Webinars
Stay informed of the latest research and solutions to software engineering, cybersecurity, and AI engineering problems with SEI webinars. Whether you're interested in DevOps, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webinar series has you covered.
-
Top 5 Challenges to Overcome on Your DevSecOps Journey
May 2023 Webinar
Hasan YasarJoseph D. Yankel
In this webcast, Hasan Yasar and Joe Yankel discuss the top 5 challenges and barriers to implementing DevSecOps practices.
Watch -
Improving Analytics Using Enriched Network Flow Data
April 2023 Webinar
Timothy J. ShimeallKatherine Prevost
In this webcast, Tim Shimeall and Katherine Prevost discuss how to use IPFIX-formatted data with detail derived from deep packet inspection (DPI) to provide increased confidence in identifying behavior.
Watch -
How Can Data Science Solve Cybersecurity Challenges?
March 2023 Webinar
In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges.
Watch -
AI Next Generation Architecture
March 2023 Webinar
Michael Mattarock
During this webcast, Mike Mattarock discusses some of the primary quality attributes guiding design, and how a Next Generation Architecture can facilitate an integrated future state.
Watch -
Addressing Supply Chain Risk and Resilience for Software-Reliant Systems
February 2023 Webinar
Carol Woody, PhDCharles M. Wallen
In this webcast, Carol Woody and Charles Wallen discuss the Acquisition Security Framework (ASF) and how the ASF provides a roadmap to help organizations build security and resilience into a system.
Watch -
Does your DevSecOps Pipeline only Function as Intended?
January 2023 Webinar
Timothy A. Chick
In this webcast, Tim Chick discusses how using Model Based Systems Engineering, a DevSecOps model can be built.
Watch -
Finding Your Way with Software Engineering Buzzwords
November 2022 Webinar
Hasan Yasar
In this webcast, Hasan Yasar discusses the new technologies and buzzwords that are required to implement a complete software delivery pipeline.
Watch -
Infrastructure as Code Through Ansible
November 2022 Webinar
Matthew Heckathorn
In this webcast, Matthew Heckathorn discusses how Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning of IT infrastructure.
Watch -
Applying the Principles of Agile to Strengthen the Federal Cyber Workforce
October 2022 Webinar
Josh Hammerstein
In this webcast, Josh Hammerstein discusses how to use principles and concepts from Agile development to help cyber workforce development initiatives remain adaptable.
Watch -
Ransomware: Defense and Resilience Strategies
October 2022 Webinar
Brett Tucker
In this webcast, Brett Tucker will discuss a novel means for assessing an organization to determine its susceptibility to ransomware.
Watch -
Using Open Source to Shrink the Cyber Workforce Gap
October 2022 Webinar
Matt Kaar
In this webcast, Matt Kaar and Jarrett Booz discuss open source initiatives that bring innovative ideas to cybersecurity modeling and simulation.
Watch -
Exploring an AI Engineering Body of Knowledge
September 2022 Webinar
Carol J. SmithMichael Mattarock
In this webcast, Carol Smith, Carrie Gardner, and Michael Mattarock discuss maturing artificial intelligence (AI) practices based on the current body of knowledge from the AI Division.
Watch -
What are Deepfakes, and How Can We Detect Them?
August 2022 Webinar
In this webcast, Shannon Gallagher and Dominic Ross discuss deepfakes, and what makes them distinguishable as fake for people and computers.
Watch -
Adapting Agile and DevSecOps to Improve Non-Software Development Teams
July 2022 Webinar
Lyndsi A. HughesDavid Sweeney
In this webcast, Lyndsi Hughes and David Sweeney share their experiences applying Agile and DevSecOps practices in atypical ways.
Watch -
Predictable Use of Multicore in the Army and Beyond
May 2022 Webinar
Björn AnderssonDionisio de Niz
In this webcast, SEI staff members Bjorn Andersson, PhD, Dionisio de Niz, PhD, and William Vance of the U.S. Army Combat Capabilities Development Command Aviation & Missile Center will discuss using real-time software on multicore processors.
Watch -
Developing Models to Support DoD Technical Reviews
April 2022 Webinar
Julie B. CohenRobert WojcikLinda Parker Gates
In this webcast, Julie Cohen, Rob Wojcik and Linda Parker Gates discuss guidelines that contractors can use to develop models to support System Engineering Technical Reviews.
Watch -
Ask Us Anything: Zero Trust Edition
March 2022 Webinar
Greg Touhill
In this webcast, SEI CERT Division Director Greg Touhill, and Dr. Chase Cunningham, chief strategy officer at Ericom Software, answered questions and discussed what you need to implement a Zero Trust strategy.
