. 13, 2015, 5 p.m.
Duration: 18 minutes 2 seconds

Listed in: Technology

A Taxonomy of Testing Types

Published: July 30, 2015, 5 p.m.
Duration: 16 minutes 34 seconds

Listed in: Technology

Reducing Complexity in Software & Systems

Published: July 16, 2015, 5 p.m.
Duration: 19 minutes 5 seconds

Listed in: Technology

Designing Security Into Software-Reliant Systems

Published: June 25, 2015, 5 p.m.
Duration: 11 minutes 41 seconds

Listed in: Technology

Agile Methods in Air Force Sustainment

Published: June 11, 2015, 5 p.m.
Duration: 12 minutes 27 seconds

Listed in: Technology

Defect Prioritization With the Risk Priority Number

Published: May 28, 2015, 5 p.m.
Duration: 17 minutes 42 seconds

Listed in: Technology

SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers

Published: May 14, 2015, 5 p.m.
Duration: 20 minutes 18 seconds

Listed in: Technology

An Introduction to Context-Aware Computing

Published: April 23, 2015, 5 p.m.
Duration: 19 minutes 24 seconds

Listed in: Technology

Data Driven Software Assurance

Published: April 9, 2015, 5 p.m.
Duration: 30 minutes 14 seconds

Listed in: Technology

Applying Agile in the DoD: Twelfth Principle

Published: March 26, 2015, 5 p.m.
Duration: 12 minutes 14 seconds

Listed in: Technology

Supply Chain Risk Management: Managing Third Party and External Dependency Risk

Published: March 26, 2015, 5 p.m.
Duration: 28 minutes 9 seconds

Listed in: Technology

Introduction to the Mission Thread Workshop

Published: March 12, 2015, 5 p.m.
Duration: 23 minutes 45 seconds

Listed in: Technology

Applying Agile in the DoD: Eleventh Principle

Published: Feb. 26, 2015, 5 p.m.
Duration: 14 minutes 5 seconds

Listed in: Technology

A Workshop on Measuring What Matters

Published: Feb. 20, 2015, 5 p.m.
Duration: 30 minutes 41 seconds

Listed in: Technology

Applying Agile in the DoD: Tenth Principle

Published: Feb. 12, 2015, 5 p.m.
Duration: 13 minutes 57 seconds

Listed in: Technology

Predicting Software Assurance Using Quality and Reliability Measures

Published: Jan. 29, 2015, 5 p.m.
Duration: 19 minutes 2 seconds

Listed in: Technology

Applying Agile in the DoD: Ninth Principle

Published: Jan. 16, 2015, 5 p.m.
Duration: 17 minutes 35 seconds

Listed in: Technology

Cyber Insurance and Its Role in Mitigating Cybersecurity Risk

Published: Jan. 8, 2015, 5 p.m.
Duration: 37 minutes 26 seconds

Listed in: Technology

AADL and Dassault Aviation

Published: Dec. 18, 2014, 5 p.m.
Duration: 8 minutes 56 seconds

Listed in: Technology

Tactical Cloudlets

Published: Dec. 4, 2014, 5 p.m.
Duration: 32 minutes 28 seconds

Listed in: Technology

Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs

Published: Nov. 27, 2014, 5 p.m.
Duration: 11 minutes 46 seconds

Listed in: Technology

Coding with AADL

Published: Nov. 13, 2014, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

The State of Agile

Published: Oct. 30, 2014, 5 p.m.
Duration: 28 minutes 6 seconds

Listed in: Technology

Applying Agile in the DoD: Eighth Principle

Published: Oct. 9, 2014, 5 p.m.
Duration: 13 minutes 28 seconds

Listed in: Technology

A Taxonomy of Operational Risks for Cyber Security

Published: Oct. 7, 2014, 5 p.m.
Duration: 32 minutes 47 seconds

Listed in: Technology

Agile Metrics

Published: Sept. 25, 2014, 5 p.m.
Duration: 24 minutes 4 seconds

