Software Engineering Institute (SEI) Podcast Series

Software Engineering Institute (SEI) Podcast Series

333 episodes

The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.

Podcasts

ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies

Published: Dec. 14, 2023, 9:15 p.m.
Duration: 46 minutes 22 seconds

Listed in: Technology

The Cybersecurity of Quantum Computing: 6 Areas of Research

Published: Nov. 28, 2023, 8:42 p.m.
Duration: 23 minutes 1 second

Listed in: Technology

User-Centric Metrics for Agile

Published: Nov. 16, 2023, 2:36 p.m.
Duration: 31 minutes 41 seconds

Listed in: Technology

The Product Managers Evolving Role in Software and Systems Development

Published: Nov. 10, 2023, 1:41 a.m.
Duration: 24 minutes 19 seconds

Listed in: Technology

Measuring the Trustworthiness of AI Systems

Published: Oct. 12, 2023, 7:51 p.m.
Duration: 19 minutes 27 seconds

Listed in: Technology

Actionable Data in the DevSecOps Pipeline

Published: Sept. 13, 2023, 2:57 p.m.
Duration: 31 minutes 58 seconds

Listed in: Technology

Insider Risk Management in the Post-Pandemic Workplace

Published: Sept. 8, 2023, 1:51 p.m.
Duration: 47 minutes 34 seconds

Listed in: Technology

An Agile Approach to Independent Verification and Validation

Published: Aug. 9, 2023, 3:48 p.m.
Duration: 31 minutes 57 seconds

Listed in: Technology

Zero Trust Architecture: Best Practices Observed in Industry

Published: July 26, 2023, 5:16 p.m.
Duration: 27 minutes 53 seconds

Listed in: Technology

Automating Infrastructure as Code with Ansible and Molecule

Published: July 10, 2023, 11:32 a.m.
Duration: 39 minutes 38 seconds

Listed in: Technology

Identifying and Preventing the Next SolarWinds

Published: June 20, 2023, 3:20 p.m.
Duration: 46 minutes 4 seconds

Listed in: Technology

A Penetration Testing Findings Repository

Published: June 13, 2023, 8:01 p.m.
Duration: 25 minutes 47 seconds

Listed in: Technology

Understanding Vulnerabilities in the Rust Programming Language

Published: June 8, 2023, 6:17 p.m.
Duration: 36 minutes 45 seconds

Listed in: Technology

We Live in Software: Engineering Societal-Scale Systems

Published: May 18, 2023, 7:25 p.m.
Duration: 39 minutes 31 seconds

Listed in: Technology

Secure by Design, Secure by Default

Published: May 10, 2023, 2:58 p.m.
Duration: 54 minutes 5 seconds

Listed in: Technology

Key Steps to Integrate Secure by Design into Acquisition and Development

Published: May 2, 2023, 8:36 p.m.
Duration: 48 minutes 50 seconds

Listed in: Technology

An Exploration of Enterprise Technical Debt

Published: April 18, 2023, 2:18 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

The Messy Middle of Large Language Models

Published: March 29, 2023, 6:44 p.m.
Duration: 33 minutes 46 seconds

Listed in: Technology

An Infrastructure-Focused Framework for Adopting DevSecOps

Published: March 21, 2023, 3:20 p.m.
Duration: 43 minutes 35 seconds

Listed in: Technology

Software Security in Rust

Published: March 15, 2023, 1:53 p.m.
Duration: 18 minutes 9 seconds

Listed in: Technology

Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron

Published: Feb. 24, 2023, 6:56 p.m.
Duration: 51 minutes 16 seconds

Listed in: Technology

Asking the Right Questions to Coordinate Security in the Supply Chain

Published: Feb. 7, 2023, 10:02 p.m.
Duration: 31 minutes 11 seconds

Listed in: Technology

Securing Open Source Software in the DoD

Published: Jan. 26, 2023, 2:59 p.m.
Duration: 35 minutes 33 seconds

Listed in: Technology

A Model-Based Tool for Designing Safety-Critical Systems

Published: Dec. 13, 2022, 8:45 p.m.
Duration: 48 minutes 43 seconds

Listed in: Technology

Managing Developer Velocity and System Security with DevSecOps

Published: Dec. 7, 2022, 4:32 p.m.
Duration: 32 minutes 55 seconds

Listed in: Technology

A Method for Assessing Cloud Adoption Risks

Published: Nov. 17, 2022, 7:57 p.m.
Duration: 21 minutes 47 seconds

Listed in: Technology

Software Architecture Patterns for Deployability

Published: Nov. 15, 2022, 8:07 p.m.
Duration: 29 minutes 9 seconds

Listed in: Technology

ML-Driven Decision Making in Realistic Cyber Exercises

Published: Oct. 13, 2022, 2:37 p.m.
Duration: 48 minutes 58 seconds

Listed in: Technology

A Roadmap for Creating and Using Virtual Prototyping Software

Published: Oct. 6, 2022, 11:50 p.m.
Duration: 56 minutes 30 seconds

Listed in: Technology

Software Architecture Patterns for Robustness

Published: Sept. 15, 2022, 7:17 p.m.
Duration: 31 minutes 13 seconds

Listed in: Technology

A Platform-Independent Model for DevSecOps

Published: Sept. 8, 2022, 5:30 p.m.
Duration: 23 minutes 41 seconds

Listed in: Technology

Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems

Published: Aug. 18, 2022, 12:12 p.m.
Duration: 27 minutes 36 seconds

Listed in: Technology

Trust and AI Systems

Published: Aug. 5, 2022, 11:24 a.m.
Duration: 35 minutes 24 seconds

Listed in: Technology

A Dive into Deepfakes

Published: July 28, 2022, 5:41 p.m.
Duration: 31 minutes 58 seconds

Listed in: Technology

Challenges and Metrics in Digital Engineering

Published: July 13, 2022, 1:51 p.m.
Duration: 42 minutes 18 seconds

Listed in: Technology

The 4 Phases of the Zero Trust Journey

Published: July 5, 2022, 10:55 a.m.
Duration: 34 minutes 28 seconds

Listed in: Technology

DevSecOps for AI Engineering

Published: June 21, 2022, 7:01 p.m.
Duration: 43 minutes 13 seconds

Listed in: Technology

Undiscovered Vulnerabilities: Not Just for Critical Software

Published: June 2, 2022, 1:56 p.m.
Duration: 35 minutes 26 seconds

Listed in: Technology

Explainable AI Explained

Published: May 16, 2022, 6:02 p.m.
Duration: 25 minutes 49 seconds

Listed in: Technology

Model-Based Systems Engineering Meets DevSecOps

Published: April 5, 2022, 3:29 p.m.
Duration: 34 minutes 10 seconds

Listed in: Technology

Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy

Published: March 22, 2022, 3:23 p.m.
Duration: 31 minutes 46 seconds

Listed in: Technology

Software and Systems Collaboration in the Era of Smart Systems

Published: March 9, 2022, 3:30 p.m.
Duration: 26 minutes 4 seconds

Listed in: Technology

Securing the Supply Chain for the Defense Industrial Base

Published: Feb. 22, 2022, 3:26 p.m.
Duration: 18 minutes 37 seconds

Listed in: Technology

Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis

Published: Feb. 8, 2022, 5:58 p.m.
Duration: 23 minutes 24 seconds

Listed in: Technology

Envisioning the Future of Software Engineering

Published: Jan. 20, 2022, 3:45 p.m.
Duration: 40 minutes 11 seconds

Listed in: Technology

Implementing the DoD's Ethical AI Principles

Published: Jan. 11, 2022, 4:55 p.m.
Duration: 23 minutes 17 seconds

Listed in: Technology

Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems

Published: Dec. 3, 2021, 4:04 p.m.
Duration: 39 minutes 36 seconds

Listed in: Technology

Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems

Published: Nov. 18, 2021, 9:47 p.m.
Duration: 30 minutes 19 seconds

Listed in: Technology

A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad

Published: Nov. 11, 2021, 7:45 p.m.
Duration: 37 minutes 17 seconds

Listed in: Technology

Enabling Transition From Sustainment to Engineering Within the DoD

Published: Nov. 3, 2021, 2:58 p.m.
Duration: 31 minutes 22 seconds

Listed in: Technology

The Silver Thread of Cyber in the Global Supply Chain

Published: Oct. 25, 2021, 6:56 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Measuring DevSecOps: The Way Forward

