Webinars
Stay informed of the latest solutions to computing and software engineering problems with SEI webinars. Whether you're interested in cybersecurity, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webinar series has you covered.
-
 
-
Is Software Spoiling Us?
January 2018 Webinar
Jeff BolengGrace LewisEliezer Kanal
Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
Watch
 
-
Four Valuable Data Sources for Network Security Analytics
December 2017 Webinar
Timothy J. Shimeall
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.
Watch
 
-
Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
November 2017 Webinar
Greg Shannon
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability.
Watch
 
-
Three Secrets to Successful Agile Metrics
November 2017 Webinar
Will Hayes
Watch this webcast to gain insights into effective metrics programs in government settings.
Watch
 
-
Five Keys to Effective Agile Test Automation for Government Programs
August 2017 Webinar
Robert V. BinderSuzanne Miller
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss 5 key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment are likely to have.
Watch
 
-
The Evolving Role of the Chief Risk Officer
August 2017 Webinar
Summer C. FowlerGreg Porter (Heinz College at Carnegie Mellon University)
In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.
Watch
 
-
Practical Considerations in Adopting Agile/Lean in Government Settings
July 2017 Webinar
Suzanne MillerEileen Wrubel
This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.
Watch
 
-
Building Analytics for Network Flow Records
May 2017 Webinar
Timothy J. ShimeallMatthew Heckathorn
Learn how to identify network flow characteristics and metrics that support understanding traffic
Watch
 
-
5 Things You Need to Know About Leading a Successful Large IT Modernization Project
March 2017 Webinar
Stephany BellomoFelix BachmannWill Hayes
In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.
Watch
 
-
Building and Scaling a Malware Analysis System
January 2017 Webinar
Brent Frye
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
Watch
 
-
How to Reduce the Graveyard of Software Tools with UI/UX Capability
January 2017 Webinar
Jennifer CowleyMichael J. Szegedy
For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this impacts the software quality outcomes.
Watch
 
-
From Secure Coding to Secure Software
November 2016 Webinar
Mark ShermanRobert Schiela
In this webinar, we discussed how you can improve your organization's secure coding capabilities.
Watch
 
-
Security Practitioner Perspective on DevOps for Building Secure Solutions
October 2016 Webinar
Hasan Yasar
This webinar covered the perspectives of security practitioners on building secure software using the DevOps development process and modern security approach.
Watch
 
-
Data Science: What It Is and How It Can Help Your Company
August 2016 Webinar
Brian LindauerEliezer Kanal
In this webinar, we discussed what the term “data science” means, what skills a data scientist brings to the table, and what competitive edge data science can bring to your team.
Watch
 
-
How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate
July 2016 Webinar
Randall F. Trzeciak
In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.
Watch
 
-
Secure Software Development Landscape
July 2016 Webinar
Mark Sherman
Examine how security can be introduced throughout the software development lifecycle to blunt vulnerabilities.
Watch
 
-
Coordinated Vulnerability Disclosure
July 2016 Webinar
Dan J. Klinedinst
Learn how to develop a vulnerability coordination capability, which helps you respond to vulnerabilities and demonstrates that you are serious about fixing them.
Watch
 
-
Continuous Integration (Secure DevOps)
July 2016 Webinar
Hasan Yasar
Learn how to better identify process improvements at your organization through new perspectives on secure software development and delivery.
Watch
 
-
Security Requirements Engineering
July 2016 Webinar
Christopher J. Alberts
Learn the importance of developing security requirements in the same time frame as functional requirements.
Watch
 
-
Secure Coding Best Practices
July 2016 Webinar
Robert Schiela
Learn why secure coding practices are important to reduce common programming errors that lead to vulnerabilities.
Watch
 
-
What Makes a Good Software Architect?
May 2016 Webinar
Ipek OzkayaAndrew KotovJohn Klein
In this webinar, SEI researchers and an industry colleague discussed in two talks What Makes a Good Software Architect?
Watch
 