Watch -
Acquisition Disasters? Ideas For Reducing Acquisition Risk
March 2022 Webinar
Alfred SchenkerLinda Parker Gates
In this webcast, Fred Schenker and Linda Parker Gates discuss the status quo, alternative approaches, and how the community of Cyber Physical System acquirers and suppliers can improve.
Watch -
A Cybersecurity Engineering Strategy for DevSecOps
October 2021 Webinar
Carol Woody, PhD
In this webcast, Carol Woody presents a strategy for cybersecurity engineering in DevSecOps environments.
Watch -
CRO Success Factors in the Age of COVID
October 2021 Webinar
Brett Tucker
In this webcast, Brett Tucker, Ryan Zanin, and Abid Adam discuss the critical factors for risk executives to be successful to not only protect critical assets but also to take advantage of new opportunities created via the pandemic.
Watch -
Zero Trust Journey
October 2021 Webinar
Geoffrey T. SandersTimothy Morrow
In this webcast, Geoffrey Sanders and Tim Morrow discuss the purpose of and how to think about Zero Trust Architecture transition.
Watch -
The Future of AI: Scaling AI Through AI Engineering
September 2021 Webinar
Matt Gaston
Dr. Matt Gaston, Director of the SEI AI Division interviews Dr. Steve Chien and Dr. Jane Pinelis on scaling AI.
Watch -
AI Engineering: Ask Us Anything About Building AI Better
September 2021 Webinar
Matt GastonRachel Dzombak
In this webcast, Rachel Dzombak and Matt Gaston take your questions and discuss what is needed to create, deploy, and maintain AI systems we can trust.
Watch -
Balanced Approaches to Insider Risk Management
September 2021 Webinar
Randall F. TrzeciakDaniel L. Costa
In this webcast, Randy Trzeciak and Dan Costa provide an overview of the ongoing research in this area, and answer questions about how the threat landscape continues to evolve, and what organizations can and should do to address insider threats.
Watch -
Software Development Open Forum: Ask Hasan Anything!
June 2021 Webinar
Hasan Yasar
Hasan Yasar answers attendee questions on the software development lifecycle, DevSecOps, SBOM, career training, and the DoD Enterprise DevSecOps Initiative.
Watch -
Software Supply Chain Concerns for DevSecOps Programs
May 2021 Webinar
Aaron K. ReffettRichard Laughlin
In this webcast, Aaron Reffett and Richard Laughlin explore the important architectural aspects of DevSecOps that are impacted by the software supply chain.
Watch -
How Do We Teach Cybersecurity?
May 2021 Webinar
Rotem D. GuttmanJosh Hammerstein
Rotem Guttman shares the lessons he's learned over a decade of developing engaging, immersive training and evaluation environments.
Watch -
How I Learned to Stop Worrying and Love SLAs
May 2021 Webinar
Matthew J. Butkovic
In this webcast, Matt Butkovic and Alan Levine discuss how cybersecurity SLAs are vital to the success of third-party relationships and a core component of sound governance.
Watch -
Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems
April 2021 Webinar
Hasan Yasar
In this webcast, our panel discusses personal experience applying DevOps principles and practices in organizations.
Watch -
AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI
April 2021 Webinar
Rachel DzombakMatt GastonFrank Redner
In this webcast, Rachel Dzombak, Matt Gaston and Frank Redner discuss the national initiative for human-centered, robust and secure, and scalable AI.
Watch -
Amplifying Your Privacy Program: Strategies for Success
March 2021 Webinar
Daniel L. CostaCarrie Gardner
In this webcast, Dan Costa and Carrie Gardner highlight best practices for privacy program planning and implementation.
Watch -
DevOps Enables Digital Engineering
March 2021 Webinar
Hasan YasarDavid James Shepard
In this webcast, Hasan Yasar and David Shepard introduce the relatively new concept of Digital Engineering and how they believe DevOps complements/enables Digital Engineering.
Watch -
Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency
March 2021 Webinar
Joseph D. YankelAaron K. ReffettNataliya Shevchenko
In this webcast, we discuss why an authoritative reference, or Platform Independent Model, is needed to design an integrated DevDevSecOps strategy.
Watch -
SolarWinds Hack: Fallout, Recovery, and Prevention
February 2021 Webinar
Matthew J. ButkovicArt Manion
The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains.
Watch -
Software Engineering for Machine Learning
January 2021 Webinar
Grace LewisIpek Ozkaya
In this webcast, Grace Lewis provides perspectives involved in the development and operation of ML systems.
