Events
How to Address the Problem of Poorly-Defined Requirements in Software System Design
Nov 12, 2025 ยท 1:30-2:30PM (ET)
In this webcast, Lori Flynn and Lyndsi Hughes offer a solution to the problem of poorly defined requirements in system design that can lead to software flaws, cost and time overruns, and stakeholder dissatisfaction.
RegisterInsider Threat Analyst
Dec 9-11, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterHawaii International Conference on System Sciences (HICSS)
Jan 6-9, 2026
Known worldwide as the longest-standing working scientific conference in Information Technology Management, HICSS--now in its 59th year--provides a highly interactive environment for top scholars from academia and industry to exchange ideas in various areas of information, computer, and system sciences.
Visit HICSS-59AIAA SciTech Forum 2026
Jan 6-8, 2026
The SEI will exhibit at AIAA SciTech 2026 booth number 106
Register to attendInsider Threat Program Manager: Implementation and Operation
Jan 21-23, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture Design and Analysis
Jan 26-29, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterAFCEA WEST 2026
Feb 10-12, 2026
The SEI will exhibit at AFCEA WEST 2026 booth number 817
RegisterInsider Risk Management: Measures of Effectiveness
Feb 18-20, 2026
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Threat Program Manager: Implementation and Operation
Feb 24-26, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager: Implementation and Operation
Mar 3-5, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Analyst
Mar 10-12, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterInsider Threat Program Manager: Implementation and Operation
Apr 14-16, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture: Principles and Practices
Apr 20-23, 2026
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Analyst
May 5-7, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterSoftware Architecture Design and Analysis
May 11-14, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterFoundations of Incident Management
May 12-15, 2026
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterNatCSIRT 2026
Jun 12-13, 2026
The 21st Annual Technical Meeting for CSIRTs with National Responsibility (NatCSIRT 2026) is an invitation-only meeting restricted to technical and managerial staff members of National CSIRTs. The meeting provides a forum for National CSIRTs to share information, tools, techniques, and strategies that address problems unique to CSIRTs that are responsible for a nation or economy.
RegisterInsider Threat Program Manager: Implementation and Operation
Jun 23-25, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager: Implementation and Operation
Jul 21-23, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDocumenting Software Architectures
Aug 3-6, 2026
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterInsider Threat Program Manager: Implementation and Operation
Aug 4-6, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDesigning Modern Service-Based Systems
Aug 10, 2026
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
RegisterSoftware Architecture Design and Analysis
Aug 11-14, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterDesign Guidelines and Patterns for Microservices
Aug 17-20, 2026
This course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
RegisterInsider Threat Program Manager: Implementation and Operation
Sep 15-17, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterAdvanced Topics in Incident Handling
Sep 22-25, 2026
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
RegisterAUSA Annual Meeting 2026
Oct 12-14, 2026
The SEI will exhibit at the AUSA Annual Meeting 2026 booth number 511
RegisterSoftware Architecture Design and Analysis
Oct 19-22, 2026
This course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 4th edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Threat Program Manager: Implementation and Operation
Oct 20-22, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Risk Management: Measures of Effectiveness
Oct 27-29, 2026
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Threat Program Manager: Implementation and Operation
Dec 1-3, 2026
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Analyst
Dec 8-10, 2026
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Register