-
Structuring the Chief Information Security Officer Organization
April 2016 Webinar
Julia H. AllenNader Mehravari
This webinar described a CISO organizational structure and functions for a typical large, diverse organization using input from CISOs, policies, frameworks, maturity models, standards, and codes of practice.
Watch
 
-
Using Network Flow to Gain Cyber Situational Awareness
March 2016 Webinar
Sid Faber
During this webinar we discussed the foundations of cyber situational awareness and how to apply situational awareness concepts to the cyber domain.
Watch
 
-
Context Enabled Computing
March 2016 Webinar
Jeff BolengMarc Novakouski
In this webinar, we covered a wide variety of research activities associated with our efforts to better leverage context for information delivery and sensor tasking.
Watch
 
-
Intelligence Preparation for Operational Resilience
March 2016 Webinar
This webinar proposed the Intelligence Preparation for Operational Resilience (IPOR) framework to create a model for structured analysis of your intelligence needs and a way to operationalize threat intelligence once you have received it.
Watch
 
-
DevOps Security
January 2016 Webinar
Timothy PalkoChris Taschner
In this presentation, Tim Palko and Chris Taschner explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices.
Watch
 
-
A Taxonomy of Testing Types
January 2016 Webinar
Donald Firesmith
Watch Donald Firesmith discuss a taxonomy of testing types, thereby clarifying the grand scope of testing and enabling the attendee to better select the appropriate types of testing to for their specific needs.
Watch
 
-
Cyber-Vulnerabilities in Aviation Today
November 2015 Webinar
Robert Behler
SEI Chief Operating Officer, Robert F. Behler discusses Cyber-Vulnerabilities in Aviation Today.
Watch
 
-
Web Traffic Analysis with CERT Tapioca
November 2015 Webinar
Will Dormann
Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.
Watch
 
-
Enhancing Mobile Device Security
November 2015 Webinar
Jose A. Morales
Jose Morales discusses mobile device security enhancements with defensive and offensive uses.
Watch
 
-
Generalized Automated Cyber-Readiness Evaluator (ACE)
November 2015 Webinar
Rotem D. Guttman
Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.
Watch
 
-
Finding Related Malware Samples Using Run-Time Features
November 2015 Webinar
Rhiannon Weaver
Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.
Watch
 
-
Resilience Panel Discussion
November 2015 Webinar
Matthew J. ButkovicKatie C. Stewart
CERT researchers discuss risk management and resilience.
Watch
 
-
DevOps Panel Discussion
November 2015 Webinar
Kevin FallHasan YasarJoseph D. Yankel
CERT researchers discuss DevOps and its relationship to cybersecurity and the dynamic threat.
Watch
 
-
Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps
November 2015 Webinar
Lori FlynnWilliam Klieber
Will Klieber and Lori Flynn discuss undesired flows of sensitive information within and between Android apps.
Watch
 
-
CERT® Alignment with Cyber COI Challenges and Gaps
November 2015 Webinar
Greg Shannon
Greg Shannon discusses the CERT Division's current work associated with cyber community of interest (COI).
Watch
 
-
Culture Shock: Unlocking DevOps with Collaboration and Communication
August 2015 Webinar
Todd WaitsAaron Volkmann
Watch a discussion about ways to shift organizational culture to achieve DevOps. We highlighted communication tools and movements, such as ChatOps.
Watch
 
-
What DevOps Is Not!
June 2015 Webinar
Hasan Yasar
In this webinar, we'll talk about DevOps, its common misconceptions and roadblocks, and how you can use DevOps to help your organization reach new heights of efficiency and productivity.
Watch
 
-
Approaching Security from an "Architecture First" Perspective
May 2015 Webinar
Rick Kazman
In this talk we report on three case studies of real-world projects—two industrial and one open-source—where we attempted to measure the consequences of various architectural approaches to security.
Watch
 
