Software Engineering Institute (SEI) Webcast Series

Software Engineering Institute (SEI) Webcast Series

103 episodes

Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Series is produced by SEI Communications Outreach.

Podcasts

Busting the Myths of Programmer Productivity

Published: Dec. 9, 2020, 2:26 p.m.
Duration: 54 minutes 21 seconds

Listed in: Technology

What Is Cybersecurity Engineering and Why Do I Need It?

Published: Nov. 18, 2020, 2:31 p.m.
Duration: 1 hour 2 minutes 5 seconds

Listed in: Technology

Threats for Machine Learning

Published: Oct. 7, 2020, 2:35 p.m.
Duration: 1 hour 1 minute 23 seconds

Listed in: Technology

Follow the CUI: Setting the Boundaries for Your CMMC Assessment

Published: Sept. 16, 2020, 2:17 p.m.
Duration: 45 minutes 56 seconds

Listed in: Technology

Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks?

Published: Aug. 20, 2020, 3:27 p.m.
Duration: 1 hour 1 minute 50 seconds

Listed in: Technology

Quality Attribute Concerns for Microservices at the Edge

Published: Aug. 13, 2020, 12:32 p.m.
Duration: 1 hour 1 minute 34 seconds

Listed in: Technology

Agile in Government: Go for Insight, Not Just Oversight

Published: July 16, 2020, 3:21 p.m.
Duration: 55 minutes

Listed in: Technology

Organizational Resilience in a Time of Crisis

Published: June 25, 2020, 1:45 p.m.
Duration: 59 minutes 56 seconds

Listed in: Technology

Solving Current Cyber Challenges: Academic and Industry Collaboration

Published: June 19, 2020, 1:18 p.m.
Duration: 1 hour 2 minutes 33 seconds

Listed in: Technology

Software Architecture: A Mature Discipline?

Published: June 5, 2020, 12:43 p.m.
Duration: 43 minutes 45 seconds

Listed in: Technology

A Discussion on DoD Software Advances and What’s Next from SEI

Published: May 15, 2020, 12:34 p.m.
Duration: 1 hour 31 seconds

Listed in: Technology

Top 5 Considerations Before Boarding the Container Ship

Published: May 6, 2020, 3:43 p.m.
Duration: 1 hour 4 minutes 32 seconds

Listed in: Technology

Trust, Verify & Authorize with DevSecOps

Published: April 29, 2020, 12:25 p.m.
Duration: 1 hour 2 minutes 20 seconds

Listed in: Technology

Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices

Published: April 16, 2020, 4:09 p.m.
Duration: 53 minutes 33 seconds

Listed in: Technology

The DoD’s Cybersecurity Maturity Model Certification and Process Maturity

Published: April 8, 2020, 1:26 p.m.
Duration: 21 minutes 6 seconds

Listed in: Technology

Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite

Published: April 3, 2020, 11:01 a.m.
Duration: 28 minutes 59 seconds

Listed in: Technology

At What Point Does DevSecOps Become Too Risky for the Business?

Published: April 2, 2020, 12:50 p.m.
Duration: 57 minutes 15 seconds

Listed in: Technology

Becoming a Better Software Architect

Published: April 1, 2020, 6:42 p.m.
Duration: 1 hour 2 minutes 1 second

Listed in: Technology

Designing Trustworthy AI: A User Experience (UX) Framework

Published: April 1, 2020, 6:15 p.m.
Duration: 40 minutes 56 seconds

Listed in: Technology

Cyber Hygiene: Why the Fundamentals Matter

Published: Oct. 16, 2019, 4 p.m.
Duration: 1 hour 2 minutes 13 seconds

Listed in: Technology

Insider Threats: Your Questions. Our Answers.

Published: Sept. 23, 2019, 1:44 p.m.
Duration: 1 hour 27 seconds

Listed in: Technology

What is Ransomware?

Published: Sept. 13, 2019, 12:21 p.m.
Duration: 21 minutes 11 seconds

Listed in: Technology

Deepfakes—What Can Really Be Done Today?