Published: Oct. 15, 2021, 2:29 p.m.
Duration: 39 minutes 32 seconds

Listed in: Technology

Bias in AI: Impact, Challenges, and Opportunities

Published: Sept. 23, 2021, 2:35 p.m.
Duration: 24 minutes 58 seconds

Listed in: Technology

My Story in Computing with Rachel Dzombak

Published: Sept. 17, 2021, 3:25 p.m.
Duration: 35 minutes 4 seconds

Listed in: Technology

Agile Strategic Planning: Concepts and Methods for Success

Published: Sept. 9, 2021, 3:50 p.m.
Duration: 29 minutes 50 seconds

Listed in: Technology

Applying Scientific Methods in Cybersecurity

Published: Aug. 24, 2021, 4:12 p.m.
Duration: 39 minutes 49 seconds

Listed in: Technology

Zero Trust Adoption: Benefits, Applications, and Resources

Published: Aug. 13, 2021, 1:38 p.m.
Duration: 30 minutes 25 seconds

Listed in: Technology

Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions

Published: Aug. 6, 2021, 12:01 p.m.
Duration: 31 minutes 40 seconds

Listed in: Technology

11 Rules for Ensuring a Security Model with AADL and BellLaPadula

Published: July 29, 2021, 2:05 p.m.
Duration: 48 minutes 5 seconds

Listed in: Technology

Benefits and Challenges of Model-Based Systems Engineering

Published: July 23, 2021, 2:53 p.m.
Duration: 33 minutes 10 seconds

Listed in: Technology

Fostering Diversity in Software Engineering

Published: July 16, 2021, 2:41 p.m.
Duration: 29 minutes 21 seconds

Listed in: Technology

Can DevSecOps Make Developers Happier?

Published: June 24, 2021, 2:01 p.m.
Duration: 41 minutes 17 seconds

Listed in: Technology

Is Your Organization Ready for AI?

Published: June 22, 2021, 8:49 p.m.
Duration: 30 minutes 20 seconds

Listed in: Technology

My Story in Computing with Marisa Midler

Published: June 11, 2021, 7:40 p.m.
Duration: 27 minutes 11 seconds

Listed in: Technology

Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems

Published: June 4, 2021, 2:44 p.m.
Duration: 40 minutes 59 seconds

Listed in: Technology

AI Workforce Development

Published: May 20, 2021, 11:30 p.m.
Duration: 35 minutes 18 seconds

Listed in: Technology

Moving from DevOps to DevSecOps

Published: May 13, 2021, 11:21 a.m.
Duration: 40 minutes 41 seconds

Listed in: Technology

My Story in Computing with David Zubrow

Published: April 29, 2021, 8:51 p.m.
Duration: 37 minutes 27 seconds

Listed in: Technology

Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs

Published: April 23, 2021, 7:08 p.m.
Duration: 13 minutes 18 seconds

Listed in: Technology

My Story in Computing with Carol Smith

Published: April 9, 2021, 2:48 p.m.
Duration: 16 minutes 41 seconds

Listed in: Technology

Digital Engineering and DevSecOps

Published: March 16, 2021, 12:55 p.m.
Duration: 30 minutes 45 seconds

Listed in: Technology

A 10-Step Framework for Managing Risk

Published: March 9, 2021, 1:48 p.m.
Duration: 30 minutes 31 seconds

Listed in: Technology

7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts

Published: Feb. 23, 2021, 3:12 p.m.
Duration: 20 minutes 23 seconds

Listed in: Technology

Ransomware: Evolution, Rise, and Response

Published: Feb. 16, 2021, 6:22 p.m.
Duration: 32 minutes 50 seconds

Listed in: Technology

VINCE: A Software Vulnerability Coordination Platform

Published: Jan. 21, 2021, 4:11 p.m.
Duration: 38 minutes 14 seconds

Listed in: Technology

Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network

Published: Jan. 6, 2021, 6:40 p.m.
Duration: 46 minutes 17 seconds

Listed in: Technology

An Introduction to CMMC Assessment Guides

Published: Dec. 8, 2020, 6:25 p.m.
Duration: 8 minutes 14 seconds

Listed in: Technology

The CMMC Level 3 Assessment Guide: A Closer Look

Published: Dec. 7, 2020, 4:11 p.m.
Duration: 13 minutes 45 seconds

Listed in: Technology

The CMMC Level 1 Assessment Guide: A Closer Look

Published: Dec. 7, 2020, 3:13 p.m.
Duration: 20 minutes 37 seconds

Listed in: Technology

Achieving Continuous Authority to Operate (ATO)

Published: Nov. 24, 2020, 11:24 p.m.
Duration: 33 minutes 29 seconds

Listed in: Technology

Challenging the Myth of the 10x Programmer

Published: Nov. 9, 2020, 3:41 p.m.
Duration: 16 minutes 51 seconds

Listed in: Technology

A Stakeholder-Specific Approach to Vulnerability Management

Published: Oct. 27, 2020, 11:43 a.m.
Duration: 37 minutes 11 seconds

Listed in: Technology

Optimizing Process Maturity in CMMC Level 5

Published: Oct. 13, 2020, 4:06 p.m.
Duration: 9 minutes 17 seconds

Listed in: Technology

Reviewing and Measuring Activities for Effectiveness in CMMC Level 4

Published: Oct. 7, 2020, 2:17 p.m.
Duration: 13 minutes 13 seconds

Listed in: Technology

Situational Awareness for Cybersecurity: Beyond the Network

Published: Sept. 30, 2020, 8:22 p.m.
Duration: 25 minutes 35 seconds

Listed in: Technology

Quantum Computing: The Quantum Advantage

Published: Sept. 17, 2020, 5:31 p.m.
Duration: 30 minutes 34 seconds

Listed in: Technology

CMMC Scoring 101

Published: Sept. 2, 2020, 7:32 p.m.
Duration: 10 minutes 52 seconds

Listed in: Technology

Developing an Effective CMMC Policy

Published: Aug. 17, 2020, 1:20 p.m.
Duration: 10 minutes 25 seconds

Listed in: Technology

The Future of Cyber: Educating the Cybersecurity Workforce

Published: Aug. 10, 2020, 2:37 p.m.
Duration: 28 minutes 10 seconds

Listed in: Technology

Documenting Process for CMMC

Published: July 30, 2020, 2:06 p.m.
Duration: 9 minutes 47 seconds

Listed in: Technology

Agile Cybersecurity

Published: July 20, 2020, 7:55 p.m.
Duration: 25 minutes 47 seconds

Listed in: Technology

CMMC Levels 1-3: Going Beyond NIST SP-171

Published: July 1, 2020, 3:22 p.m.
Duration: 12 minutes 56 seconds

Listed in: Technology

The Future of Cyber: Secure Coding

Published: June 15, 2020, 2:54 p.m.
Duration: 41 minutes 16 seconds

Listed in: Technology

Challenges to Implementing DevOps in Highly Regulated Environments

Published: May 28, 2020, 2:25 p.m.
Duration: 38 minutes 42 seconds

Listed in: Technology

The Future of Cyber: Cybercrime

Published: May 7, 2020, 4:23 p.m.
Duration: 35 minutes 3 seconds

Listed in: Technology

An Ethical AI Framework

Published: April 28, 2020, 7:49 p.m.
Duration: 15 minutes 58 seconds

Listed in: Technology

My Story in Computing: Madison Quinn Oliver

Published: April 13, 2020, 4:50 p.m.
Duration: 23 minutes 9 seconds

Listed in: Technology

The CERT Guide to Coordinated Vulnerability Disclosure

Published: March 26, 2020, 2:37 p.m.
Duration: 35 minutes 1 second

Listed in: Technology

Women in Software and Cybersecurity: Dr. April Galyardt

Published: March 11, 2020, 6:12 p.m.
Duration: 13 minutes 29 seconds

Listed in: Technology

The Future of Cyber: Security and Privacy

Published: Feb. 26, 2020, 3 p.m.
Duration: 24 minutes 57 seconds

Listed in: Technology

The Future of Cyber: Security and Resilience

Published: Feb. 14, 2020, 2:29 p.m.
Duration: 33 minutes 19 seconds

Listed in: Technology

Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools

Published: Feb. 7, 2020, 4:04 p.m.
Duration: 7 minutes 40 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Carol Woody