-
Trends and New Directions in Software Architecture
May 2015 Webinar
Linda M. Northrop
This talk shares a perspective on the trends influencing the need for change, the related architectural challenges, and the applicable research and practices.
Watch
 
-
Advancing Cyber Intelligence Practices Through the SEI's Consortium
February 2015 Webinar
Jay McAllisterMelissa Ludwick
Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help organizations.
Watch
 
-
Tactical Cloudlets: Moving Cloud Computing to the Edge
January 2015 Webinar
Grace Lewis
This webinar presents the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms.
Watch
 
-
Risk Priority Number (RPN) – A Method for Software Defect Report Analysis
December 2014 Webinar
Will HayesJulie B. Cohen
This webinar will explain the component used in RPN and how it can help a program select between competing defects to best utilize constrained resources to help lower overall system risk.
Watch
 
-
Lessons in External Dependency and Supply Chain Risk Management
December 2014 Webinar
John HallerMatthew J. Butkovic
In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will discuss real-world incidents, including recent industrial control system attacks and incidents affecting Department of Defense capabilities.
Watch
 
-
Architecture Analysis with AADL
November 2014 Webinar
Julien Delange
This webinar introduces the Architecture Analysis and Design Language (AADL), the architecture modeling language used to specify safety-critical systems. We show its use in the Open Source AADL Tool Environment (OSATE).
Watch
 
-
Software Architecture for Big Data Systems
July 2014 Webinar
Ian Gorton
Watch Ian Gorton discuss software architecture for big data systems.
Watch
 
-
Architectural Implications of DevOps
July 2014 Webinar
Stephany Bellomo
Watch Stephany Bellomo discuss the architectural implications of DevOps.
Watch
 
-
The Smart Grid Maturity Model Around the World
July 2014 Webinar
Jeffrey H. Ferris (IBM)
This webinar will introduce the Smart Grid Maturity Model (SGMM), a management tool designed to help any utility, anywhere, plan its journey toward grid modernization-no customization required.
Watch
 
-
When Measurement Benefits the Measured
June 2014 Webinar
Mark KasunicWilliam Nichols
During this webinar, we shared the performance results of over 100 software teams that have carefully tracked their schedule performance and the quality of their work.
Watch
 
-
CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin
June 2014 Webinar
Matthew J. Butkovic
Watch the CERT® RMM User Panel discuss their experiences implementing RMM from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
Department of Homeland Security Cyber Resilience Review (Case Study)
June 2014 Webinar
Matthew J. Butkovic
Watch Matthew Butkovic discuss the "Department of Homeland Security Cyber Resilience Review (Case Study)" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
United States Postal Inspection Service (USPIS)
June 2014 Webinar
Julia H. Allen
Watch Julia Allen discuss the United States Postal Inspection Service (USPIS) (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape
June 2014 Webinar
Nader Mehravari
Watch Nader Mehravari discuss "Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
June 2014 Webinar
James F. Stevens
Watch James Stevens discuss the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
Overview of the CERT® Resilience Management Model (CERT®-RMM)
June 2014 Webinar
James J. Cebula
Watch James Cebula discuss the "Overview of the CERT® Resilience Management Model" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Watch
 
-
ABCs of Operational Resilience
June 2014 Webinar
Nader Mehravari
Watch Nader Mehravari discuss the "ABCs of Operational Resilience" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.
Watch
 
-
Cybersecurity Update
June 2014 Webinar
John Haller
Watch John Haller discuss the "Cybersecurity Update" from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.
Watch
 
-
Everything You Always Wanted to Know About Maturity Models
June 2014 Webinar
Nader Mehravari
Watch Nader Mehravari discuss “Everything You Always Wanted to Know About Maturity Models” from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain.
Watch
 
-
Heartbleed: Analysis, Thoughts, and Actions
May 2014 Webinar
Will DormannRobert FloodeenBrent Kennedy
Panelists discussed the impact of Heartbleed, methods to mitigate the vulnerability, and ways to prevent crises like this in the future.
Watch
 