Watch -
Busting the Myths of Programmer Productivity
December 2020 Webinar
William Nichols
Are the great programmers really 10 times faster than the rest? What does this difference in productivity even mean?
Watch -
What Is Cybersecurity Engineering and Why Do I Need It?
November 2020 Webinar
Carol Woody, PhDRita C. Creel
In this webcast, Carol Woody and Rita Creel discuss how cybersecurity engineering knowledge, methods, and tools throughout the lifecycle of software-intensive systems will reduce their inherent cyber risk and increase their operational cyber resilience.
Watch -
Threats for Machine Learning
October 2020 Webinar
Mark Sherman
Mark Sherman explains where machine learning applications can be attacked, the means for carrying out the attack and some mitigations you can use.
Watch -
Follow the CUI: Setting the Boundaries for Your CMMC Assessment 1.0 (CMMC 1.0)
September 2020 Webinar
Matthew TrevorsGavin Jurecko
In this webcast, Model Architects Gavin Jurecko and Matt Trevors reviewed several steps for identifying CUI exposure in terms of their critical services and the assets that support them.
Watch -
Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks?
August 2020 Webinar
Brett TuckerMatthew J. Butkovic
In this webcast, Brett Tucker and Matthew Butkovic discuss the OCTAVE FORTE process. Attendees learned about the fundamental steps of the process and how they might apply them in their own organization.
Watch -
Quality Attribute Concerns for Microservices at the Edge
August 2020 Webinar
Marc NovakouskiGrace Lewis
In this webcast, Marc Novakouski and Grace Lewis reviewed characteristics of edge environments with a focus on architectural qualities.
Watch -
Agile in Government: Go for Insight, Not Just Oversight
July 2020 Webinar
Suzanne Miller
This webcast provided practical insights into how a Government Program Office can productively engage with a contractor using Agile and Lean methods.
Watch -
Organizational Resilience in a Time of Crisis
June 2020 Webinar
Matthew J. ButkovicRoberta (Bobbie) Stempfley
An organization can demonstrate operational resilience, when faced with both cyber and physical disruptions, if it focuses on the fundamentals and makes data-driven risk decisions.
Watch -
Solving Current Cyber Challenges: Academic and Industry Collaboration
June 2020 Webinar
Timothy J. ShimeallTimur D. Snoke
The chasm between what academia researches and what industry uses in cyber is wide. By building mutually beneficial collaborations between the two, we can improve algorithms, datasets and techniques that are applicable to the real-world.
Watch -
A Discussion on DoD Software Advances and What’s Next from SEI
May 2020 Webinar
Thomas A. LongstaffJeff Boleng
SEI Chief Technology Officer Tom Longstaff interviewed Jeff Boleng, a senior advisor to the U.S. Department of Defense, on recent DoD software advances and accomplishments.
Watch -
Top 5 Considerations Before Boarding the Container Ship
May 2020 Webinar
Aaron VolkmannDavid James Shepard
In this webcast, David Shepard and Aaron Volkmann discussed some of the potential pitfalls of using containers and provide some food for thought to software teams considering embarking on a journey to containers.
Watch -
Trust, Verify & Authorize with DevSecOps
April 2020 Webinar
Hasan Yasar
Hasan Yasar and Eric Bram discussed how the continuous aspect of communication and collaboration among developers and information security teams reinforces core DevOps principles.
Watch -
Adopting a DevSecOps Culture in the DoD
April 2020 Webinar
Jeffrey HamedShane Ficorilli
In this webcast, Jeffrey Hamed and Shane Ficorilli discussed the foundational blocks for building a successful DevSecOps culture within a DoD software engineering group.
Watch -
Hitting the Ground Running: Reviewing the 17 CMMC Level 1.O Practices (CMMC 1.0)
April 2020 Webinar
Matthew TrevorsGavin Jurecko
In this webcast, CMMC Architects, Gavin Jurecko, and Matt Trevors provide insight on how to evaluate and assess your organization's readiness for meeting the practice requirements of CMMC Level 1.
Watch -
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 1.0 (CMMC 1.0)
April 2020 Webinar
Katie C. StewartAndrew F. Hoover
This webcast provides insight into how organizations can prepare for CMMC.
Watch -
Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite
April 2020 Webinar
Matthew TrevorsBrett Tucker
This webcast discussed how professionals and executives communicate risk concerns despite the cacophony and distraction posed by technical details and other organizational demands using the new OCTAVE FORTE approach.
Watch -
At What Point Does DevSecOps Become Too Risky for the Business?