Published: Jan. 29, 2020, 7:58 p.m.
Duration: 25 minutes 7 seconds

Listed in: Technology

Benchmarking Organizational Incident Management Practices

Published: Dec. 17, 2019, 5:57 p.m.
Duration: 35 minutes 8 seconds

Listed in: Technology

Machine Learning in Cybersecurity: 7 Questions for Decision Makers

Published: Dec. 11, 2019, 11:01 p.m.
Duration: 27 minutes 49 seconds

Listed in: Technology

Women in Software and Cybersecurity: Kristi Roth

Published: Nov. 26, 2019, 8:02 p.m.
Duration: 18 minutes 25 seconds

Listed in: Technology

Human Factors in Software Engineering

Published: Nov. 12, 2019, 6:28 p.m.
Duration: 47 minutes 24 seconds

Listed in: Technology

Women in Software and Cybersecurity: Anita Carleton

Published: Oct. 15, 2019, 5:36 p.m.
Duration: 29 minutes 11 seconds

Listed in: Technology

Improving the Common Vulnerability Scoring System

Published: Oct. 4, 2019, 6:41 p.m.
Duration: 21 minutes 4 seconds

Listed in: Technology

Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities

Published: Oct. 1, 2019, 10:36 a.m.
Duration: 22 minutes 7 seconds

Listed in: Technology

Selecting Metrics for Software Assurance

Published: Sept. 24, 2019, 7:33 p.m.
Duration: 18 minutes 37 seconds

Listed in: Technology

AI in Humanitarian Assistance and Disaster Response

Published: Sept. 18, 2019, 3:23 p.m.
Duration: 22 minutes 16 seconds

Listed in: Technology

The AADL Error Library: 4 Families of Systems Errors

Published: Aug. 30, 2019, 2:46 p.m.
Duration: 23 minutes 33 seconds

Listed in: Technology

Women in Software and Cybersecurity: Suzanne Miller

Published: Aug. 22, 2019, 6:22 p.m.
Duration: 26 minutes 47 seconds

Listed in: Technology

Privacy in the Blockchain Era

Published: July 29, 2019, 6:13 p.m.
Duration: 28 minutes 4 seconds

Listed in: Technology

Cyber Intelligence: Best Practices and Biggest Challenges

Published: July 25, 2019, 6:32 p.m.
Duration: 35 minutes 54 seconds

Listed in: Technology

Assessing Cybersecurity Training

Published: July 12, 2019, 2:39 p.m.
Duration: 13 minutes 43 seconds

Listed in: Technology

DevOps in Highly Regulated Environments

Published: June 27, 2019, 6:47 p.m.
Duration: 40 minutes 48 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Ipek Ozkaya

Published: June 20, 2019, 3:59 p.m.
Duration: 32 minutes 24 seconds

Listed in: Technology

The Role of the Software Factory in Acquisition and Sustainment

Published: June 11, 2019, 5:24 p.m.
Duration: 25 minutes 19 seconds

Listed in: Technology

Defending Your Organization Against Business Email Compromise

Published: May 30, 2019, 8:06 p.m.
Duration: 44 minutes 24 seconds

Listed in: Technology

My Story in Computing with Dr. Eliezer Kanal

Published: May 21, 2019, 5:27 p.m.
Duration: 30 minutes 28 seconds

Listed in: Technology

Women in Software and Cybersecurity: Eileen Wrubel

Published: April 19, 2019, 7:39 p.m.
Duration: 27 minutes 29 seconds

Listed in: Technology

Managing Technical Debt: A Focus on Automation, Design, and Architecture

Published: March 21, 2019, 8:16 p.m.
Duration: 35 minutes 15 seconds

Listed in: Technology

Women in Software and Cybersecurity: Grace Lewis

Published: March 14, 2019, 8:08 p.m.
Duration: 15 minutes 32 seconds

Listed in: Technology

Women in Software and Cybersecurity: Bobbie Stempfley

Published: March 1, 2019, 6:47 p.m.
Duration: 17 minutes 9 seconds

Listed in: Technology

Women in Software and Cybersecurity: Dr. Lorrie Cranor

Published: March 1, 2019, 6:44 p.m.
Duration: 17 minutes 36 seconds

Listed in: Technology

Applying Best Practices in Network Traffic Analysis

Published: Feb. 27, 2019, 4:40 p.m.
Duration: 22 minutes 12 seconds

Listed in: Technology

10 Types of Application Security Testing Tools and How to Use Them

Published: Feb. 25, 2019, 9:07 p.m.
Duration: 20 minutes 11 seconds

Listed in: Technology

Using Test Suites for Static Analysis Alert Classifiers

Published: Feb. 18, 2019, 8:28 p.m.
Duration: 30 minutes 11 seconds

Listed in: Technology

Blockchain at CMU and Beyond

Published: Feb. 18, 2019, 8:09 p.m.
Duration: 46 minutes 29 seconds

Listed in: Technology

Leading in the Age of Artificial Intelligence

Published: Feb. 15, 2019, 3:32 p.m.
Duration: 21 minutes 47 seconds

Listed in: Technology

Deep Learning in Depth: The Future of Deep Learning

Published: Nov. 28, 2018, 5 p.m.
Duration: 6 minutes 28 seconds

Listed in: Technology

Deep Learning in Depth: Adversarial Machine Learning

Published: Nov. 27, 2018, 5 p.m.
Duration: 12 minutes 47 seconds

Listed in: Technology

System Architecture Virtual Integration: ROI on Early Discovery of Defects

Published: Nov. 15, 2018, 5 p.m.
Duration: 29 minutes 13 seconds

Listed in: Technology

Deep Learning in Depth: The Importance of Diverse Perspectives

Published: Nov. 7, 2018, 5 p.m.
Duration: 9 minutes 3 seconds

Listed in: Technology

A Technical Strategy for Cybersecurity

Published: Nov. 4, 2018, 5 p.m.
Duration: 14 minutes 51 seconds

Listed in: Technology

Best Practices for Security in Cloud Computing

Published: Oct. 26, 2018, 4 p.m.
Duration: 19 minutes 20 seconds

Listed in: Technology

Risks, Threats, and Vulnerabilities in Moving to the Cloud

Published: Oct. 22, 2018, 4 p.m.
Duration: 18 minutes 11 seconds

Listed in: Technology

Deep Learning in Depth: IARPA's Functional Map of the World Challenge

Published: Oct. 12, 2018, 4 p.m.
Duration: 12 minutes 41 seconds

Listed in: Technology

Deep Learning in Depth: Deep Learning versus Machine Learning

Published: Oct. 5, 2018, 4 p.m.
Duration: 13 minutes 11 seconds

Listed in: Technology

How to Be a Network Traffic Analyst

Published: Sept. 14, 2018, 4 p.m.
Duration: 21 minutes 10 seconds

Listed in: Technology

Workplace Violence and Insider Threat

Published: Aug. 28, 2018, 4 p.m.
Duration: 15 minutes 2 seconds

Listed in: Technology

Why Does Software Cost So Much?