-
Why Should Government Care about Technical Debt and Software Architecture?
March 2014 Webinar
Ipek Ozkaya
Watch Ipek Ozkaya discuss “Why Should Government Care about Technical Debt and Software Architecture?” at the Agile for Government Summit.
Watch
 
-
Taking Advantage of Agile while Minimizing Risk
March 2014 Webinar
David Zubrow
Watch Dave Zubrow discuss “Taking Advantage of Agile while Minimizing Risk” at the Agile for Government Summit.
Watch
 
-
Panel Discussion: Managing the Insider Threat: What Every Organization Should Know
November 2013 Webinar
Robert FloodeenWilliam R. ClaycombAndrew P. Moore
In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.
Watch
 
-
Illicit Cyber Activity Involving Fraud
November 2013 Webinar
Randall F. Trzeciak
In this webinar, Randy Trzeciak discusses a study to develop insights and risk indicators related to malicious insider activity in the banking and finance sector.
Watch
 
-
Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data
November 2013 Webinar
Kurt C. Wallnau
In this webinar, Kurt Wallnau discusses insider threat controls and how to test systems whose dynamics are based in human nature that is only partially understood.
Watch
 
-
Emerging Trends
November 2013 Webinar
William R. ClaycombAndrew P. Moore
In this November 2013 webinar, Bill Claycomb and Andrew Moore discuss how technology in emerging trends enables new types of insider attacks.
Watch
 
-
Components and Considerations in Building an Insider Threat Program
November 2013 Webinar
Carly L. HuthRobin Ruefle
In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.
Watch
 
-
Best Practices and Controls for Mitigating Insider Threats
November 2013 Webinar
George SilowashAlex Nicoll
In this 2013 webinar, Alex Nicoll and George Silowash discuss how the CERT division develops, inspects, and transitions insider threat controls to the public.
Watch
 
-
Overview of the Threat Posed by Insiders to Critical Assets
November 2013 Webinar
Randall F. TrzeciakDave Mundie
In this 2013 webinar, Randy Trzeciak and David Mundie discuss the challenges organizations face as they try to address insider threat.
Watch
 
-
CHECKPOINT Diagnostic
August 2013 Webinar
Timothy A. ChickGene Miluk
This webinar will introduce the methodology and outputs of SEI's latest investigative approach: the Checkpoint Diagnostic (CPD). The CPD is the foundational technology in a well-designed "Performance Improvement Program."
Watch
 
-
20+ Years of Cyber (in)Security
August 2013 Webinar
Richard D. Pethia
In this webinar, Rich Pethia discusses how cybersecurity has changed over the past 20 years.
Watch
 
-
Achieving Mission Assurance Through Resilience Management
August 2013 Webinar
Nader Mehravari
In this August 2013 webinar, Nader Mehravari discusses how to protect and sustain the mission and business operations of an organization.
Watch
 
-
Observations of Successful Cyber Security Operations
August 2013 Webinar
Roman Danyliw
In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.
Watch
 
-
Responding to a Large-Scale Cybersecurity Incident
August 2013 Webinar
Christian Roylo
In this 2013 webinar, Christian Roylo discusses the role of technology in responding to large-scale cyber incidents.
Watch
 
-
Developing Your Cyber Workforce
August 2013 Webinar
Christopher May
In this 2013 webinar, Chris May discusses ways to research and develop solutions approaching the cyber workforce development challenge.
Watch
 
-
The Cyber Security R&D Pipeline – Building Capability Through Science
August 2013 Webinar
Greg Shannon
In this 2013 webinar, Dr. Greg Shannon describes advances in software engineering to build systems with predictable and improved quality, cost, and schedule.
Watch
 
-
Architecting in a Complex World: Achieving Agility and Stability in Large-Scale Software Development
May 2013 Webinar
Ipek Ozkaya
Ipek Ozkaya explores tactics about how organizations can better take advantage of software architecting for large-scale agile software-development efforts.
Watch
 