Listed in: Technology

Four Principles for Engineering Scalable, Big Data Systems

Published: Sept. 11, 2014, 5 p.m.
Duration: 20 minutes 12 seconds

Listed in: Technology

An Appraisal of Systems Engineering: Defense v. Non-Defense

Published: Aug. 28, 2014, 5 p.m.
Duration: 14 minutes 5 seconds

Listed in: Technology

HTML5 for Mobile Apps at the Edge

Published: Aug. 14, 2014, 5 p.m.
Duration: 20 minutes 49 seconds

Listed in: Technology

Applying Agile in the DoD: Seventh Principle

Published: July 24, 2014, 5 p.m.
Duration: 17 minutes 58 seconds

Listed in: Technology

AADL and Edgewater

Published: July 10, 2014, 5 p.m.
Duration: 8 minutes 42 seconds

Listed in: Technology

Security and Wireless Emergency Alerts

Published: June 26, 2014, 5 p.m.
Duration: 12 minutes 30 seconds

Listed in: Technology

Safety and Behavior Specification Using the Architecture Analysis and Design Language

Published: June 12, 2014, 5 p.m.
Duration: 20 minutes 40 seconds

Listed in: Technology

Applying Agile in the DoD: Sixth Principle

Published: May 29, 2014, 5 p.m.
Duration: 15 minutes

Listed in: Technology

Characterizing and Prioritizing Malicious Code

Published: May 29, 2014, 5 p.m.
Duration: 27 minutes 8 seconds

Listed in: Technology

Using Quality Attributes to Improve Acquisition

Published: May 15, 2014, 5 p.m.
Duration: 18 minutes 24 seconds

Listed in: Technology

Best Practices for Trust in the Wireless Emergency Alerts Service

Published: April 29, 2014, 5 p.m.
Duration: 21 minutes 58 seconds

Listed in: Technology

Three Variations on the V Model for System and Software Testing

Published: April 10, 2014, 5 p.m.
Duration: 21 minutes 25 seconds

Listed in: Technology

Adapting the PSP to Incorporate Verified Design by Contract

Published: March 27, 2014, 5 p.m.
Duration: 17 minutes 44 seconds

Listed in: Technology

Comparing IT Risk Assessment and Analysis Methods

Published: March 25, 2014, 5 p.m.
Duration: 37 minutes 27 seconds

Listed in: Technology

AADL and Aerospace

Published: March 13, 2014, 5 p.m.
Duration: 14 minutes 55 seconds

Listed in: Technology

Assuring Open Source Software

Published: Feb. 27, 2014, 5 p.m.
Duration: 13 minutes 38 seconds

Listed in: Technology

Security Pattern Assurance through Roundtrip Engineering

Published: Feb. 13, 2014, 5 p.m.
Duration: 16 minutes

Listed in: Technology

The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)

Published: Feb. 11, 2014, 5 p.m.
Duration: 28 minutes 50 seconds

Listed in: Technology

Applying Agile in the DoD: Fifth Principle

Published: Jan. 30, 2014, 5 p.m.
Duration: 20 minutes 53 seconds

Listed in: Technology

Software Assurance Cases

Published: Jan. 16, 2014, 5 p.m.
Duration: 19 minutes 51 seconds

Listed in: Technology

Raising the Bar - Mainstreaming CERT C Secure Coding Rules

Published: Jan. 7, 2014, 5 p.m.
Duration: 25 minutes 17 seconds

Listed in: Technology

AADL and Telecom Paris Tech

Published: Dec. 26, 2013, 5 p.m.
Duration: 10 minutes 39 seconds

Listed in: Technology

From Process to Performance-Based Improvement

Published: Dec. 12, 2013, 5 p.m.
Duration: 23 minutes 49 seconds

Listed in: Technology

An Approach to Managing the Software Engineering Challenges of Big Data

Published: Nov. 27, 2013, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience

Published: Nov. 26, 2013, 5 p.m.
Duration: 27 minutes 46 seconds

Listed in: Technology

Situational Awareness Mashups

Published: Nov. 14, 2013, 5 p.m.
Duration: 17 minutes 25 seconds

Listed in: Technology

Applying Agile in the DoD: Fourth Principle

Published: Oct. 31, 2013, 5 p.m.
Duration: 18 minutes 19 seconds

Listed in: Technology

Architecting Systems of the Future

Published: Oct. 17, 2013, 5 p.m.
Duration: 12 minutes 44 seconds

Listed in: Technology

Acquisition Archetypes

Published: Sept. 26, 2013, 5 p.m.
Duration: 18 minutes 22 seconds

Listed in: Technology

Human-in-the-Loop Autonomy

Published: Sept. 12, 2013, 5 p.m.
Duration: 22 minutes 56 seconds

Listed in: Technology

Mobile Applications for Emergency Managers

Published: Aug. 29, 2013, 5 p.m.
Duration: 10 minutes 15 seconds

Listed in: Technology

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions

Published: Aug. 27, 2013, 5 p.m.
Duration: 32 minutes 55 seconds

Listed in: Technology

Applying Agile in the DoD: Third Principle

Published: Aug. 15, 2013, 5 p.m.
Duration: 16 minutes 16 seconds

Listed in: Technology

DevOps - Transform Development and Operations for Fast, Secure Deployments

Published: July 30, 2013, 5 p.m.
Duration: 33 minutes 44 seconds

Listed in: Technology

Application Virtualization as a Strategy for Cyber Foraging

Published: July 25, 2013, 5 p.m.
Duration: 21 minutes 28 seconds

Listed in: Technology

Common Testing Problems: Pitfalls to Prevent and Mitigate

Published: July 11, 2013, 5 p.m.
Duration: 16 minutes 45 seconds

Listed in: Technology

Joint Programs and Social Dilemmas

Published: June 27, 2013, 5 p.m.
Duration: 13 minutes 19 seconds

Listed in: Technology

Applying Agile in the DoD: Second Principle

Published: June 13, 2013, 5 p.m.
Duration: 12 minutes 33 seconds

Listed in: Technology

Managing Disruptive Events - CERT-RMM Experience Reports

Published: June 11, 2013, 5 p.m.
Duration: 36 minutes 26 seconds

Listed in: Technology

Reliability Validation and Improvement Framework

Published: May 23, 2013, 5 p.m.
Duration: 13 minutes 45 seconds

Listed in: Technology

Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity

Published: May 9, 2013, 5 p.m.
Duration: 21 minutes 24 seconds

Listed in: Technology

The Business Case for Systems Engineering

Published: May 9, 2013, 5 p.m.
Duration: 25 minutes 18 seconds

Listed in: Technology

Applying Agile in the DoD: First Principle

Published: April 18, 2013, 5 p.m.
Duration: 18 minutes 36 seconds

Listed in: Technology

The Evolution of a Science Project

Published: April 4, 2013, 5 p.m.
Duration: 19 minutes 47 seconds

Listed in: Technology

Securing Mobile Devices aka BYOD

Published: March 26, 2013, 5 p.m.
Duration: 24 minutes 6 seconds

Listed in: Technology

What's New With Version 2 of the AADL Standard?