Published: Aug. 30, 2019, 11:58 a.m.
Duration: 12 minutes 13 seconds

Listed in: Technology

Artificial Intelligence and Machine Learning – Hype vs Reality

Published: Aug. 22, 2019, 1:29 p.m.
Duration: 21 minutes 27 seconds

Listed in: Technology

Defending Your Computer Network from DNS Hijacking

Published: Aug. 21, 2019, 12:26 p.m.
Duration: 13 minutes 43 seconds

Listed in: Technology

Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them

Published: July 17, 2019, 4 p.m.
Duration: 56 minutes 52 seconds

Listed in: Technology

Secure Your Code with AI and NLP

Published: June 6, 2019, 12:21 p.m.
Duration: 58 minutes 39 seconds

Listed in: Technology

DevSecOps Implementation in the DoD: Barriers and Enablers

Published: April 17, 2019, 4 p.m.
Duration: 1 hour 1 minute 29 seconds

Listed in: Technology

What Makes a Good Software Architect (2019 Edition)?

Published: April 10, 2019, 12:55 p.m.
Duration: 1 hour 1 minute

Listed in: Technology

Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator

Published: March 18, 2019, 2:28 p.m.
Duration: 1 hour 2 minutes 12 seconds

Listed in: Technology

Improve Your Static Analysis Audits Using CERT SCALe

Published: Dec. 20, 2018, 3:05 p.m.
Duration: 1 hour 53 seconds

Listed in: Technology

Digital Footprints: What Can be Learned from the Traces We Leave on Social Networks

Published: Nov. 1, 2018, 2:45 p.m.
Duration: 1 hour 3 minutes 48 seconds

Listed in: Technology

Blockchain: Your Questions. Our Answers.

Published: Nov. 1, 2018, 1:57 p.m.
Duration: 1 hour 1 minute 26 seconds

Listed in: Technology

Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

Published: Sept. 25, 2018, 4 p.m.
Duration: 57 minutes 11 seconds

Listed in: Technology

Illicit Cyber Activity Involving Fraud

Published: Sept. 25, 2018, 4 p.m.
Duration: 45 minutes 33 seconds

Listed in: Technology

Overview of the CERT® Resilience Management Model (CERT®-RMM)

Published: Sept. 24, 2018, 4 p.m.
Duration: 28 minutes 33 seconds

Listed in: Technology

Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape

Published: Sept. 24, 2018, 4 p.m.
Duration: 29 minutes 45 seconds

Listed in: Technology

United States Postal Inspection Service (USPIS)

Published: Sept. 24, 2018, 4 p.m.
Duration: 42 minutes 56 seconds

Listed in: Technology

Department of Homeland Security Cyber Resilience Review (Case Study)

Published: Sept. 24, 2018, 4 p.m.
Duration: 28 minutes 42 seconds

Listed in: Technology

How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate

Published: Sept. 24, 2018, 4 p.m.
Duration: 1 hour 4 minutes 38 seconds

Listed in: Technology

20+ Years of Cyber (in)Security

Published: Sept. 24, 2018, 4 p.m.
Duration: 37 minutes 2 seconds

Listed in: Technology

Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

Published: Sept. 24, 2018, 4 p.m.
Duration: 46 minutes 27 seconds

Listed in: Technology

ABCs of Operational Resilience

Published: Sept. 18, 2018, 4 p.m.
Duration: 54 minutes 39 seconds

Listed in: Technology

Security Practitioner Perspective on DevOps for Building Secure Solutions

Published: Sept. 18, 2018, 4 p.m.
Duration: 57 minutes 12 seconds

Listed in: Technology

Next Steps with Blockchain Technology

Published: Sept. 5, 2018, 4 p.m.
Duration: 1 hour 1 minute 26 seconds

Listed in: Technology

Five Ways to Boost Cybersecurity with DevOps

Published: March 23, 2018, 4 p.m.
Duration: 1 hour 6 minutes 13 seconds

Listed in: Technology

Three Software Innovations that DoD Needs Now

Published: March 9, 2018, 2:35 p.m.
Duration: 1 hour 2 minutes 47 seconds

Listed in: Technology

Agile and DevOps: Your Questions. Our Answers.

Published: March 2, 2018, 4:15 p.m.
Duration: 36 minutes 23 seconds

Listed in: Technology

Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability

Published: Nov. 28, 2017, 12:56 p.m.
Duration: 1 hour 6 minutes 7 seconds

Listed in: Technology

Is Software Spoiling Us?