Published: Aug. 2, 2018, 4 p.m.
Duration: 31 minutes 17 seconds

Listed in: Technology

Cybersecurity Engineering & Software Assurance: Opportunities & Risks

Published: July 26, 2018, 5 p.m.
Duration: 8 minutes 55 seconds

Listed in: Technology

Software Sustainment and Product Lines

Published: July 10, 2018, 5 p.m.
Duration: 28 minutes 22 seconds

Listed in: Technology

Best Practices in Cyber Intelligence

Published: June 25, 2018, 5 p.m.
Duration: 19 minutes 26 seconds

Listed in: Technology

Deep Learning in Depth: The Good, the Bad, and the Future

Published: June 7, 2018, 5 p.m.
Duration: 51 minutes 55 seconds

Listed in: Technology

The Evolving Role of the Chief Risk Officer

Published: May 24, 2018, 5 p.m.
Duration: 28 minutes 22 seconds

Listed in: Technology

Obsidian: A Safer Blockchain Programming Language

Published: May 10, 2018, 5 p.m.
Duration: 31 minutes 36 seconds

Listed in: Technology

Agile DevOps

Published: April 19, 2018, 5 p.m.
Duration: 33 minutes 11 seconds

Listed in: Technology

Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University

Published: April 5, 2018, 5 p.m.
Duration: 28 minutes 34 seconds

Listed in: Technology

Is Software Spoiling Us? Technical Innovations in the Department of Defense

Published: March 15, 2018, 5 p.m.
Duration: 21 minutes 14 seconds

Listed in: Technology

Is Software Spoiling Us? Innovations in Daily Life from Software

Published: Feb. 8, 2018, 5 p.m.
Duration: 16 minutes 44 seconds

Listed in: Technology

How Risk Management Fits into Agile & DevOps in Government

Published: Feb. 1, 2018, 5 p.m.
Duration: 34 minutes 17 seconds

Listed in: Technology

5 Best Practices for Preventing and Responding to Insider Threat

Published: Dec. 28, 2017, 5 p.m.
Duration: 11 minutes 13 seconds

Listed in: Technology

Pharos Binary Static Analysis: An Update

Published: Dec. 12, 2017, 5 p.m.
Duration: 10 minutes 3 seconds

Listed in: Technology

Positive Incentives for Reducing Insider Threat

Published: Nov. 30, 2017, 5 p.m.
Duration: 24 minutes 10 seconds

Listed in: Technology

Mission-Practical Biometrics

Published: Nov. 16, 2017, 5 p.m.
Duration: 20 minutes 33 seconds

Listed in: Technology

At Risk Emerging Technology Domains

Published: Oct. 24, 2017, 5 p.m.
Duration: 10 minutes 37 seconds

Listed in: Technology

DNS Blocking to Disrupt Malware

Published: Oct. 12, 2017, 5 p.m.
Duration: 15 minutes 5 seconds

Listed in: Technology

Best Practices: Network Border Protection

Published: Sept. 21, 2017, 5 p.m.
Duration: 24 minutes 6 seconds

Listed in: Technology

Verifying Software Assurance with IBMs Watson

Published: Sept. 7, 2017, 5 p.m.
Duration: 19 minutes 41 seconds

Listed in: Technology

The CERT Software Assurance Framework

Published: Aug. 31, 2017, 5 p.m.
Duration: 19 minutes 8 seconds

Listed in: Technology

Scaling Agile Methods

Published: Aug. 3, 2017, 5 p.m.
Duration: 24 minutes 27 seconds

Listed in: Technology

Ransomware: Best Practices for Prevention and Response

Published: July 14, 2017, 5 p.m.
Duration: 30 minutes 18 seconds

Listed in: Technology

Integrating Security in DevOps

Published: June 29, 2017, 5 p.m.
Duration: 28 minutes 50 seconds

Listed in: Technology

SEI Fellows Series: Peter Feiler

Published: June 15, 2017, 5 p.m.
Duration: 40 minutes 46 seconds

Listed in: Technology

NTP Best Practices

Published: May 25, 2017, 5 p.m.
Duration: 12 minutes 20 seconds

Listed in: Technology

Establishing Trust in Disconnected Environments

Published: May 18, 2017, 5 p.m.
Duration: 17 minutes 46 seconds

Listed in: Technology

Distributed Artificial Intelligence in Space

Published: April 20, 2017, 5 p.m.
Duration: 18 minutes 6 seconds

Listed in: Technology

Verifying Distributed Adaptive Real-Time Systems

Published: March 27, 2017, 5 p.m.
Duration: 47 minutes 2 seconds

Listed in: Technology

10 At-Risk Emerging Technologies

Published: March 23, 2017, 5 p.m.
Duration: 17 minutes 12 seconds

Listed in: Technology

Technical Debt as a Core Software Engineering Practice

Published: Feb. 27, 2017, 5 p.m.
Duration: 23 minutes 4 seconds

Listed in: Technology

DNS Best Practices

Published: Feb. 23, 2017, 5 p.m.
Duration: 27 minutes 5 seconds

Listed in: Technology

Three Roles and Three Failure Patterns of Software Architects

Published: Jan. 26, 2017, 5 p.m.
Duration: 13 minutes 35 seconds

Listed in: Technology

Security Modeling Tools

Published: Jan. 12, 2017, 5 p.m.
Duration: 23 minutes 49 seconds

Listed in: Technology

Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks

Published: Dec. 19, 2016, 5 p.m.
Duration: 33 minutes 3 seconds

Listed in: Technology

Cyber Security Engineering for Software and Systems Assurance

Published: Dec. 8, 2016, 5 p.m.
Duration: 18 minutes 12 seconds

Listed in: Technology

Moving Target Defense

Published: Nov. 30, 2016, 5 p.m.
Duration: 13 minutes 5 seconds

Listed in: Technology

Improving Cybersecurity Through Cyber Intelligence

Published: Nov. 10, 2016, 5 p.m.
Duration: 18 minutes 47 seconds

Listed in: Technology

A Requirement Specification Language for AADL

Published: Oct. 27, 2016, 5 p.m.
Duration: 30 minutes 44 seconds

Listed in: Technology

Becoming a CISO: Formal and Informal Requirements

Published: Oct. 19, 2016, 5 p.m.
Duration: 23 minutes 32 seconds

Listed in: Technology

Predicting Quality Assurance with Software Metrics and Security Methods

Published: Oct. 13, 2016, 5 p.m.
Duration: 11 minutes 24 seconds

Listed in: Technology

Network Flow and Beyond

Published: Sept. 29, 2016, 5 p.m.
Duration: 24 minutes 40 seconds

Listed in: Technology

A Community College Curriculum for Secure Software Development

Published: Sept. 15, 2016, 5 p.m.
Duration: 20 minutes 23 seconds

Listed in: Technology

Security and the Internet of Things

Published: Aug. 25, 2016, 5 p.m.
Duration: 17 minutes 9 seconds

Listed in: Technology

The SEI Fellow Series: Nancy Mead

Published: Aug. 10, 2016, 5 p.m.
Duration: 28 minutes 37 seconds

Listed in: Technology

An Open Source Tool for Fault Tree Analysis

Published: July 28, 2016, 5 p.m.
Duration: 14 minutes 19 seconds

Listed in: Technology

Global Value Chain An Expanded View of the ICT Supply Chain

Published: July 18, 2016, 5 p.m.
Duration: 30 minutes 12 seconds

Listed in: Technology

Intelligence Preparation for Operational Resilience

Published: June 21, 2016, 5 p.m.
Duration: 27 minutes

Listed in: Technology

Evolving Air Force Intelligence with Agile Techniques

Published: May 26, 2016, 5 p.m.
Duration: 17 minutes

Listed in: Technology

Threat Modeling and the Internet of Things

Published: May 12, 2016, 5 p.m.
Duration: 17 minutes 39 seconds

Listed in: Technology

Open Systems Architectures: When & Where to Be Closed

Published: April 14, 2016, 5 p.m.
Duration: 19 minutes 52 seconds

Listed in: Technology

Effective Reduction of Avoidable Complexity in Embedded Systems

Published: March 18, 2016, 5 p.m.
Duration: 18 minutes 32 seconds

Listed in: Technology

Toward Efficient and Effective Software Sustainment

Published: March 18, 2016, 5 p.m.
Duration: 23 minutes 20 seconds

Listed in: Technology

Quality Attribute Refinement and Allocation

Published: March 8, 2016, 5 p.m.
Duration: 24 minutes

Listed in: Technology

Is Java More Secure Than C?