-
Architecting in a Complex World: Eliciting and Specifying Quality Attribute Requirements
May 2013 Webinar
Rob Wojcik
Rob Wojcik describes the Quality Attribute Workshop, a scenario-based approach for eliciting requirements for quality attributes (non-functional system qualities such as performance, availability, and security).
Watch
 
-
Architecting in a Complex World: Uncovering Architectural Challenges in a System of Systems
May 2013 Webinar
Michael J. Gagliardi
Mike Gagliardi describes development challenges in usability/automation, capability gaps, resource management, training, migration of legacy systems, and collaboration that they have identified from 46 Mission Thread Workshops.
Watch
 
-
Architecture and Design of Service-Oriented Systems (Part 2)
May 2013 Webinar
Grace Lewis
The second part will focus on SOA infrastructure-design considerations, decomposition of an enterprise service bus (ESB) into patterns and tactics as an example of SOA infrastructure, and principles of service design.
Watch
 
-
Secure Coding - Avoiding Future Security Incidents
April 2013 Webinar
Robert C. Seacord
In this 2013 webinar, Robert Seacord discusses secure coding as part of preventing security incidents.
Watch
 
-
Architecture and Design of Service-Oriented Systems (Part 1)
March 2013 Webinar
Grace Lewis
The objective of this tutorial is to provide guidance on the architecture and design of service-oriented systems. Part I covers basic concepts and impact.
Watch
 
-
Quantifying Uncertainty in Early Lifecycle Cost Estimation
November 2012 Webinar
Jim McCurleyRobert Stoddard
In this presentation we describe a new, integrative approach for pre-Milestone A cost estimation, which we call QUELCE (Quantifying Uncertainty in Early Lifecycle Cost Estimation).
Watch
 
-
Use of ACE for Improving a Software System
November 2012 Webinar
Felix Bachmann
In this webinar, we will show how the SEI's architecture methods can be used to improve an existing software system.
Watch
 
-
SEI Agile Research Forum: DOD CIO, Teri Takai, Keynote Address
November 2012 Webinar
Teri Takai discusses the introduction of agile methods into the DoD software acquisition and development environment.
Watch
 
-
Source Code Analysis Laboratory (SCALe)
November 2012 Webinar
Robert C. Seacord
In this webinar, Robert Seacord discusses SCALe, a demonstration that software systems can be conformance tested against secure coding standards.
Watch
 
-
Source Code Analysis Laboratory (SCALe)
November 2012 Webinar
Robert C. Seacord
In this webinar, Robert Seacord discusses SCALe, a demonstration that software systems can be tested for conformance to secure coding standards.
Watch
 
-
SEI Agile Research Forum: The Importance of Applying Agile Technologies to Key DoD Software Initiatives
July 2012 Webinar
Douglas Schmidt (Vanderbilt University)
Douglas Schmidt explores what's at stake for a large-scale development organization that is considering or adopting Agile technologies.
Watch
 
-
SEI Agile Research Forum: Agility and Discipline
July 2012 Webinar
James W. Over
In this 2012 webinar, James W. Over of the Software Engineering Institute presents views from research and from his experience in balancing agility and discipline.
Watch
 
-
SEI Agile Research Forum: Strategic Management of Architectural Technical Debt
July 2012 Webinar
Ipek Ozkaya
Ipek Ozkaya shows you how to spot the sources of technical debt in your project, track it, and use it to your advantage.
Watch
 
-
SEI Agile Research Forum: Agile Methods: Agile Methods:Tools, Techniques, and Practices for the DoD Community
July 2012 Webinar
Mary Ann Lapham
Mary Ann Lapham describes research into ways that help the DoD overcome technical and cultural resistance to Agile methods.
Watch
 