Published: Nov. 20, 2017, 7:20 p.m.
Duration: 1 hour 56 seconds

Listed in: Technology

Four Valuable Data Sources for Network Security Analytics

Published: Oct. 5, 2017, 5:35 p.m.
Duration: 46 minutes 57 seconds

Listed in: Technology

Three Secrets to Successful Agile Metrics

Published: Sept. 11, 2017, 4 a.m.
Duration: 1 hour 24 minutes 16 seconds

Listed in: Technology

Five Keys to Effective Agile Test Automation for Government Programs

Published: Aug. 25, 2017, 5:19 p.m.
Duration: 1 hour 29 minutes 54 seconds

Listed in: Technology

The Evolving Role of the Chief Risk Officer

Published: Aug. 25, 2017, 3:34 p.m.
Duration: 1 hour 4 minutes 55 seconds

Listed in: Technology

Practical Considerations in Adopting Agile-Lean in Government Settings

Published: July 5, 2017, 4 a.m.
Duration: 1 hour 1 minute 12 seconds

Listed in: Technology

Building Analytics for Network Flow Records

Published: May 1, 2017, 4 a.m.
Duration: 59 minutes 5 seconds

Listed in: Technology

5 Things You Need to Know About Leading a Successful Large IT Modernization Project

Published: March 6, 2017, 5 a.m.
Duration: 59 minutes 59 seconds

Listed in: Technology

Building and Scaling a Malware Analysis System

Published: Jan. 19, 2017, 6:16 p.m.
Duration: 1 hour 2 minutes 28 seconds

Listed in: Technology

How to Reduce the Graveyard of Software Tools with UI/UX Capability

Published: Jan. 19, 2017, 6 p.m.
Duration: 1 hour 4 minutes 57 seconds

Listed in: Technology

From Secure Coding to Secure Software

Published: Nov. 11, 2016, 3:32 p.m.
Duration: 1 hour 4 minutes 20 seconds

Listed in: Technology

Data Science: What It Is and How It Can Help Your Company

Published: Aug. 15, 2016, 5:59 p.m.
Duration: 1 hour 1 minute 53 seconds

Listed in: Technology

Secure Coding Best Practices

Published: Aug. 1, 2016, 1:42 a.m.
Duration: 31 minutes 14 seconds

Listed in: Technology

Security Requirements Engineering

Published: Aug. 1, 2016, 1:41 a.m.
Duration: 36 minutes 45 seconds

Listed in: Technology

Continuous Integration (Secure DevOps)

Published: Aug. 1, 2016, 1:36 a.m.
Duration: 30 minutes 40 seconds

Listed in: Technology

Coordinated Vulnerability Disclosure

Published: Aug. 1, 2016, 1:12 a.m.
Duration: 30 minutes 54 seconds

Listed in: Technology

Secure Software Development Landscape

Published: July 30, 2016, 12:28 a.m.
Duration: 45 minutes 44 seconds

Listed in: Technology

What Makes a Good Software Architect?

Published: June 2, 2016, 2:56 p.m.
Duration: 1 hour 29 minutes 2 seconds

Listed in: Technology

Intelligence Preparation for Operational Resilience

Published: April 29, 2016, 3:23 p.m.
Duration: 1 hour 58 seconds

Listed in: Technology

Structuring the Chief Information Security Officer Organization

Published: April 20, 2016, 4 p.m.
Duration: 1 hour 2 minutes 52 seconds

Listed in: Technology

Context Enabled Computing

Published: April 1, 2016, 1:13 p.m.
Duration: 1 hour 1 minute 36 seconds

Listed in: Technology

Using Network Flow to Gain Cyber Situational Awareness

Published: April 1, 2016, 1:05 p.m.
Duration: 1 hour 14 seconds

Listed in: Technology

DevOps Security: Ignore It As Much As You Would Ignore Regular Security

Published: Jan. 28, 2016, 12:51 p.m.
Duration: 1 hour 3 minutes 47 seconds

Listed in: Technology

A Taxonomy of Testing Types

Published: Jan. 28, 2016, 12:40 p.m.
Duration: 1 hour 3 minutes 59 seconds

Listed in: Technology

Cyber-Vulnerabilities in Aviation Today

Published: Dec. 16, 2015, 7:18 p.m.
Duration: 28 minutes 39 seconds

Listed in: Technology

Web Traffic Analysis with CERT Tapioca

Published: Dec. 16, 2015, 7:16 p.m.
Duration: 46 minutes 12 seconds

Listed in: Technology

Finding Related Malware Samples Using Run-Time Features

Published: Dec. 16, 2015, 7:13 p.m.
Duration: 42 minutes 48 seconds

Listed in: Technology

Enhancing Mobile Device Security

Published: Dec. 16, 2015, 7:12 p.m.
Duration: 45 minutes 31 seconds

Listed in: Technology

CERT® Alignment with Cyber COI Challenges and Gaps

Published: Dec. 16, 2015, 7:07 p.m.
Duration: 29 minutes 59 seconds

Listed in: Technology

Resilience Panel Discussion

Published: Dec. 16, 2015, 7:02 p.m.
Duration: 31 minutes 41 seconds

Listed in: Technology

Generalized Automated Cyber-Readiness Evaluator (ACE)