Published: March 21, 2013, 5 p.m.
Duration: 13 minutes 33 seconds

Listed in: Technology

The State of the Practice of Cyber Intelligence

Published: March 7, 2013, 5 p.m.
Duration: 17 minutes 29 seconds

Listed in: Technology

Technology Readiness Assessments

Published: Feb. 21, 2013, 5 p.m.
Duration: 15 minutes 47 seconds

Listed in: Technology

Standards in Cloud Computing Interoperability

Published: Feb. 7, 2013, 5 p.m.
Duration: 7 minutes 49 seconds

Listed in: Technology

Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk

Published: Jan. 31, 2013, 5 p.m.
Duration: 26 minutes 45 seconds

Listed in: Technology

The Latest Developments in AADL

Published: Jan. 17, 2013, 5 p.m.
Duration: 14 minutes 58 seconds

Listed in: Technology

The Fundamentals of Agile

Published: Jan. 3, 2013, 5 p.m.
Duration: 17 minutes 33 seconds

Listed in: Technology

Software for Soldiers who use Smartphones

Published: Dec. 20, 2012, 5 p.m.
Duration: 16 minutes 57 seconds

Listed in: Technology

Managing Disruptive Events: Making the Case for Operational Resilience

Published: Dec. 19, 2012, 5 p.m.
Duration: 24 minutes 26 seconds

Listed in: Technology

Architecting Service-Oriented Systems

Published: Dec. 6, 2012, 5 p.m.
Duration: 9 minutes 7 seconds

Listed in: Technology

The SEI Strategic Plan

Published: Nov. 15, 2012, 5 p.m.
Duration: 21 minutes 18 seconds

Listed in: Technology

Quantifying Uncertainty in Early Lifecycle Cost Estimation

Published: Nov. 1, 2012, 5 p.m.
Duration: 10 minutes 5 seconds

Listed in: Technology

Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities

Published: Oct. 23, 2012, 5 p.m.
Duration: 28 minutes 55 seconds

Listed in: Technology

Architecting a Financial System with TSP

Published: Oct. 18, 2012, 5 p.m.
Duration: 28 minutes 27 seconds

Listed in: Technology

The Importance of Data Quality

Published: Oct. 4, 2012, 5 p.m.
Duration: 21 minutes 20 seconds

Listed in: Technology

How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them

Published: Sept. 25, 2012, 5 p.m.
Duration: 37 minutes 39 seconds

Listed in: Technology

Misaligned Incentives

Published: Sept. 20, 2012, 5 p.m.
Duration: 15 minutes 10 seconds

Listed in: Technology

How a Disciplined Process Enhances & Enables Agility

Published: Sept. 4, 2012, 5 p.m.
Duration: 21 minutes 4 seconds

Listed in: Technology

Agile Acquisition

Published: Sept. 4, 2012, 5 p.m.
Duration: 8 minutes 59 seconds

Listed in: Technology

An Architecture-Focused Measurement Framework for Managing Technical Debt

Published: Sept. 4, 2012, 5 p.m.
Duration: 15 minutes 49 seconds

Listed in: Technology

Cloud Computing for the Battlefield

Published: Sept. 4, 2012, 5 p.m.
Duration: 9 minutes 58 seconds

Listed in: Technology

U.S. Postal Inspection Service Use of the CERT Resilience Management Model

Published: Aug. 21, 2012, 5 p.m.
Duration: 23 minutes 53 seconds

Listed in: Technology

Insights from the First CERT Resilience Management Model Users Group

Published: July 17, 2012, 5 p.m.
Duration: 26 minutes 36 seconds

Listed in: Technology

NIST Catalog of Security and Privacy Controls, Including Insider Threat

Published: April 24, 2012, 5 p.m.
Duration: 28 minutes 10 seconds

Listed in: Technology

Cisco's Adoption of CERT Secure Coding Standards

Published: Feb. 28, 2012, 5 p.m.
Duration: 24 minutes 41 seconds

Listed in: Technology

How to Become a Cyber Warrior

Published: Jan. 31, 2012, 5 p.m.
Duration: 25 minutes 35 seconds

Listed in: Technology

Considering Security and Privacy in the Move to Electronic Health Records

Published: Dec. 20, 2011, 5 p.m.
Duration: 28 minutes 27 seconds

Listed in: Technology

Measuring Operational Resilience

Published: Oct. 4, 2011, 5 p.m.
Duration: 25 minutes 32 seconds

Listed in: Technology

Why Organizations Need a Secure Domain Name System

Published: Sept. 6, 2011, 5 p.m.
Duration: 20 minutes 51 seconds

Listed in: Technology

Controls for Monitoring the Security of Cloud Services

Published: Aug. 2, 2011, 5 p.m.
Duration: 19 minutes 19 seconds

Listed in: Technology

Building a Malware Analysis Capability

Published: July 12, 2011, 5 p.m.
Duration: 24 minutes 47 seconds

Listed in: Technology

Using the Smart Grid Maturity Model (SGMM)