Published: Feb. 19, 2016, 5 p.m.
Duration: 17 minutes 48 seconds

Listed in: Technology

Identifying the Architectural Roots of Vulnerabilities

Published: Feb. 4, 2016, 5 p.m.
Duration: 23 minutes 43 seconds

Listed in: Technology

Build Security In Maturity Model (BSIMM) Practices from Seventy Eight Organizations

Published: Feb. 3, 2016, 5 p.m.
Duration: 31 minutes 27 seconds

Listed in: Technology

An Interview with Grady Booch

Published: Jan. 12, 2016, 5 p.m.
Duration: 18 minutes 11 seconds

Listed in: Technology

Structuring the Chief Information Security Officer Organization

Published: Dec. 23, 2015, 5 p.m.
Duration: 31 minutes 23 seconds

Listed in: Technology

How Cyber Insurance Is Driving Risk and Technology Management

Published: Nov. 9, 2015, 5 p.m.
Duration: 21 minutes 23 seconds

Listed in: Technology

A Field Study of Technical Debt

Published: Oct. 15, 2015, 5 p.m.
Duration: 19 minutes 59 seconds

Listed in: Technology

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework

Published: Oct. 1, 2015, 5 p.m.
Duration: 23 minutes 46 seconds

Listed in: Technology

A Software Assurance Curriculum for Future Engineers

Published: Sept. 24, 2015, 5 p.m.
Duration: 19 minutes 34 seconds

Listed in: Technology

Four Types of Shift Left Testing

Published: Sept. 10, 2015, 5 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Toward Speed and Simplicity: Creating a Software Library for Graph Analytics

Published: Aug. 27, 2015, 5 p.m.
Duration: 15 minutes 37 seconds

Listed in: Technology

Capturing the Expertise of Cybersecurity Incident Handlers

Published: Aug. 27, 2015, 5 p.m.
Duration: 26 minutes 1 second

Listed in: Technology

Improving Quality Using Architecture Fault Analysis with Confidence Arguments

Published: Aug. 13, 2015, 5 p.m.
Duration: 18 minutes 2 seconds

Listed in: Technology

A Taxonomy of Testing Types

Published: July 30, 2015, 5 p.m.
Duration: 16 minutes 34 seconds

Listed in: Technology

Reducing Complexity in Software & Systems

Published: July 16, 2015, 5 p.m.
Duration: 19 minutes 5 seconds

Listed in: Technology

Designing Security Into Software-Reliant Systems

Published: June 25, 2015, 5 p.m.
Duration: 11 minutes 41 seconds

Listed in: Technology

Agile Methods in Air Force Sustainment

Published: June 11, 2015, 5 p.m.
Duration: 12 minutes 27 seconds

Listed in: Technology

Defect Prioritization With the Risk Priority Number

Published: May 28, 2015, 5 p.m.
Duration: 17 minutes 42 seconds

Listed in: Technology

SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers

Published: May 14, 2015, 5 p.m.
Duration: 20 minutes 18 seconds

Listed in: Technology

An Introduction to Context-Aware Computing

Published: April 23, 2015, 5 p.m.
Duration: 19 minutes 24 seconds

Listed in: Technology

Data Driven Software Assurance

Published: April 9, 2015, 5 p.m.
Duration: 30 minutes 14 seconds

Listed in: Technology

Applying Agile in the DoD: Twelfth Principle

Published: March 26, 2015, 5 p.m.
Duration: 12 minutes 14 seconds

Listed in: Technology

Supply Chain Risk Management: Managing Third Party and External Dependency Risk

Published: March 26, 2015, 5 p.m.
Duration: 28 minutes 9 seconds

Listed in: Technology

Introduction to the Mission Thread Workshop

Published: March 12, 2015, 5 p.m.
Duration: 23 minutes 45 seconds

Listed in: Technology

Applying Agile in the DoD: Eleventh Principle

Published: Feb. 26, 2015, 5 p.m.
Duration: 14 minutes 5 seconds

Listed in: Technology

A Workshop on Measuring What Matters

Published: Feb. 20, 2015, 5 p.m.
Duration: 30 minutes 41 seconds

Listed in: Technology

Applying Agile in the DoD: Tenth Principle

Published: Feb. 12, 2015, 5 p.m.
Duration: 13 minutes 57 seconds

Listed in: Technology

Predicting Software Assurance Using Quality and Reliability Measures

Published: Jan. 29, 2015, 5 p.m.
Duration: 19 minutes 2 seconds

Listed in: Technology

Applying Agile in the DoD: Ninth Principle

Published: Jan. 16, 2015, 5 p.m.
Duration: 17 minutes 35 seconds

Listed in: Technology

Cyber Insurance and Its Role in Mitigating Cybersecurity Risk

Published: Jan. 8, 2015, 5 p.m.
Duration: 37 minutes 26 seconds

Listed in: Technology

AADL and Dassault Aviation

Published: Dec. 18, 2014, 5 p.m.
Duration: 8 minutes 56 seconds

Listed in: Technology

Tactical Cloudlets

Published: Dec. 4, 2014, 5 p.m.
Duration: 32 minutes 28 seconds

Listed in: Technology

Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs

Published: Nov. 27, 2014, 5 p.m.
Duration: 11 minutes 46 seconds

Listed in: Technology

Coding with AADL

Published: Nov. 13, 2014, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

The State of Agile

Published: Oct. 30, 2014, 5 p.m.
Duration: 28 minutes 6 seconds

Listed in: Technology

Applying Agile in the DoD: Eighth Principle

Published: Oct. 9, 2014, 5 p.m.
Duration: 13 minutes 28 seconds

Listed in: Technology

A Taxonomy of Operational Risks for Cyber Security

Published: Oct. 7, 2014, 5 p.m.
Duration: 32 minutes 47 seconds

Listed in: Technology

Agile Metrics

Published: Sept. 25, 2014, 5 p.m.
Duration: 24 minutes 4 seconds

Listed in: Technology

Four Principles for Engineering Scalable, Big Data Systems

Published: Sept. 11, 2014, 5 p.m.
Duration: 20 minutes 12 seconds

Listed in: Technology

An Appraisal of Systems Engineering: Defense v. Non-Defense

Published: Aug. 28, 2014, 5 p.m.
Duration: 14 minutes 5 seconds

Listed in: Technology

HTML5 for Mobile Apps at the Edge

Published: Aug. 14, 2014, 5 p.m.
Duration: 20 minutes 49 seconds

Listed in: Technology

Applying Agile in the DoD: Seventh Principle

Published: July 24, 2014, 5 p.m.
Duration: 17 minutes 58 seconds

Listed in: Technology

AADL and Edgewater

Published: July 10, 2014, 5 p.m.
Duration: 8 minutes 42 seconds

Listed in: Technology

Security and Wireless Emergency Alerts

Published: June 26, 2014, 5 p.m.
Duration: 12 minutes 30 seconds

Listed in: Technology

Safety and Behavior Specification Using the Architecture Analysis and Design Language

Published: June 12, 2014, 5 p.m.
Duration: 20 minutes 40 seconds

Listed in: Technology

Applying Agile in the DoD: Sixth Principle

Published: May 29, 2014, 5 p.m.
Duration: 15 minutes

Listed in: Technology

Characterizing and Prioritizing Malicious Code

Published: May 29, 2014, 5 p.m.
Duration: 27 minutes 8 seconds

Listed in: Technology

Using Quality Attributes to Improve Acquisition

Published: May 15, 2014, 5 p.m.
Duration: 18 minutes 24 seconds

Listed in: Technology

Best Practices for Trust in the Wireless Emergency Alerts Service

Published: April 29, 2014, 5 p.m.
Duration: 21 minutes 58 seconds

Listed in: Technology

Three Variations on the V Model for System and Software Testing

Published: April 10, 2014, 5 p.m.
Duration: 21 minutes 25 seconds

Listed in: Technology

Adapting the PSP to Incorporate Verified Design by Contract

Published: March 27, 2014, 5 p.m.
Duration: 17 minutes 44 seconds

Listed in: Technology

Comparing IT Risk Assessment and Analysis Methods

Published: March 25, 2014, 5 p.m.
Duration: 37 minutes 27 seconds

Listed in: Technology

AADL and Aerospace

Published: March 13, 2014, 5 p.m.
Duration: 14 minutes 55 seconds

Listed in: Technology

Assuring Open Source Software

Published: Feb. 27, 2014, 5 p.m.
Duration: 13 minutes 38 seconds

Listed in: Technology

Security Pattern Assurance through Roundtrip Engineering

Published: Feb. 13, 2014, 5 p.m.
Duration: 16 minutes

Listed in: Technology

The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)