Published: Dec. 16, 2015, 6:49 p.m.
Duration: 39 minutes 3 seconds

Listed in: Technology

Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps

Published: Dec. 16, 2015, 6:39 p.m.
Duration: 42 minutes 34 seconds

Listed in: Technology

DevOps Panel Discussion

Published: Dec. 10, 2015, 5 p.m.
Duration: 25 minutes 54 seconds

Listed in: Technology

Culture Shock: Unlocking DevOps with Collaboration and Communication

Published: Aug. 27, 2015, 2:09 p.m.
Duration: 1 hour 2 minutes 49 seconds

Listed in: Technology

What DevOps Is Not!

Published: Aug. 7, 2015, 2 p.m.
Duration: 1 hour 4 minutes 12 seconds

Listed in: Technology

Approaching Security from an "Architecture First" Perspective

Published: May 5, 2015, 12:12 p.m.
Duration: 45 minutes 31 seconds

Listed in: Technology

Trends and New Directions in Software Architecture May 4, 2015

Published: May 5, 2015, 11:26 a.m.
Duration: 45 minutes 25 seconds

Listed in: Technology

Advancing Cyber Intelligence Practices Through the SEI's Consortium

Published: Feb. 20, 2015, 1:50 p.m.
Duration: 1 hour 59 seconds

Listed in: Technology

Tactical Cloudlets: Moving Cloud Computing to the Edge

Published: Feb. 2, 2015, 1:38 p.m.
Duration: 58 minutes 48 seconds

Listed in: Technology

Lessons in External Dependency and Supply Chain Risk Management

Published: Jan. 5, 2015, 6:14 p.m.
Duration: 1 hour 27 minutes 53 seconds

Listed in: Technology

Risk Priority Number (RPN) – A Method for Software Defect Report Analysis

Published: Jan. 5, 2015, 6:06 p.m.
Duration: 55 minutes 21 seconds

Listed in: Technology

Architecture Analysis with AADL

Published: Nov. 14, 2014, 2:42 p.m.
Duration: 1 hour 3 minutes 5 seconds

Listed in: Technology

Taking Advantage of Agile while Minimizing Risk

Published: Nov. 13, 2014, 2:14 p.m.
Duration: 43 minutes 46 seconds

Listed in: Technology

Heartbleed: Analysis, Thoughts, and Actions

Published: Nov. 13, 2014, 2:06 p.m.
Duration: 1 hour 31 minutes 52 seconds

Listed in: Technology

Why Should Government Care about Technical Debt and Software Architecture?

Published: Oct. 6, 2014, 2:57 p.m.
Duration: 26 minutes 57 seconds

Listed in: Technology

When Measurement Benefits the Measured

Published: Oct. 6, 2014, 2:19 p.m.
Duration: 58 minutes

Listed in: Technology

Overview of the Threat Posed by Insiders to Critical Assets

Published: Oct. 6, 2014, 1:51 p.m.
Duration: 50 minutes 20 seconds

Listed in: Technology

Software Architecture for Big Data Systems

Published: Oct. 3, 2014, 4 a.m.
Duration: 54 minutes 34 seconds

Listed in: Technology

Architectural Implications of DevOps

Published: Oct. 1, 2014, 2:41 p.m.
Duration: 57 minutes 17 seconds

Listed in: Technology

CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin

Published: Oct. 1, 2014, 4 a.m.
Duration: 56 minutes 56 seconds

Listed in: Technology

Best Practices and Controls for Mitigating Insider Threats

Published: Nov. 7, 2013, 5 p.m.
Duration: 49 minutes 38 seconds

Listed in: Technology

Responding to a Large-Scale Cybersecurity Incident

Published: Sept. 18, 2013, 4 p.m.
Duration: 1 hour 1 minute 46 seconds

Listed in: Technology

Achieving Mission Assurance Through Resilience Management

Published: Aug. 21, 2013, 4 p.m.
Duration: 58 minutes 20 seconds

Listed in: Technology

Observations of Successful Cyber Security Operations

Published: Aug. 15, 2013, 4 p.m.
Duration: 59 minutes 56 seconds

Listed in: Technology