-
Getting the performance you need from processes that work: The CMMI Accelerated Improvement Method
April 2012 Webinar
Timothy A. ChickDavid Cox (ABB Corporate Research)Suzanne Garcia-Miller
This 2012 webinar introduces a process improvement method called the CMMI Accelerated Improvement Method, which provides quantifiable performance improvements - leading to a high ROI.
Watch
 
-
Architecting Software the SEI Way - Analyzing and Evaluating Enterprise Architectures
April 2012 Webinar
John Klein
John Klein reviews the SEI perspective on architecture-centric engineering, and discusses how this approach scales from its original software context through systems-of-systems.
Watch
 
-
Architecting Software the SEI Way - Architecture Evaluation: A Tool for Designing Systems That Meet Users' Needs
April 2012 Webinar
Felix Bachmann
At this 2012 event, Felix Bachmann discussed the concepts used by an Architecture Tradeoff Analysis Method (ATAM) that make an evaluation successful, which can be integrated into the architecture design process to ensure the creation of successful systems.
Watch
 
-
Architecting Software the SEI Way - Software Architecture Fundamentals: Technical, Business, and Social Influences
April 2012 Webinar
Rob Wojcik
Although software architecture is a key factor in determining the success or failure of a software system, software professionals throughout the industry continue to struggle with questions like: What exactly is a software architecture? Why is software architecture important?
Watch
 
-
The California Energy Commission and SGMM: Partners for a Future Vision of Smart Grid
March 2012 Webinar
Julia L. MullaneySteve Rupp (SAIC)
David W. White discusses how the California Energy Commission is using the Smart Grid Maturity Model (SGMM) to help utilities develop a perspective on the future smart grid.
Watch
 
-
SEI Technologies Forum - Overview of the SEI Strategic Research Plan
February 2012 Webinar
Douglas Schmidt (Vanderbilt University)
In this February 2012 webinar, SEI CTO Doug Schmidt presents an overview of the SEI strategic research plan.
Watch
 
-
SEI Technologies Forum: Software, Security, and Resiliency
February 2012 Webinar
Paul Nielsen
In this 2012 webinar, SEI Director and CEO Paul Nielsen discusses software complexity, cybersecurity issues, and resilience and continuity.
Watch
 
-
SEI Technologies Forum: CMMI-SVC: The Strategic Landscape for Service
January 2012 Webinar
Eileen C. Forrester
Eileen Forrester talks about the CMMI-SVC and the larger strategic choices open to those who consider how superior service can revolutionize both work and business results (2011).
Watch
 
-
SEI Technologies Forum: A Brief Survey of the Team Software Process
October 2011 Webinar
Jim McHale
In this 2011 presentation, Jim McHale provides a brief overview of the Team Software Process (TSP), discussing what it is, how it works, and how it meshes with other methodologies.
Watch
 
-
SEI Technologies Forum: Measuring Operational Resilience
October 2011 Webinar
Julia H. Allen
In this webinar, Julia Allen suggests 10 strategic resilience measures and the means to derive them for improving organizational security measurements.
Watch
 
-
SEI Technologies Forum: Agile Development and Architecture: Understanding Scale and Risk
October 2011 Webinar
Ipek Ozkaya
Ipek Ozikaya discusses how evaluations of tradeoffs and their dependenices must be supported by Agile software development and software architecture practices.
Watch
 
-
SEI Technologies Forum: Smart Grid Maturity Model: A Vision for the Future of Smart Grid
October 2011 Webinar
David W. White
This presentation by David W. White offers insight into the Smart Grid Maturity Model (SGMM) as it was used in 2010, along with a description of the SGMM V.1.2 Product Suite.
Watch
 
-
SEI Technologies Forum: The Insider Threat: Lessons Learned from Actual Insider Attacks
October 2011 Webinar
Randall F. Trzeciak
In this 2011 webinar, Randy Trzeciak discusses the CERT Insider Threat Center, and the mitigation strategies and lessons learned from actual insider attacks.
Watch
 