Published: Feb. 11, 2014, 5 p.m.
Duration: 28 minutes 50 seconds

Listed in: Technology

Applying Agile in the DoD: Fifth Principle

Published: Jan. 30, 2014, 5 p.m.
Duration: 20 minutes 53 seconds

Listed in: Technology

Software Assurance Cases

Published: Jan. 16, 2014, 5 p.m.
Duration: 19 minutes 51 seconds

Listed in: Technology

Raising the Bar - Mainstreaming CERT C Secure Coding Rules

Published: Jan. 7, 2014, 5 p.m.
Duration: 25 minutes 17 seconds

Listed in: Technology

AADL and Telecom Paris Tech

Published: Dec. 26, 2013, 5 p.m.
Duration: 10 minutes 39 seconds

Listed in: Technology

From Process to Performance-Based Improvement

Published: Dec. 12, 2013, 5 p.m.
Duration: 23 minutes 49 seconds

Listed in: Technology

An Approach to Managing the Software Engineering Challenges of Big Data

Published: Nov. 27, 2013, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience

Published: Nov. 26, 2013, 5 p.m.
Duration: 27 minutes 46 seconds

Listed in: Technology

Situational Awareness Mashups

Published: Nov. 14, 2013, 5 p.m.
Duration: 17 minutes 25 seconds

Listed in: Technology

Applying Agile in the DoD: Fourth Principle

Published: Oct. 31, 2013, 5 p.m.
Duration: 18 minutes 19 seconds

Listed in: Technology

Architecting Systems of the Future

Published: Oct. 17, 2013, 5 p.m.
Duration: 12 minutes 44 seconds

Listed in: Technology

Acquisition Archetypes

Published: Sept. 26, 2013, 5 p.m.
Duration: 18 minutes 22 seconds

Listed in: Technology

Human-in-the-Loop Autonomy

Published: Sept. 12, 2013, 5 p.m.
Duration: 22 minutes 56 seconds

Listed in: Technology

Mobile Applications for Emergency Managers

Published: Aug. 29, 2013, 5 p.m.
Duration: 10 minutes 15 seconds

Listed in: Technology

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions

Published: Aug. 27, 2013, 5 p.m.
Duration: 32 minutes 55 seconds

Listed in: Technology

Applying Agile in the DoD: Third Principle

Published: Aug. 15, 2013, 5 p.m.
Duration: 16 minutes 16 seconds

Listed in: Technology

DevOps - Transform Development and Operations for Fast, Secure Deployments

Published: July 30, 2013, 5 p.m.
Duration: 33 minutes 44 seconds

Listed in: Technology

Application Virtualization as a Strategy for Cyber Foraging

Published: July 25, 2013, 5 p.m.
Duration: 21 minutes 28 seconds

Listed in: Technology

Common Testing Problems: Pitfalls to Prevent and Mitigate

Published: July 11, 2013, 5 p.m.
Duration: 16 minutes 45 seconds

Listed in: Technology

Joint Programs and Social Dilemmas

Published: June 27, 2013, 5 p.m.
Duration: 13 minutes 19 seconds

Listed in: Technology

Applying Agile in the DoD: Second Principle

Published: June 13, 2013, 5 p.m.
Duration: 12 minutes 33 seconds

Listed in: Technology

Managing Disruptive Events - CERT-RMM Experience Reports

Published: June 11, 2013, 5 p.m.
Duration: 36 minutes 26 seconds

Listed in: Technology

Reliability Validation and Improvement Framework

Published: May 23, 2013, 5 p.m.
Duration: 13 minutes 45 seconds

Listed in: Technology

Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity

Published: May 9, 2013, 5 p.m.
Duration: 21 minutes 24 seconds

Listed in: Technology

The Business Case for Systems Engineering

Published: May 9, 2013, 5 p.m.
Duration: 25 minutes 18 seconds

Listed in: Technology

Applying Agile in the DoD: First Principle

Published: April 18, 2013, 5 p.m.
Duration: 18 minutes 36 seconds

Listed in: Technology

The Evolution of a Science Project

Published: April 4, 2013, 5 p.m.
Duration: 19 minutes 47 seconds

Listed in: Technology

Securing Mobile Devices aka BYOD

Published: March 26, 2013, 5 p.m.
Duration: 24 minutes 6 seconds

Listed in: Technology

What's New With Version 2 of the AADL Standard?

Published: March 21, 2013, 5 p.m.
Duration: 13 minutes 33 seconds

Listed in: Technology

The State of the Practice of Cyber Intelligence

Published: March 7, 2013, 5 p.m.
Duration: 17 minutes 29 seconds

Listed in: Technology

Technology Readiness Assessments

Published: Feb. 21, 2013, 5 p.m.
Duration: 15 minutes 47 seconds

Listed in: Technology

Standards in Cloud Computing Interoperability

Published: Feb. 7, 2013, 5 p.m.
Duration: 7 minutes 49 seconds

Listed in: Technology

Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk

Published: Jan. 31, 2013, 5 p.m.
Duration: 26 minutes 45 seconds

Listed in: Technology

The Latest Developments in AADL

Published: Jan. 17, 2013, 5 p.m.
Duration: 14 minutes 58 seconds

Listed in: Technology

The Fundamentals of Agile

Published: Jan. 3, 2013, 5 p.m.
Duration: 17 minutes 33 seconds

Listed in: Technology

Software for Soldiers who use Smartphones

Published: Dec. 20, 2012, 5 p.m.
Duration: 16 minutes 57 seconds

Listed in: Technology

Managing Disruptive Events: Making the Case for Operational Resilience

Published: Dec. 19, 2012, 5 p.m.
Duration: 24 minutes 26 seconds

Listed in: Technology

Architecting Service-Oriented Systems

Published: Dec. 6, 2012, 5 p.m.
Duration: 9 minutes 7 seconds

Listed in: Technology

The SEI Strategic Plan

Published: Nov. 15, 2012, 5 p.m.
Duration: 21 minutes 18 seconds

Listed in: Technology

Quantifying Uncertainty in Early Lifecycle Cost Estimation

Published: Nov. 1, 2012, 5 p.m.
Duration: 10 minutes 5 seconds

Listed in: Technology

Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities

Published: Oct. 23, 2012, 5 p.m.
Duration: 28 minutes 55 seconds

Listed in: Technology

Architecting a Financial System with TSP

Published: Oct. 18, 2012, 5 p.m.
Duration: 28 minutes 27 seconds

Listed in: Technology

The Importance of Data Quality

Published: Oct. 4, 2012, 5 p.m.
Duration: 21 minutes 20 seconds

Listed in: Technology

How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them

Published: Sept. 25, 2012, 5 p.m.
Duration: 37 minutes 39 seconds

Listed in: Technology

Misaligned Incentives

Published: Sept. 20, 2012, 5 p.m.
Duration: 15 minutes 10 seconds

Listed in: Technology

How a Disciplined Process Enhances & Enables Agility

Published: Sept. 4, 2012, 5 p.m.
Duration: 21 minutes 4 seconds

Listed in: Technology

Agile Acquisition

Published: Sept. 4, 2012, 5 p.m.
Duration: 8 minutes 59 seconds

Listed in: Technology

An Architecture-Focused Measurement Framework for Managing Technical Debt

Published: Sept. 4, 2012, 5 p.m.
Duration: 15 minutes 49 seconds

Listed in: Technology

Cloud Computing for the Battlefield

Published: Sept. 4, 2012, 5 p.m.
Duration: 9 minutes 58 seconds

Listed in: Technology

U.S. Postal Inspection Service Use of the CERT Resilience Management Model

Published: Aug. 21, 2012, 5 p.m.
Duration: 23 minutes 53 seconds

Listed in: Technology

Insights from the First CERT Resilience Management Model Users Group

Published: July 17, 2012, 5 p.m.
Duration: 26 minutes 36 seconds

Listed in: Technology

NIST Catalog of Security and Privacy Controls, Including Insider Threat

Published: April 24, 2012, 5 p.m.
Duration: 28 minutes 10 seconds

Listed in: Technology

Cisco's Adoption of CERT Secure Coding Standards

Published: Feb. 28, 2012, 5 p.m.
Duration: 24 minutes 41 seconds

Listed in: Technology

How to Become a Cyber Warrior

Published: Jan. 31, 2012, 5 p.m.
Duration: 25 minutes 35 seconds

Listed in: Technology

Considering Security and Privacy in the Move to Electronic Health Records

Published: Dec. 20, 2011, 5 p.m.
Duration: 28 minutes 27 seconds

Listed in: Technology

Measuring Operational Resilience

Published: Oct. 4, 2011, 5 p.m.
Duration: 25 minutes 32 seconds

Listed in: Technology

Why Organizations Need a Secure Domain Name System

Published: Sept. 6, 2011, 5 p.m.
Duration: 20 minutes 51 seconds

Listed in: Technology

Controls for Monitoring the Security of Cloud Services

Published: Aug. 2, 2011, 5 p.m.
Duration: 19 minutes 19 seconds

Listed in: Technology

Building a Malware Analysis Capability

Published: July 12, 2011, 5 p.m.
Duration: 24 minutes 47 seconds

Listed in: Technology

Using the Smart Grid Maturity Model (SGMM)