Published: May 5, 2011, 5 p.m.
Duration: 29 minutes 41 seconds

Listed in: Technology

Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM

Published: March 29, 2011, 5 p.m.
Duration: 28 minutes 6 seconds

Listed in: Technology

Conducting Cyber Exercises at the National Level

Published: Feb. 22, 2011, 5 p.m.
Duration: 2 minutes 31 seconds

Listed in: Technology

Indicators and Controls for Mitigating Insider Threat

Published: Jan. 25, 2011, 5 p.m.
Duration: 23 minutes 26 seconds

Listed in: Technology

How Resilient Is My Organization?

Published: Dec. 9, 2010, 5 p.m.
Duration: 39 minutes 2 seconds

Listed in: Technology

Public-Private Partnerships: Essential for National Cyber Security

Published: Nov. 30, 2010, 5 p.m.
Duration: 31 minutes 24 seconds

Listed in: Technology

Software Assurance: A Master's Level Curriculum

Published: Oct. 26, 2010, 5 p.m.
Duration: 34 minutes 37 seconds

Listed in: Technology

How to Develop More Secure Software - Practices from Thirty Organizations

Published: Sept. 28, 2010, 5 p.m.
Duration: 29 minutes 27 seconds

Listed in: Technology

Mobile Device Security: Threats, Risks, and Actions to Take

Published: Aug. 31, 2010, 5 p.m.
Duration: 26 minutes 15 seconds

Listed in: Technology

Establishing a National Computer Security Incident Response Team (CSIRT)

Published: Aug. 19, 2010, 5 p.m.
Duration: 27 minutes 56 seconds

Listed in: Technology

Securing Industrial Control Systems

Published: July 27, 2010, 5 p.m.
Duration: 23 minutes 9 seconds

Listed in: Technology

The Power of Fuzz Testing to Reduce Security Vulnerabilities

Published: May 25, 2010, 5 p.m.
Duration: 26 minutes 2 seconds

Listed in: Technology

Protect Your Business from Money Mules

Published: April 27, 2010, 5 p.m.
Duration: 19 minutes 2 seconds

Listed in: Technology

Train for the Unexpected

Published: March 3, 2010, 5 p.m.
Duration: 25 minutes 32 seconds

Listed in: Technology

The Role of the CISO in Developing More Secure Software

Published: March 2, 2010, 5 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Computer and Network Forensics: A Master's Level Curriculum

Published: Feb. 2, 2010, 5 p.m.
Duration: 24 minutes 46 seconds

Listed in: Technology

Introducing the Smart Grid Maturity Model (SGMM)

Published: Jan. 12, 2010, 5 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