April 2020 Webinar
Hasan Yasar
This webcast covered the implementation of an automated, continuous risk pipeline that demonstrates how cyber-resiliency and compliance risk can be traced to and from DevSecOps teams working in the SDLC program and project levels.
Watch -
Designing Trustworthy AI: A User Experience (UX) Framework
March 2020 Webinar
Carol J Smith
This webcast introduced a new user experience (UX) framework to guide the creation of AI systems that are accountable, de-risked, respectful, secure, honest and usable.
Watch -
Becoming a Better Software Architect
March 2020 Webinar
Ipek OzkayaJames IversPhilip Bianco
In this session, a panel of architects discussed their personal paths to becoming software architects and how they have helped others on that journey.
Watch -
Cyber Hygiene: Why the Fundamentals Matter
October 2019 Webinar
Matthew J. ButkovicRandall F. TrzeciakMatthew Trevors
In this webcast, as a part of National Cybersecurity Awareness Month, our experts provided an overview of the concept of cyber hygiene, which addresses simple sets of actions that users can take to help reduce cybersecurity risks.
Watch -
Insider Threats: Your Questions. Our Answers.
September 2019 Webinar
Matthew J. ButkovicRandall F. TrzeciakDaniel L. Costa
In this webcast, as a part of National Insider Threat Awareness Month, our experts provided an overview of the ongoing research in this area, and answered questions about how the threat landscape continues to evolve.
Watch -
Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them
July 2019 Webinar
Eileen WrubelTimothy MorrowDale Alleshouse
This webcast addressed a few of the causes for cloud transition issues, as well as identified some practices that will assist organizations as they plan to transition assets and capabilities to the cloud.
Watch -
Secure Your Code with AI and NLP
June 2019 Webinar
Eliezer KanalNathan M. VanHoudnos
In this talk, we discussed how a branch of artificial intelligence called Natural Language Processing, or NLP, is being applied to computer code.
Watch -
DevSecOps Implementation in the DoD: Barriers and Enablers
April 2019 Webinar
Hasan YasarEileen WrubelJeff Boleng
In this webcast, panelists discuss potential enablers of and barriers to using modern software development techniques and processes in the DoD or similar segregated environments.
Watch -
What Makes a Good Software Architect (2019 Edition)?
April 2019 Webinar
John KleinIpek OzkayaFelix Bachmann
The architect's role continues to evolve; in this webcast we revisited the question in the context of today's role and responsibilities.
Watch -
Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator
March 2019 Webinar
Christopher MayGabriel SomloGeoffrey B. Dobson
Throughout this talk, our team of researchers and engineers discuss the solutions we developed to help achieve a new level of realism in simulated cyber environments.
Watch -
Improve Your Static Analysis Audits Using CERT SCALe’s New Features
December 2018 Webinar
Lori Flynn
In this webcast, Lori Flynn, a CERT senior software security researcher, describes the new features in SCALe v3, a research prototype tool.
Watch -
Five Ways to Boost Cybersecurity with DevOps
November 2018 Webinar
Aaron VolkmannDoug Reynolds
In this webcast, Doug Reynolds and Aaron Volkmann discuss key DevOps principles, including cross-team collaboration, task automation, tool integration, continuous integration and deployment, and continuous monitoring.
Watch -
Next Steps with Blockchain Technology
October 2018 Webinar
Eliezer KanalGabriel Somlo
In this webcast, Elli Kanal and Gabe Somlo discussed some blockchain successes, including a number of interesting applications they have encountered in their work at SEI.
Watch -
Digital Footprints: Managing Privacy and Security
July 2018 Webinar
Matthew J. ButkovicLena Pons
With the recent Cambridge Analytica news and the rollout of the General Data Privacy Rule (GDPR) in Europe, there are many questions about how social media data privacy is managed and how it could be managed.
Watch -
Digital Footprints: What Can be Learned from the Traces We Leave on Social Networks
July 2018 Webinar
April GalyardtCarson Sestili
In this first webcast in a two-part series, April Galyardt and Carson Sestili described what metadata is and what information can be gleaned from it.
Watch -
Blockchain: Your Questions. Our Answers.
July 2018 Webinar
Eliezer KanalGabriel Somlo
In this webcast, we explain how the technology works and what makes it fundamentally different than its predecessors. We discuss where it fits (and where it doesn't fit) and help set a rubric to help you determine if you need this technology.
Watch -
Three Software Innovations that DoD Needs Now
May 2018 Webinar
Jeff BolengRobert SchielaSam Procter
Watch Jeff Boleng, Robert Schiela, Samuel Procter, Lena Pons, and Nathan VanHoudnos discuss "Three Software Innovations that DoD Needs Now".