Published: May 5, 2011, 5 p.m.
Duration: 29 minutes 41 seconds

Listed in: Technology

Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM

Published: March 29, 2011, 5 p.m.
Duration: 28 minutes 6 seconds

Listed in: Technology

Conducting Cyber Exercises at the National Level

Published: Feb. 22, 2011, 5 p.m.
Duration: 2 minutes 31 seconds

Listed in: Technology

Indicators and Controls for Mitigating Insider Threat

Published: Jan. 25, 2011, 5 p.m.
Duration: 23 minutes 26 seconds

Listed in: Technology

How Resilient Is My Organization?

Published: Dec. 9, 2010, 5 p.m.
Duration: 39 minutes 2 seconds

Listed in: Technology

Public-Private Partnerships: Essential for National Cyber Security

Published: Nov. 30, 2010, 5 p.m.
Duration: 31 minutes 24 seconds

Listed in: Technology

Software Assurance: A Master's Level Curriculum

Published: Oct. 26, 2010, 5 p.m.
Duration: 34 minutes 37 seconds

Listed in: Technology

How to Develop More Secure Software - Practices from Thirty Organizations

Published: Sept. 28, 2010, 5 p.m.
Duration: 29 minutes 27 seconds

Listed in: Technology

Mobile Device Security: Threats, Risks, and Actions to Take

Published: Aug. 31, 2010, 5 p.m.
Duration: 26 minutes 15 seconds

Listed in: Technology

Establishing a National Computer Security Incident Response Team (CSIRT)

Published: Aug. 19, 2010, 5 p.m.
Duration: 27 minutes 56 seconds

Listed in: Technology

Securing Industrial Control Systems

Published: July 27, 2010, 5 p.m.
Duration: 23 minutes 9 seconds

Listed in: Technology

The Power of Fuzz Testing to Reduce Security Vulnerabilities

Published: May 25, 2010, 5 p.m.
Duration: 26 minutes 2 seconds

Listed in: Technology

Protect Your Business from Money Mules

Published: April 27, 2010, 5 p.m.
Duration: 19 minutes 2 seconds

Listed in: Technology

Train for the Unexpected

Published: March 3, 2010, 5 p.m.
Duration: 25 minutes 32 seconds

Listed in: Technology

The Role of the CISO in Developing More Secure Software

Published: March 2, 2010, 5 p.m.
Duration: 26 minutes 56 seconds

Listed in: Technology

Computer and Network Forensics: A Master's Level Curriculum

Published: Feb. 2, 2010, 5 p.m.
Duration: 24 minutes 46 seconds

Listed in: Technology

Introducing the Smart Grid Maturity Model (SGMM)

Published: Jan. 12, 2010, 5 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

Leveraging Security Policies and Procedures for Electronic Evidence Discovery

Published: Jan. 9, 2010, 5 p.m.
Duration: 25 minutes 45 seconds

Listed in: Technology

Integrating Privacy Practices into the Software Development Life Cycle

Published: Dec. 22, 2009, 5 p.m.
Duration: 17 minutes 28 seconds

Listed in: Technology

Using the Facts to Protect Enterprise Networks: CERT's NetSA Team

Published: Dec. 1, 2009, 5 p.m.
Duration: 22 minutes 1 second

Listed in: Technology

Ensuring Continuity of Operations When Business Is Disrupted

Published: Nov. 10, 2009, 5 p.m.
Duration: 21 minutes 23 seconds

Listed in: Technology

Managing Relationships with Business Partners to Achieve Operational Resiliency

Published: Oct. 20, 2009, 5 p.m.
Duration: 27 minutes 8 seconds

Listed in: Technology

The Smart Grid: Managing Electrical Power Distribution and Use

Published: Sept. 29, 2009, 5 p.m.
Duration: 20 minutes 16 seconds

Listed in: Technology

Electronic Health Records: Challenges for Patient Privacy and Security

Published: Sept. 8, 2009, 5 p.m.
Duration: 26 minutes 2 seconds

Listed in: Technology

Mitigating Insider Threat: New and Improved Practices

Published: Aug. 18, 2009, 5 p.m.
Duration: 36 minutes 22 seconds

Listed in: Technology

Rethinking Risk Management

Published: July 7, 2009, 5 p.m.
Duration: 29 minutes 37 seconds

Listed in: Technology

The Upside and Downside of Security in the Cloud

Published: June 16, 2009, 5 p.m.
Duration: 27 minutes 41 seconds

Listed in: Technology

More Targeted, Sophisticated Attacks: Where to Pay Attention

Published: May 26, 2009, 5 p.m.
Duration: 20 minutes 5 seconds

Listed in: Technology

Is There Value in Identifying Software Security "Never Events?"

Published: May 5, 2009, 5 p.m.
Duration: 20 minutes 22 seconds

Listed in: Technology

Cyber Security, Safety, and Ethics for the Net Generation

Published: April 14, 2009, 5 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

