Events
Connecting Stakeholders for DoD Software Systems
Nov 16, 2023
In this webcast, we highlight how the upcoming DoD Weapon Systems Software Summit will play a pivotal role in creating effective solutions for securely delivering robust software capabilities on time and on budget.
Register
Insider Threat Analyst
Dec 5-7, 2023
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components...
Register
How Do You Know When You Need a Systems Engineer?
Jan 10, 2024
In this webcast, Suz Miller, Jeannine Siviy and Dr. John Wood discuss when and how to introduce fit-for-use systems engineering capability to ensure project success and business value.
Register
Cybersecurity Oversight for the Business Executive
Jan 17-18, 2024
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative...
Register
Insider Threat Program Manager: Implementation and Operation
Jan 23-25, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Feb 20-22, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Feb 27-29, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Supply Chain Risk Management Symposium 2024
Feb 28, 2024
Building Confidence and Trust. New Date Announced! Wednesday, February 28, 2024
Register
Software Architecture Design and Analysis
Mar 5-8, 2024
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Cybersecurity Oversight for the Business Executive
Mar 5-6, 2024
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative.
Register
Designing Modern Service-Based Systems
Mar 12, 2024
Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers of modern service-based systems should be familiar with.
Register
Zero Trust Industry Day 2024
Mar 13-14, 2024
The SEI hosts this Zero Trust Industry Day to collect information from those who develop solutions for implementing a zero trust architecture.
Register
Design Guidelines and Patterns for Microservices
Mar 18-21, 2024
This two-day course will give you the essential knowledge to see the microservices landscape with clarity. We will cover six guidelines for microservice designs. More important, we'll look at the strategies available today to realize each design guideline
Register
Insider Threat Analyst
Mar 19-21, 2024
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Creating a Computer Security Incident Response Team
Mar 25, 2024
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability.
Register
Managing Computer Security Incident Response Teams
Mar 26-28, 2024
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team.
Register
Insider Risk Management: Measures of Effectiveness
Apr 9-11, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Apr 16-18, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Analyst
May 7-9, 2024
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Foundations of Incident Management
May 14-17, 2024
This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions.
Register
Insider Threat Program Manager: Implementation and Operation
Jun 25-27, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Jul 23-25, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Aug 6-8, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Aug 20-21, 2024
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Advanced Topics in Incident Handling
Sep 24-27, 2024
This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience...
Register
Insider Threat Program Manager: Implementation and Operation
Oct 22-24, 2024
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Risk Management: Measures of Effectiveness
Oct 29-31, 2024
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
OCTAVE FORTE: Connecting the Board Room to Cyber Risk
Nov 13-14, 2024
Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks....
Register
Introduction to the CERT Resilience Management Model
Dec 3-4, 2024
This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2