Watch -
Agile and DevOps: Your Questions. Our Answers.
April 2018 Webinar
Hasan YasarEileen Wrubel
Watch this lively discussion in which we answered attendee questions on all things Agile and DevOps.
Watch -
Is Software Spoiling Us?
January 2018 Webinar
Jeff BolengGrace LewisEliezer Kanal
Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
Watch -
Four Valuable Data Sources for Network Security Analytics
December 2017 Webinar
Timothy J. Shimeall
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.
Watch -
Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
November 2017 Webinar
Greg Shannon
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability.
Watch -
Three Secrets to Successful Agile Metrics
November 2017 Webinar
Will Hayes
Watch this webcast to gain insights into effective metrics programs in government settings.
Watch -
Five Keys to Effective Agile Test Automation for Government Programs
August 2017 Webinar
Robert V. BinderSuzanne Miller
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss 5 key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment are likely to have.
Watch -
The Evolving Role of the Chief Risk Officer
August 2017 Webinar
Summer C. FowlerGreg Porter (Heinz College at Carnegie Mellon University)
In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.
Watch -
Practical Considerations in Adopting Agile/Lean in Government Settings
July 2017 Webinar
Suzanne MillerEileen Wrubel
This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.
Watch -
Building Analytics for Network Flow Records
May 2017 Webinar
Timothy J. ShimeallMatthew Heckathorn
Learn how to identify network flow characteristics and metrics that support understanding traffic
Watch -
5 Things You Need to Know About Leading a Successful Large IT Modernization Project
March 2017 Webinar
Stephany BellomoFelix BachmannWill Hayes
In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.
Watch -
Building and Scaling a Malware Analysis System
January 2017 Webinar
Brent Frye
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
Watch -
How to Reduce the Graveyard of Software Tools with UI/UX Capability
January 2017 Webinar
Jennifer CowleyMichael J. Szegedy
For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this impacts the software quality outcomes.
Watch -
From Secure Coding to Secure Software
November 2016 Webinar
Mark ShermanRobert Schiela
In this webinar, we discussed how you can improve your organization's secure coding capabilities.
Watch -
Security Practitioner Perspective on DevOps for Building Secure Solutions
October 2016 Webinar
Hasan Yasar
This webinar covered the perspectives of security practitioners on building secure software using the DevOps development process and modern security approach.
Watch -
Data Science: What It Is and How It Can Help Your Company
August 2016 Webinar
Brian LindauerEliezer Kanal
In this webinar, we discussed what the term “data science” means, what skills a data scientist brings to the table, and what competitive edge data science can bring to your team.
Watch -
How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate
July 2016 Webinar
Randall F. Trzeciak
In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.
Watch -
Secure Software Development Landscape
July 2016 Webinar
Mark Sherman
Examine how security can be introduced throughout the software development lifecycle to blunt vulnerabilities.
Watch -
Coordinated Vulnerability Disclosure
July 2016 Webinar
Dan J. Klinedinst
Learn how to develop a vulnerability coordination capability, which helps you respond to vulnerabilities and demonstrates that you are serious about fixing them.
Watch -
Continuous Integration (Secure DevOps)
July 2016 Webinar
Hasan Yasar
Learn how to better identify process improvements at your organization through new perspectives on secure software development and delivery.
Watch -
Security Requirements Engineering
July 2016 Webinar
Christopher J. Alberts
Learn the importance of developing security requirements in the same time frame as functional requirements.
Watch -
Secure Coding Best Practices
July 2016 Webinar
Robert Schiela
Learn why secure coding practices are important to reduce common programming errors that lead to vulnerabilities.
Watch -
What Makes a Good Software Architect?
May 2016 Webinar
Ipek OzkayaAndrew KotovJohn Klein
In this webinar, SEI researchers and an industry colleague discussed in two talks What Makes a Good Software Architect?
Watch -
Structuring the Chief Information Security Officer Organization
April 2016 Webinar
Julia H. AllenNader Mehravari
This webinar described a CISO organizational structure and functions for a typical large, diverse organization using input from CISOs, policies, frameworks, maturity models, standards, and codes of practice.
Watch -
Using Network Flow to Gain Cyber Situational Awareness
March 2016 Webinar
Sid Faber
During this webinar we discussed the foundations of cyber situational awareness and how to apply situational awareness concepts to the cyber domain.
Watch -
Context Enabled Computing
March 2016 Webinar
Jeff BolengMarc Novakouski
In this webinar, we covered a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.