An Experience-Based Maturity Model for Software Security

Published: March 31, 2009, 5 p.m.
Duration: 21 minutes 49 seconds

Listed in: Technology

Mainstreaming Secure Coding Practices

Published: March 17, 2009, 5 p.m.
Duration: 20 minutes 3 seconds

Listed in: Technology

Security: A Key Enabler of Business Innovation

Published: March 3, 2009, 5 p.m.
Duration: 23 minutes 54 seconds

Listed in: Technology

Better Incident Response Through Scenario Based Training

Published: Feb. 17, 2009, 5 p.m.
Duration: 22 minutes 56 seconds

Listed in: Technology

An Alternative to Risk Management for Information and Software Security

Published: Feb. 3, 2009, 5 p.m.
Duration: 25 minutes 53 seconds

Listed in: Technology

Tackling Tough Challenges: Insights from CERTs Director Rich Pethia

Published: Jan. 20, 2009, 5 p.m.
Duration: 17 minutes 33 seconds

Listed in: Technology

Climate Change: Implications for Information Technology and Security

Published: Dec. 9, 2008, 5 p.m.
Duration: 23 minutes 45 seconds

Listed in: Technology

Using High Fidelity, Online Training to Stay Sharp

Published: Nov. 25, 2008, 5 p.m.
Duration: 26 minutes 38 seconds

Listed in: Technology

Integrating Security Incident Response and e-Discovery

Published: Nov. 11, 2008, 5 p.m.
Duration: 25 minutes 34 seconds

Listed in: Technology

Concrete Steps for Implementing an Information Security Program

Published: Oct. 28, 2008, 5 p.m.
Duration: 21 minutes 29 seconds

Listed in: Technology

Virtual Communities: Risks and Opportunities

Published: Oct. 14, 2008, 5 p.m.
Duration: 18 minutes 6 seconds

Listed in: Technology

Developing Secure Software: Universities as Supply Chain Partners

Published: Sept. 30, 2008, 5 p.m.
Duration: 23 minutes 22 seconds

Listed in: Technology

Security Risk Assessment Using OCTAVE Allegro

Published: Sept. 16, 2008, 5 p.m.
Duration: 18 minutes 10 seconds

Listed in: Technology

Getting to a Useful Set of Security Metrics

Published: Sept. 2, 2008, 5 p.m.
Duration: 18 minutes 49 seconds

Listed in: Technology

How to Start a Secure Software Development Program

Published: Aug. 20, 2008, 5 p.m.
Duration: 20 minutes 1 second

Listed in: Technology

Managing Risk to Critical Infrastructures at the National Level

Published: Aug. 5, 2008, 5 p.m.
Duration: 22 minutes 13 seconds

Listed in: Technology

Analyzing Internet Traffic for Better Cyber Situational Awareness

Published: July 28, 2008, 5 p.m.
Duration: 29 minutes 34 seconds

Listed in: Technology

Managing Security Vulnerabilities Based on What Matters Most

Published: July 22, 2008, 5 p.m.
Duration: 23 minutes 28 seconds

Listed in: Technology

Identifying Software Security Requirements Early, Not After the Fact

Published: July 8, 2008, 5 p.m.
Duration: 22 minutes 57 seconds

Listed in: Technology

Making Information Security Policy Happen

Published: June 24, 2008, 5 p.m.
Duration: 24 minutes 18 seconds

Listed in: Technology

Becoming a Smart Buyer of Software

Published: June 10, 2008, 5 p.m.
Duration: 21 minutes 11 seconds

Listed in: Technology

Building More Secure Software

Published: May 27, 2008, 5 p.m.
Duration: 16 minutes 44 seconds

Listed in: Technology

Connecting the Dots Between IT Operations and Security

Published: May 13, 2008, 5 p.m.
Duration: 24 minutes 40 seconds

Listed in: Technology

Getting in Front of Social Engineering

Published: April 29, 2008, 5 p.m.
Duration: 23 minutes 56 seconds

Listed in: Technology

Using Benchmarks to Make Better Security Decisions

Published: April 15, 2008, 5 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Protecting Information Privacy - How To and Lessons Learned

Published: April 1, 2008, 5 p.m.
Duration: 22 minutes 12 seconds

Listed in: Technology

Initiating a Security Metrics Program: Key Points to Consider

Published: March 18, 2008, 5 p.m.
Duration: 12 minutes 5 seconds

Listed in: Technology

Insider Threat and the Software Development Life Cycle

Published: March 4, 2008, 5 p.m.
Duration: 23 minutes 33 seconds

Listed in: Technology

Tackling the Growing Botnet Threat

Published: Feb. 19, 2008, 5 p.m.
Duration: 20 minutes 34 seconds

Listed in: Technology

Building a Security Metrics Program

Published: Feb. 5, 2008, 5 p.m.
Duration: 22 minutes 34 seconds

Listed in: Technology

Inadvertent Data Disclosure on Peer-to-Peer Networks

Published: Jan. 22, 2008, 5 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

Information Compliance: A Growing Challenge for Business Leaders

Published: Jan. 8, 2008, 5 p.m.
Duration: 21 minutes 54 seconds

Listed in: Technology

Internal Audit's Role in Information Security: An Introduction

Published: Dec. 10, 2007, 5 p.m.
Duration: 14 minutes 26 seconds

Listed in: Technology

What Business Leaders Can Expect from Security Degree Programs

Published: Nov. 27, 2007, 5 p.m.
Duration: 18 minutes 30 seconds

Listed in: Technology

The Path from Information Security Risk Assessment to Compliance

Published: Nov. 13, 2007, 5 p.m.
Duration: 26 minutes 18 seconds

Listed in: Technology

Computer Forensics for Business Leaders: Building Robust Policies and Processes

Published: Oct. 30, 2007, 5 p.m.
Duration: 12 minutes 22 seconds

Listed in: Technology

Business Resilience: A More Compelling Argument for Information Security

Published: Oct. 16, 2007, 5 p.m.
Duration: 24 minutes 34 seconds

Listed in: Technology

Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity

Published: Oct. 15, 2007, 5 p.m.
Duration: 18 minutes 24 seconds

Listed in: Technology

The Human Side of Security Trade-Offs

Published: Sept. 18, 2007, 5 p.m.
Duration: 27 minutes 15 seconds

Listed in: Technology

Dual Perspectives: A CIO's and CISO's Take on Security

Published: Sept. 4, 2007, 5 p.m.
Duration: 26 minutes 21 seconds

Listed in: Technology

Tackling Security at the National Level: A Resource for Leaders

Published: Aug. 7, 2007, 5 p.m.
Duration: 22 minutes 19 seconds

Listed in: Technology

Reducing Security Costs with Standard Configurations: U.S. Government Initiatives

Published: Aug. 7, 2007, 5 p.m.
Duration: 25 minutes 9 seconds

Listed in: Technology

Real-World Security for Business Leaders

Published: July 24, 2007, 5 p.m.
Duration: 20 minutes 27 seconds

Listed in: Technology

Using Standards to Build an Information Security Program

Published: July 10, 2007, 5 p.m.
Duration: 27 minutes 52 seconds

Listed in: Technology

Getting Real About Security Governance

Published: June 26, 2007, 5 p.m.
Duration: 19 minutes 24 seconds

Listed in: Technology

Convergence: Integrating Physical and IT Security

Published: June 12, 2007, 5 p.m.
Duration: 28 minutes 44 seconds

Listed in: Technology

IT Infrastructure: Tips for Navigating Tough Spots

Published: May 29, 2007, 5 p.m.
Duration: 22 minutes 34 seconds

Listed in: Technology

The Value of De-Identified Personal Data

Published: May 15, 2007, 5 p.m.
Duration: 31 minutes 25 seconds

Listed in: Technology

Adapting to Changing Risk Environments: Operational Resilience

Published: May 1, 2007, 5 p.m.
Duration: 24 minutes 45 seconds

Listed in: Technology

Computer Forensics for Business Leaders: A Primer

Published: April 17, 2007, 5 p.m.
Duration: 16 minutes 32 seconds

Listed in: Technology

The Real Secrets of Incident Management

Published: April 3, 2007, 5 p.m.
Duration: 21 minutes 17 seconds

Listed in: Technology

The Legal Side of Global Security

Published: March 20, 2007, 5 p.m.
Duration: 25 minutes 56 seconds

Listed in: Technology

A New Look at the Business of IT Education

Published: March 6, 2007, 5 p.m.
Duration: 17 minutes 52 seconds

Listed in: Technology

Crisis Communications During a Security Incident

Published: Feb. 20, 2007, 5 p.m.
Duration: 13 minutes 42 seconds

Listed in: Technology

Assuring Mission Success in Complex Environments

Published: Feb. 6, 2007, 5 p.m.
Duration: 17 minutes 49 seconds

Listed in: Technology

Privacy: The Slow Tipping Point

Published: Jan. 23, 2007, 5 p.m.
Duration: 17 minutes 42 seconds

Listed in: Technology

Building Staff Competence in Security

Published: Jan. 9, 2007, 5 p.m.
Duration: 21 minutes 56 seconds

Listed in: Technology

Inside Defense-in-Depth

Published: Dec. 19, 2006, 5 p.m.
Duration: 15 minutes 44 seconds

Listed in: Technology

Protecting Against Insider Threat

Published: Nov. 28, 2006, 5 p.m.
Duration: 27 minutes 9 seconds

Listed in: Technology

Change Management: The Security 'X' Factor

Published: Nov. 14, 2006, 5 p.m.
Duration: 18 minutes 38 seconds

Listed in: Technology

CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT

Published: Oct. 31, 2006, 5 p.m.
Duration: 23 minutes 35 seconds

Listed in: Technology

The ROI of Security

Published: Oct. 17, 2006, 5 p.m.
Duration: 21 minutes 20 seconds

Listed in: Technology

Compliance vs. Buy-in

Published: Oct. 17, 2006, 5 p.m.
Duration: 8 minutes 41 seconds

Listed in: Technology

Why Leaders Should Care About Security

Published: Oct. 17, 2006, 5 p.m.
Duration: 17 minutes 53 seconds

Listed in: Technology

Proactive Remedies for Rising Threats

Published: Oct. 17, 2006, 5 p.m.
Duration: 19 minutes 36 seconds

Listed in: Technology