Leveraging Security Policies and Procedures for Electronic Evidence Discovery

Published: Jan. 9, 2010, 5 p.m.
Duration: 25 minutes 45 seconds

Listed in: Technology

Integrating Privacy Practices into the Software Development Life Cycle

Published: Dec. 22, 2009, 5 p.m.
Duration: 17 minutes 28 seconds

Listed in: Technology

Using the Facts to Protect Enterprise Networks: CERT's NetSA Team

Published: Dec. 1, 2009, 5 p.m.
Duration: 22 minutes 1 second

Listed in: Technology

Ensuring Continuity of Operations When Business Is Disrupted

Published: Nov. 10, 2009, 5 p.m.
Duration: 21 minutes 23 seconds

Listed in: Technology

Managing Relationships with Business Partners to Achieve Operational Resiliency

Published: Oct. 20, 2009, 5 p.m.
Duration: 27 minutes 8 seconds

Listed in: Technology

The Smart Grid: Managing Electrical Power Distribution and Use

Published: Sept. 29, 2009, 5 p.m.
Duration: 20 minutes 16 seconds

Listed in: Technology

Electronic Health Records: Challenges for Patient Privacy and Security

Published: Sept. 8, 2009, 5 p.m.
Duration: 26 minutes 2 seconds

Listed in: Technology

Mitigating Insider Threat: New and Improved Practices

Published: Aug. 18, 2009, 5 p.m.
Duration: 36 minutes 22 seconds

Listed in: Technology

Rethinking Risk Management

Published: July 7, 2009, 5 p.m.
Duration: 29 minutes 37 seconds

Listed in: Technology

The Upside and Downside of Security in the Cloud

Published: June 16, 2009, 5 p.m.
Duration: 27 minutes 41 seconds

Listed in: Technology

More Targeted, Sophisticated Attacks: Where to Pay Attention

Published: May 26, 2009, 5 p.m.
Duration: 20 minutes 5 seconds

Listed in: Technology

Is There Value in Identifying Software Security "Never Events?"

Published: May 5, 2009, 5 p.m.
Duration: 20 minutes 22 seconds

Listed in: Technology

Cyber Security, Safety, and Ethics for the Net Generation

Published: April 14, 2009, 5 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