Watch -
Intelligence Preparation for Operational Resilience
March 2016 Webinar
This webinar proposed the Intelligence Preparation for Operational Resilience (IPOR) framework to create a model for structured analysis of your intelligence needs and a way to operationalize threat intelligence once you have received it.
Watch -
DevOps Security: Ignore it as Much You Would Ignore Normal Security
January 2016 Webinar
Timothy PalkoChris Taschner
In this presentation, Tim Palko and Chris Taschner explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices.
Watch -
A Taxonomy of Testing Types
January 2016 Webinar
Donald Firesmith
Watch Donald Firesmith discuss a taxonomy of testing types to clarify the grand scope of testing and enable attendees to better select the appropriate types of testing for their specific needs.
Watch -
Cyber-Vulnerabilities in Aviation Today
November 2015 Webinar
Robert Behler
SEI Chief Operating Officer, Robert F. Behler discusses Cyber-Vulnerabilities in Aviation Today.
Watch -
Web Traffic Analysis with CERT Tapioca
November 2015 Webinar
Will Dormann
Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.
Watch -
Enhancing Mobile Device Security
November 2015 Webinar
Jose A. Morales
Jose Morales discusses mobile device security enhancements with defensive and offensive uses.
Watch -
Generalized Automated Cyber-Readiness Evaluator (ACE)
November 2015 Webinar
Rotem D. Guttman
Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.
Watch -
Finding Related Malware Samples Using Run-Time Features
November 2015 Webinar
Rhiannon Weaver
Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.
Watch -
Resilience Panel Discussion
November 2015 Webinar
Matthew J. ButkovicKatie C. Stewart
CERT researchers discuss risk management and resilience.
Watch -
DevOps Panel Discussion
November 2015 Webinar
Kevin FallHasan YasarJoseph D. Yankel
CERT researchers discuss DevOps and its relationship to cybersecurity and the dynamic threat.
Watch -
Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps
November 2015 Webinar
Lori FlynnWilliam Klieber
Will Klieber and Lori Flynn discuss undesired flows of sensitive information within and between Android apps.
Watch -
CERT® Alignment with Cyber COI Challenges and Gaps
November 2015 Webinar
Greg Shannon
Greg Shannon discusses the CERT Division's current work associated with cyber community of interest (COI).
Watch -
Culture Shock: Unlocking DevOps with Collaboration and Communication
August 2015 Webinar
Todd WaitsAaron Volkmann
Watch a discussion about ways to shift organizational culture to achieve DevOps. We highlighted communication tools and movements, such as ChatOps.
Watch -
What DevOps Is Not!
June 2015 Webinar
Hasan Yasar
In this webinar, we'll talk about DevOps, its common misconceptions and roadblocks, and how you can use DevOps to help your organization reach new heights of efficiency and productivity.
Watch -
Approaching Security from an "Architecture First" Perspective
May 2015 Webinar
Rick Kazman
In this talk we report on three case studies of real-world projects—two industrial and one open-source—where we attempted to measure the consequences of various architectural approaches to security.
Watch -
Trends and New Directions in Software Architecture
May 2015 Webinar
Linda M. Northrop
This talk shares a perspective on the trends influencing the need for change, the related architectural challenges, and the applicable research and practices.
Watch -
Advancing Cyber Intelligence Practices Through the SEI's Consortium
February 2015 Webinar
Jay McAllisterMelissa Ludwick
Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help organizations.
Watch -
Tactical Cloudlets: Moving Cloud Computing to the Edge
January 2015 Webinar
Grace Lewis
This webinar presents the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms.
Watch -
Risk Priority Number (RPN) – A Method for Software Defect Report Analysis
December 2014 Webinar
Will HayesJulie B. Cohen
This webinar will explain the component used in RPN and how it can help a program select between competing defects to best utilize constrained resources to help lower overall system risk.
Watch -
Lessons in External Dependency and Supply Chain Risk Management
December 2014 Webinar
John HallerMatthew J. Butkovic
In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will discuss real-world incidents, including recent industrial control system attacks and incidents affecting Department of Defense capabilities.
Watch -
Architecture Analysis with AADL
November 2014 Webinar
Julien Delange
This webinar introduces the Architecture Analysis and Design Language (AADL), the architecture modeling language used to specify safety-critical systems. We show its use in the Open Source AADL Tool Environment (OSATE).
Watch -
Software Architecture for Big Data Systems
July 2014 Webinar
Ian Gorton
Watch Ian Gorton discuss software architecture for big data systems.
