Events
27th Annual Systems & Mission Engineering Conference
Oct 28-31, 2024
Visit the SEI booth at this event
Register
Insider Risk Management: Measures of Effectiveness
Oct 29-31, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Cyber Challenges in Health Care: Managing for Operational Resilience
Oct 30, 2024
In this webcast, Matthew Butkovic and Darrell Keeling will explore approaches to maximize return on cybersecurity investment in the health-care context.
Register
CMU SEI Research Review 2024
Nov 13, 2024
The Research Review 2024 program spotlights recent, innovative research projects through a mix of technical presentations and conversations among CMU SEI subject matter experts and their collaborators working in sponsor, customer, & academic organizations
Register
SBOM Harmonization Plugfest 2024
Nov 19, 2024
investigate and understand how various tools may generate different SBOMs for the same software
Register
Cybersecurity Oversight for the Business Executive
Jan 15-16, 2025
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative...
Register
Insider Threat Program Manager: Implementation and Operation
Jan 22-24, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Feb 11-14, 2025
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Insider Risk Management: Measures of Effectiveness
Feb 19-21, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Feb 25-27, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Program Manager: Implementation and Operation
Mar 4-6, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Analyst
Mar 18-20, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Insider Threat Program Manager: Implementation and Operation
Apr 8-10, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
RSA Conference 2025
Apr 28-May 1, 2025
Meet with CERT Division staff at the SEI booth #1649
Register
Insider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Designing Modern Service-Based Systems
May 6, 2025
Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers of modern service-based systems should be familiar with.
Register
Design Guidelines and Patterns for Microservices
May 12-15, 2025
This two-day course will give you the essential knowledge to see the microservices landscape with clarity. We will cover six guidelines for microservice designs. More important, we'll look at the strategies available today to realize each design guideline
Register
Insider Threat Program Manager: Implementation and Operation
Jun 24-26, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Cybersecurity Oversight for the Business Executive
Jul 29-30, 2025
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative.
Register
Insider Threat Program Manager: Implementation and Operation
Aug 5-7, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Aug 12-15, 2025
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Insider Risk Management: Measures of Effectiveness
Oct 28, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Risk Management: Measures of Effectiveness
Oct 28-30, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Risk Program Development - Governance and Appetite Workshop
Nov 12-13, 2025
Organizations need an adaptableIn this course, students learn how to construct a risk management program within the three fundamental pillars of governance, appetite, a... and agile process that allow executives to have a real-time view of cyber risks....
Register
Introduction to the CERT Resilience Management Model
Dec 2-3, 2025
This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2