An Experience-Based Maturity Model for Software Security

Published: March 31, 2009, 5 p.m.
Duration: 21 minutes 49 seconds

Listed in: Technology

Mainstreaming Secure Coding Practices

Published: March 17, 2009, 5 p.m.
Duration: 20 minutes 3 seconds

Listed in: Technology

Security: A Key Enabler of Business Innovation

Published: March 3, 2009, 5 p.m.
Duration: 23 minutes 54 seconds

Listed in: Technology

Better Incident Response Through Scenario Based Training

Published: Feb. 17, 2009, 5 p.m.
Duration: 22 minutes 56 seconds

Listed in: Technology

An Alternative to Risk Management for Information and Software Security

Published: Feb. 3, 2009, 5 p.m.
Duration: 25 minutes 53 seconds

Listed in: Technology

Tackling Tough Challenges: Insights from CERTs Director Rich Pethia

Published: Jan. 20, 2009, 5 p.m.
Duration: 17 minutes 33 seconds

Listed in: Technology

Climate Change: Implications for Information Technology and Security

Published: Dec. 9, 2008, 5 p.m.
Duration: 23 minutes 45 seconds

Listed in: Technology

Using High Fidelity, Online Training to Stay Sharp

Published: Nov. 25, 2008, 5 p.m.
Duration: 26 minutes 38 seconds

Listed in: Technology

Integrating Security Incident Response and e-Discovery

Published: Nov. 11, 2008, 5 p.m.
Duration: 25 minutes 34 seconds

Listed in: Technology

Concrete Steps for Implementing an Information Security Program

Published: Oct. 28, 2008, 5 p.m.
Duration: 21 minutes 29 seconds

Listed in: Technology

Virtual Communities: Risks and Opportunities

Published: Oct. 14, 2008, 5 p.m.
Duration: 18 minutes 6 seconds

Listed in: Technology

Developing Secure Software: Universities as Supply Chain Partners

Published: Sept. 30, 2008, 5 p.m.
Duration: 23 minutes 22 seconds

Listed in: Technology

Security Risk Assessment Using OCTAVE Allegro

Published: Sept. 16, 2008, 5 p.m.
Duration: 18 minutes 10 seconds

Listed in: Technology

Getting to a Useful Set of Security Metrics

Published: Sept. 2, 2008, 5 p.m.
Duration: 18 minutes 49 seconds

Listed in: Technology

How to Start a Secure Software Development Program

Published: Aug. 20, 2008, 5 p.m.
Duration: 20 minutes 1 second

Listed in: Technology

Managing Risk to Critical Infrastructures at the National Level

Published: Aug. 5, 2008, 5 p.m.
Duration: 22 minutes 13 seconds

Listed in: Technology

Analyzing Internet Traffic for Better Cyber Situational Awareness

Published: July 28, 2008, 5 p.m.
Duration: 29 minutes 34 seconds

Listed in: Technology

Managing Security Vulnerabilities Based on What Matters Most

Published: July 22, 2008, 5 p.m.
Duration: 23 minutes 28 seconds

Listed in: Technology

Identifying Software Security Requirements Early, Not After the Fact

Published: July 8, 2008, 5 p.m.
Duration: 22 minutes 57 seconds

Listed in: Technology

Making Information Security Policy Happen

Published: June 24, 2008, 5 p.m.
Duration: 24 minutes 18 seconds

Listed in: Technology

Becoming a Smart Buyer of Software

Published: June 10, 2008, 5 p.m.
Duration: 21 minutes 11 seconds

Listed in: Technology

Building More Secure Software

Published: May 27, 2008, 5 p.m.
Duration: 16 minutes 44 seconds

Listed in: Technology

Connecting the Dots Between IT Operations and Security

Published: May 13, 2008, 5 p.m.
Duration: 24 minutes 40 seconds

Listed in: Technology

Getting in Front of Social Engineering

Published: April 29, 2008, 5 p.m.
Duration: 23 minutes 56 seconds

Listed in: Technology

Using Benchmarks to Make Better Security Decisions

Published: April 15, 2008, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Protecting Information Privacy - How To and Lessons Learned

Published: April 1, 2008, 5 p.m.
Duration: 22 minutes 12 seconds

Listed in: Technology

Initiating a Security Metrics Program: Key Points to Consider

Published: March 18, 2008, 5 p.m.
Duration: 12 minutes 5 seconds

Listed in: Technology

Insider Threat and the Software Development Life Cycle

Published: March 4, 2008, 5 p.m.
Duration: 23 minutes 33 seconds

Listed in: Technology

Tackling the Growing Botnet Threat

Published: Feb. 19, 2008, 5 p.m.
Duration: 20 minutes 34 seconds

Listed in: Technology

Building a Security Metrics Program

Published: Feb. 5, 2008, 5 p.m.
Duration: 22 minutes 34 seconds

Listed in: Technology

Inadvertent Data Disclosure on Peer-to-Peer Networks

Published: Jan. 22, 2008, 5 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

Information Compliance: A Growing Challenge for Business Leaders

Published: Jan. 8, 2008, 5 p.m.
Duration: 21 minutes 54 seconds

Listed in: Technology

Internal Audit's Role in Information Security: An Introduction

Published: Dec. 10, 2007, 5 p.m.
Duration: 14 minutes 26 seconds

Listed in: Technology

What Business Leaders Can Expect from Security Degree Programs

Published: Nov. 27, 2007, 5 p.m.
Duration: 18 minutes 30 seconds

Listed in: Technology

The Path from Information Security Risk Assessment to Compliance

Published: Nov. 13, 2007, 5 p.m.
Duration: 26 minutes 18 seconds

Listed in: Technology

Computer Forensics for Business Leaders: Building Robust Policies and Processes

Published: Oct. 30, 2007, 5 p.m.
Duration: 12 minutes 22 seconds

Listed in: Technology

Business Resilience: A More Compelling Argument for Information Security

Published: Oct. 16, 2007, 5 p.m.
Duration: 24 minutes 34 seconds

Listed in: Technology

Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity

Published: Oct. 15, 2007, 5 p.m.
Duration: 18 minutes 24 seconds

Listed in: Technology

The Human Side of Security Trade-Offs

Published: Sept. 18, 2007, 5 p.m.
Duration: 27 minutes 15 seconds

Listed in: Technology

Dual Perspectives: A CIO's and CISO's Take on Security

Published: Sept. 4, 2007, 5 p.m.
Duration: 26 minutes 21 seconds

Listed in: Technology

Tackling Security at the National Level: A Resource for Leaders

Published: Aug. 7, 2007, 5 p.m.
Duration: 22 minutes 19 seconds

Listed in: Technology

Reducing Security Costs with Standard Configurations: U.S. Government Initiatives