Watch -
Architectural Implications of DevOps
July 2014 Webinar
Stephany Bellomo
Watch Stephany Bellomo discuss the architectural implications of DevOps.
Watch -
The Smart Grid Maturity Model Around the World
July 2014 Webinar
Jeffrey H. Ferris (IBM)
This webinar will introduce the Smart Grid Maturity Model (SGMM), a management tool designed to help any utility, anywhere, plan its journey toward grid modernization-no customization required.
Watch -
When Measurement Benefits the Measured
June 2014 Webinar
Mark KasunicWilliam Nichols
During this webinar, we shared the performance results of over 100 software teams that have carefully tracked their schedule performance and the quality of their work.
Watch -
CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin
June 2014 Webinar
Matthew J. Butkovic
Watch the CERT® RMM User Panel discuss their experiences implementing RMM from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch -
Department of Homeland Security Cyber Resilience Review (Case Study)
June 2014 Webinar
Matthew J. Butkovic
Watch Matthew Butkovic discuss the "Department of Homeland Security Cyber Resilience Review (Case Study)" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch -
United States Postal Inspection Service (USPIS)
June 2014 Webinar
Julia H. Allen
Watch Julia Allen discuss the United States Postal Inspection Service (USPIS) (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch -
Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape
June 2014 Webinar
Nader Mehravari
Watch Nader Mehravari discuss "Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch -
Overview of the CERT® Resilience Management Model (CERT®-RMM)
June 2014 Webinar
James J. Cebula
Watch James Cebula discuss the "Overview of the CERT® Resilience Management Model" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch -
ABCs of Operational Resilience
June 2014 Webinar
Nader Mehravari
Watch Nader Mehravari discuss the "ABCs of Operational Resilience" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.
Watch -
Heartbleed: Analysis, Thoughts, and Actions
May 2014 Webinar
Will DormannRobert FloodeenBrent Kennedy
Panelists discussed the impact of Heartbleed, methods to mitigate the vulnerability, and ways to prevent crises like this in the future.
Watch -
Taking Advantage of Agile while Minimizing Risk
March 2014 Webinar
David Zubrow
Watch Dave Zubrow discuss “Taking Advantage of Agile while Minimizing Risk” at the Agile for Government Summit.
Watch -
SEI Webinar Series: CheckPoint Diagnostic
March 2014 Webinar
This webinar will introduce the methodology and outputs of SEI's latest investigative approach: the Checkpoint Diagnostic (CPD).
Watch -
Panel Discussion: Managing the Insider Threat: What Every Organization Should Know
November 2013 Webinar
Robert FloodeenWilliam R. ClaycombAndrew P. Moore
In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.
Watch -
Illicit Cyber Activity Involving Fraud
November 2013 Webinar
Randall F. Trzeciak
In this webinar, Randy Trzeciak discusses a study to develop insights and risk indicators related to malicious insider activity in the banking and finance sector.
Watch -
Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data
November 2013 Webinar
Kurt C. Wallnau
In this webinar, Kurt Wallnau discusses insider threat controls and how to test systems whose dynamics are based in human nature that is only partially understood.
Watch -
Emerging Trends
November 2013 Webinar
William R. ClaycombAndrew P. Moore
In this November 2013 webinar, Bill Claycomb and Andrew Moore discuss how technology in emerging trends enables new types of insider attacks.
Watch -
Components and Considerations in Building an Insider Threat Program
November 2013 Webinar
Carly L. HuthRobin Ruefle
In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.
Watch -
Best Practices and Controls for Mitigating Insider Threats
November 2013 Webinar
George SilowashAlex Nicoll
In this 2013 webinar, Alex Nicoll and George Silowash discuss how the CERT division develops, inspects, and transitions insider threat controls to the public.
Watch -
Overview of the Threat Posed by Insiders to Critical Assets
November 2013 Webinar
Randall F. TrzeciakDave Mundie
In this 2013 webinar, Randy Trzeciak and David Mundie discuss the challenges organizations face as they try to address insider threat.
Watch -
20+ Years of Cyber (in)Security
August 2013 Webinar
Richard D. Pethia
In this webinar, Rich Pethia discusses how cybersecurity has changed over the past 20 years.
Watch -
Achieving Mission Assurance Through Resilience Management
August 2013 Webinar
Nader Mehravari
In this August 2013 webinar, Nader Mehravari discusses how to protect and sustain the mission and business operations of an organization.
Watch -
Observations of Successful Cyber Security Operations
August 2013 Webinar
Roman Danyliw
In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.
Watch -
Responding to a Large-Scale Cybersecurity Incident
August 2013 Webinar
Christian Roylo
In this 2013 webinar, Christian Roylo discusses the role of technology in responding to large-scale cyber incidents.
