Events
Cybersecurity Oversight for the Business Executive
Jan 15-16, 2025
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative...
Register
Insider Threat Program Manager: Implementation and Operation
Jan 22-24, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Probing the Limits: A Workshop on Red-Teaming AI Systems
Jan 28, 2025
The SEI is working to identify best practices for red teaming AI systems relative to existing guidance on cyber red teaming.
Register
Software Architecture Design and Analysis
Feb 11-14, 2025
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Insider Risk Management: Measures of Effectiveness
Feb 19-21, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Threat Program Manager: Implementation and Operation
Feb 25-27, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Program Manager: Implementation and Operation
Mar 4-6, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Insider Threat Analyst
Mar 18-20, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Insider Threat Program Manager: Implementation and Operation
Apr 8-10, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
RSA Conference 2025
Apr 28-May 1, 2025
Meet with CERT Division staff at the SEI booth #1649
Register
Designing Modern Service-Based Systems
May 6, 2025
Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers of modern service-based systems should be familiar with.
Register
Insider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity.
Register
Design Guidelines and Patterns for Microservices
May 12-15, 2025
This two-day course will give you the essential knowledge to see the microservices landscape with clarity. We will cover six guidelines for microservice designs. More important, we'll look at the strategies available today to realize each design guideline
Register
Insider Threat Program Manager: Implementation and Operation
Jun 24-26, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Cybersecurity Oversight for the Business Executive
Jul 29-30, 2025
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative.
Register
Insider Threat Program Manager: Implementation and Operation
Aug 5-7, 2025
The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.
Register
Software Architecture Design and Analysis
Aug 12-15, 2025
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood.
Register
Insider Risk Management: Measures of Effectiveness
Oct 28, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Insider Risk Management: Measures of Effectiveness
Oct 28-30, 2025
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; ...
Register
Risk Program Development - Governance and Appetite Workshop
Nov 12-13, 2025
Organizations need an adaptableIn this course, students learn how to construct a risk management program within the three fundamental pillars of governance, appetite, a... and agile process that allow executives to have a real-time view of cyber risks....
Register
Introduction to the CERT Resilience Management Model
Dec 2-3, 2025
This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2