Events
Insider Threat Analyst
Dec 9-11, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterHawaii International Conference on System Sciences (HICSS)
Jan 6-9, 2026
Known worldwide as the longest-standing working scientific conference in Information Technology Management, HICSS--now in its 59th year--provides a highly interactive environment for top scholars from academia and industry to exchange ideas in various areas of information, computer, and system sciences.
Visit HICSS-59AIAA SciTech Forum 2026
Jan 12-16, 2026
The SEI will exhibit at AIAA SciTech 2026 booth number 106.
Register to attendInsider Threat Program Manager: Implementation and Operation
Jan 21-23, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture Design and Analysis
Jan 26-29, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterAFCEA WEST 2026
Feb 10-12, 2026
The SEI will exhibit at AFCEA WEST 2026 booth number 817
RegisterInsider Risk Management: Measures of Effectiveness
Feb 18-20, 2026
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Threat Program Manager: Implementation and Operation
Feb 24-26, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager: Implementation and Operation
Mar 3-5, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Analyst
Mar 10-12, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterInsider Threat Program Manager: Implementation and Operation
Apr 14-16, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture: Principles and Practices
Apr 20-23, 2026
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Analyst
May 5-7, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterSoftware Architecture Design and Analysis
May 11-14, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterNatCSIRT 2026
Jun 12-13, 2026
The 21st Annual Technical Meeting for CSIRTs with National Responsibility (NatCSIRT 2026) is an invitation-only meeting restricted to technical and managerial staff members of National CSIRTs. The meeting provides a forum for National CSIRTs to share information, tools, techniques, and strategies that address problems unique to CSIRTs that are responsible for a nation or economy.
RegisterInsider Threat Program Manager: Implementation and Operation
Jun 23-25, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager: Implementation and Operation
Jul 21-23, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDocumenting Software Architectures
Aug 3-6, 2026
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterInsider Threat Program Manager: Implementation and Operation
Aug 4-6, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDesigning Modern Service-Based Systems
Aug 10, 2026
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
RegisterSoftware Architecture Design and Analysis
Aug 11-14, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterDesign Guidelines and Patterns for Microservices
Aug 17-20, 2026
This course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
RegisterInsider Threat Program Manager: Implementation and Operation
Sep 15-17, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterAUSA Annual Meeting 2026
Oct 12-14, 2026
The SEI will exhibit at the AUSA Annual Meeting 2026 booth number 511
RegisterSoftware Architecture Design and Analysis
Oct 19-22, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Threat Program Manager: Implementation and Operation
Oct 20-22, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Risk Management: Measures of Effectiveness
Oct 27-29, 2026
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Threat Program Manager: Implementation and Operation
Dec 1-3, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Analyst
Dec 8-10, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Register