Watch -
Developing Your Cyber Workforce
August 2013 Webinar
Christopher May
In this 2013 webinar, Chris May discusses ways to research and develop solutions approaching the cyber workforce development challenge.
Watch -
The Cyber Security R&D Pipeline – Building Capability Through Science
August 2013 Webinar
Greg Shannon
In this 2013 webinar, Dr. Greg Shannon describes advances in software engineering to build systems with predictable and improved quality, cost, and schedule.
Watch -
Architecting in a Complex World: Achieving Agility and Stability in Large-Scale Software Development
May 2013 Webinar
Ipek Ozkaya
Ipek Ozkaya explores tactics about how organizations can better take advantage of software architecting for large-scale agile software-development efforts.
Watch -
Architecting in a Complex World: Eliciting and Specifying Quality Attribute Requirements
May 2013 Webinar
Rob Wojcik
Rob Wojcik describes the Quality Attribute Workshop, a scenario-based approach for eliciting requirements for quality attributes (non-functional system qualities such as performance, availability, and security).
Watch -
Architecting in a Complex World: Uncovering Architectural Challenges in a System of Systems
May 2013 Webinar
Michael J. Gagliardi
Mike Gagliardi describes development challenges in usability/automation, capability gaps, resource management, training, migration of legacy systems, and collaboration that they have identified from 46 Mission Thread Workshops.
Watch -
Architecture and Design of Service-Oriented Systems (Part 2)
May 2013 Webinar
Grace Lewis
The second part will focus on SOA infrastructure-design considerations, decomposition of an enterprise service bus (ESB) into patterns and tactics as an example of SOA infrastructure, and principles of service design.
Watch -
Architecture and Design of Service-Oriented Systems (Part 1)
March 2013 Webinar
Grace Lewis
The objective of this tutorial is to provide guidance on the architecture and design of service-oriented systems. Part I covers basic concepts and impact.
Watch -
Quantifying Uncertainty in Early Lifecycle Cost Estimation
November 2012 Webinar
Jim McCurleyRobert Stoddard
In this presentation we describe a new, integrative approach for pre-Milestone A cost estimation, which we call QUELCE (Quantifying Uncertainty in Early Lifecycle Cost Estimation).
Watch -
SEI Agile Research Forum: DOD CIO, Teri Takai, Keynote Address
November 2012 Webinar
Teri Takai discusses the introduction of agile methods into the DoD software acquisition and development environment.
Watch -
Source Code Analysis Laboratory (SCALe)
November 2012 Webinar
Robert C. Seacord
In this webinar, Robert Seacord discusses SCALe, a demonstration that software systems can be tested for conformance to secure coding standards.
Watch -
SEI Agile Research Forum: The Importance of Applying Agile Technologies to Key DoD Software Initiatives
July 2012 Webinar
Douglas Schmidt (Vanderbilt University)
Douglas Schmidt explores what's at stake for a large-scale development organization that is considering or adopting Agile technologies.
Watch -
SEI Agile Research Forum: Strategic Management of Architectural Technical Debt
July 2012 Webinar
Ipek Ozkaya
Ipek Ozkaya shows you how to spot the sources of technical debt in your project, track it, and use it to your advantage.
Watch -
SEI Agile Research Forum: Agile Methods: Agile Methods:Tools, Techniques, and Practices for the DoD Community
July 2012 Webinar
Mary Ann Lapham
Mary Ann Lapham describes research into ways that help the DoD overcome technical and cultural resistance to Agile methods.
Watch -
Architecting Software the SEI Way - Analyzing and Evaluating Enterprise Architectures
April 2012 Webinar
John Klein
John Klein reviews the SEI perspective on architecture-centric engineering, and discusses how this approach scales from its original software context through systems-of-systems.
Watch -
Architecting Software the SEI Way - Architecture Evaluation: A Tool for Designing Systems That Meet Users' Needs
April 2012 Webinar
Felix Bachmann
At this 2012 event, Felix Bachmann discussed the concepts used by an Architecture Tradeoff Analysis Method (ATAM) that make an evaluation successful, which can be integrated into the architecture design process to ensure the creation of successful systems.
Watch -
Architecting Software the SEI Way - Software Architecture Fundamentals: Technical, Business, and Social Influences
April 2012 Webinar
Rob Wojcik
Although software architecture is a key factor in determining the success or failure of a software system, software professionals throughout the industry continue to struggle with questions like: What exactly is a software architecture? Why is software architecture important?
Watch