Published: Aug. 7, 2007, 5 p.m.
Duration: 25 minutes 9 seconds

Listed in: Technology

Real-World Security for Business Leaders

Published: July 24, 2007, 5 p.m.
Duration: 20 minutes 27 seconds

Listed in: Technology

Using Standards to Build an Information Security Program

Published: July 10, 2007, 5 p.m.
Duration: 27 minutes 52 seconds

Listed in: Technology

Getting Real About Security Governance

Published: June 26, 2007, 5 p.m.
Duration: 19 minutes 24 seconds

Listed in: Technology

Convergence: Integrating Physical and IT Security

Published: June 12, 2007, 5 p.m.
Duration: 28 minutes 44 seconds

Listed in: Technology

IT Infrastructure: Tips for Navigating Tough Spots

Published: May 29, 2007, 5 p.m.
Duration: 22 minutes 34 seconds

Listed in: Technology

The Value of De-Identified Personal Data

Published: May 15, 2007, 5 p.m.
Duration: 31 minutes 25 seconds

Listed in: Technology

Adapting to Changing Risk Environments: Operational Resilience

Published: May 1, 2007, 5 p.m.
Duration: 24 minutes 45 seconds

Listed in: Technology

Computer Forensics for Business Leaders: A Primer

Published: April 17, 2007, 5 p.m.
Duration: 16 minutes 32 seconds

Listed in: Technology

The Real Secrets of Incident Management

Published: April 3, 2007, 5 p.m.
Duration: 21 minutes 17 seconds

Listed in: Technology

The Legal Side of Global Security

Published: March 20, 2007, 5 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

A New Look at the Business of IT Education

Published: March 6, 2007, 5 p.m.
Duration: 17 minutes 52 seconds

Listed in: Technology

Crisis Communications During a Security Incident

Published: Feb. 20, 2007, 5 p.m.
Duration: 13 minutes 42 seconds

Listed in: Technology

Assuring Mission Success in Complex Environments

Published: Feb. 6, 2007, 5 p.m.
Duration: 17 minutes 49 seconds

Listed in: Technology

Privacy: The Slow Tipping Point

Published: Jan. 23, 2007, 5 p.m.
Duration: 17 minutes 42 seconds

Listed in: Technology

Building Staff Competence in Security

Published: Jan. 9, 2007, 5 p.m.
Duration: 21 minutes 56 seconds

Listed in: Technology

Inside Defense-in-Depth

Published: Dec. 19, 2006, 5 p.m.
Duration: 15 minutes 44 seconds

Listed in: Technology

Protecting Against Insider Threat

Published: Nov. 28, 2006, 5 p.m.
Duration: 27 minutes 9 seconds

Listed in: Technology

Change Management: The Security 'X' Factor

Published: Nov. 14, 2006, 5 p.m.
Duration: 18 minutes 38 seconds

Listed in: Technology

CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT

Published: Oct. 31, 2006, 5 p.m.
Duration: 23 minutes 35 seconds

Listed in: Technology

The ROI of Security

Published: Oct. 17, 2006, 5 p.m.
Duration: 21 minutes 20 seconds

Listed in: Technology

Compliance vs. Buy-in

Published: Oct. 17, 2006, 5 p.m.
Duration: 8 minutes 41 seconds

Listed in: Technology

Why Leaders Should Care About Security

Published: Oct. 17, 2006, 5 p.m.
Duration: 17 minutes 53 seconds

Listed in: Technology

Proactive Remedies for Rising Threats

Published: Oct. 17, 2006, 5 p.m.
Duration: 19 minutes 36 seconds

Listed in: Technology