Events
OCTAVE FORTE: Connecting the Board Room to Cyber Risk
Sep 19-20, 2023
Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks. To address this challenge, the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) process has been assisting...
Register
InfoSec World 2023
Sep 25-27, 2023
InfoSec World is the leading cybersecurity conference for security practitioners and executives
Register
Grace Hopper Celebration
Sep 26-29, 2023
Grace Hopper Celebration is the world's largest gathering of women technologists. It is produced by AnitaB.org and presented in partnership with ACM.
Register
Insider Threat Program Manager: Implementation and Operation
Sep 26-28, 2023
This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build...
Register
Ask Us Anything: Generative AI Edition
Sep 26, 2023
In this webcast, SEI researchers take your questions and discuss what generative AI does well and the associated risk and opportunities.
Register
Cyber Supply Chain Risk Management: No Silver Bullet
Oct 2, 2023
In this webcast, Brett Tucker renews an emphasis on using robust enterprise risk management to achieve operational resilience in the cyber supply chain.
Register
FFRDC Chief Information Officer Working Group Meeting 2023
Oct 11-12, 2023
Please join us for the Fall 2023 meeting of the FFRDC CIO Working Group hosted by the Software Engineering Institute.
Register
DevSecOps Days Washington D.C. 2023
Oct 12, 2023
Join us for DevSecOps Days Washington, D.C. 2023, a free SEI-hosted event to be held in person on October 12 in Arlington, Virginia. Learn how to integrate security into your DevOps practices and transform your DevSecOps journey. Make plans to join us now
Register
Designing Modern Service-Based Systems
Oct 17, 2023
Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers of modern service-based systems should be familiar with.
Register
Design Guidelines and Patterns for Microservices
Oct 24-27, 2023
This two-day course will give you the essential knowledge to see the microservices landscape with clarity. We will cover six guidelines for microservice designs.
Register
Zero Trust Industry Day 2023
Oct 25-26, 2023
The SEI hosts this Zero Trust Industry Day to collect information from those who develop solutions for implementing a zero trust architecture.
Register
Insider Threat Program Manager: Implementation and Operation
Oct 31-Nov 2, 2023
This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build...
Register
Advanced Topics in Incident Handling
Nov 6-9, 2023
This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding...
Register
CMU SEI Research Review 2023
Nov 8, 2023
The Research Review 2023 program spotlights recent, innovative research projects through a mix of technical presentations and conversations among CMU SEI subject matter experts and their collaborators working in sponsor, customer, & academic organizations
Register
Insider Risk Management: Measures of Effectiveness
Nov 14-16, 2023
This three-day, instructor-led course develops the skills and competencies needed to assess an organization‰s insider threat prevention, detection, and response capabilities;
Register
Insider Threat Analyst
Dec 5-7, 2023
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components...
Register
Assessing Information Security Risk Using the OCTAVE Approach
Dec 12-14, 2023
In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method.
Register
Cybersecurity Oversight for the Business Executive
Jan 17-18, 2024
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative...
Register
Insider Threat Program Manager: Implementation and Operation
Jan 23-25, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Feb 21-23, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization‰s insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Feb 27-29, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Mar 5-8, 2024
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Cybersecurity Oversight for the Business Executive
Mar 5-6, 2024
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative.
Register
Designing Modern Service-Based Systems
Mar 12, 2024
Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers of modern service-based systems should be familiar with.
Register
Design Guidelines and Patterns for Microservices
Mar 18-21, 2024
This two-day course will give you the essential knowledge to see the microservices landscape with clarity. We will cover six guidelines for microservice designs. More important, we'll look at the strategies available today to realize each design guideline
Register
Insider Threat Analyst
Mar 19-21, 2024
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Creating a Computer Security Incident Response Team
Mar 25, 2024
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability.
Register
Managing Computer Security Incident Response Teams
Mar 26-28, 2024
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team.
Register
Insider Risk Management: Measures of Effectiveness
Apr 9-11, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization‰s insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Apr 16-18, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Analyst
May 7-9, 2024
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Foundations of Incident Management
May 14-17, 2024
This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions.
Register
Insider Threat Program Manager: Implementation and Operation
Jun 26-28, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Jul 23-25, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization‰s insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Aug 6-8, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Aug 20-21, 2024
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Advanced Topics in Incident Handling
Sep 24-27, 2024
This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience...
Register
Insider Threat Program Manager: Implementation and Operation
Oct 22-24, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Oct 28-30, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization‰s insider threat prevention, detection, and response capabilities; ...
Register
OCTAVE FORTE: Connecting the Board Room to Cyber Risk
Nov 13-14, 2024
Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks....
Register
Introduction to the CERT Resilience Management Model
Dec 3-4, 2024
This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2