-
SEI Technologies Forum: Architectural Implications of Cloud Computing
October 2011 Webinar
Grace Lewis
In this October 2011 presentation, Grace Lewis of the Software Engineering Institute (SEI) discusses the implications that cloud computing has for software architecture.
Watch
 
-
SEI Technologies Forum: Software Acquisition Program Dynamics
October 2011 Webinar
William E. Novak
This presentation, “Software Acquisition Program Dynamics,” was made by William E. Novak of the Software Engineering Institute (SEI) at the SEI Technologies Forum in 2011.
Watch
 
-
Ask the CMMI Experts
August 2011 Webinar
CMMI Product TeamRusty YoungMike Phillips
During this webinar, members of the SEI's CMMI Product Team lead an interactive session answering your CMMI questions.
Watch
 
-
Making Agile Work for You
July 2011 Webinar
Timothy A. Chick
Timothy A. Chick gives an understanding on the agile fundamentals, starting with a glance at the most commonly used agile methods before going into a more structured approach.
Watch
 
-
Service Oriented Architecture: A Quality Attribute Perspective
June 2011 Webinar
Grace Lewis
In this 2011 presentation, Grace Lewis talks about the effect that service oriented architecture has on system quality attributes.
Watch
 
-
Preview of SEPG Europe 2011: Global Excellence in Software and Security
June 2011 Webinar
Alan Willett
Alan Willett introduces the keynote speakers for SEPG Europe 2011 in this webinar and provides more in-depth information on the technical tracks that make up the SEPG 2011 program.
Watch
 
-
Assurance Cases for Medical Devices
April 2011 Webinar
Charles B. Weinstock
In this presentation, Chuck Weinstock gives a brief introduction to assurance cases. He discusses how they are developed and why they are useful
Watch
 
-
Architecture+TSP = High Quality+Fast
March 2011 Webinar
Felix BachmannJim McHaleRobert Nord
This presentation on software architecture and the TSP was delivered by Felix Bachmann, Jim McHale, and Robert Nord at the SEI's SATURN 2011 workshop.
Watch
 
-
SEPG North America 2011 Volunteer Webinar
March 2011 Webinar
Michele BakerDeen Blash
Volunteer training webinar hosted by Deen Blash, Michele Falce, and Ruth Gregg of the Software Engineering Institute at SEPG North America 2011.
Watch
 
-
Empower Your Smart Grid Transformation
March 2011 Webinar
David W. White
David W. White introduces the Smart Grid Maturity Model (SGMM) and discusses how it can be used to help utilities assess their current state of smart grid implementation.
Watch
 
-
Emerging Technologies for Software-Reliant Systems
February 2011 Webinar
Grace Lewis
In this 2011 presentation, Grace Lewis presents general computation trends and a set of emerging technologies to support the trends for software-reliant SoS such as cloud computing and mobile computing.
Watch
 
-
Architectural Knowledge Management: Decision Guidance in Service-Oriented Architecture Design
February 2011 Webinar
Olaf Zimmermann
Olaf Zimmermann introduces a novel architectural decision modeling framework called SOAD, which repurposes architectural decisions from mere documentation artifacts to reusable design guides.
Watch
 
-
What’s Happening at SEPG North America 2011: A Portland Preview
January 2011 Webinar
Palma Buttles-ValdezGian Weymss
This webinar introduces participants to the keynote speakers, technical tracks, and technical track chairs that make up the SEPG North America 2011.
Watch
 
-
Capability Maturity Model Integration (CMMI) V1.3 and Architecture-Centric Engineering
January 2011 Webinar
Lawrence G. JonesMichael D. Konrad
Lawrence G. Jones and Michael D. Konrad address the basics of architecture-centric engineering, and discuss where and how these practices are reflected in the CMMI model.
Watch
 
-
Maximizing the Investment from Your Software Product Portfolio
November 2010 Webinar
Linda M. Northrop
Linda Northrop describes the basic concepts of software product lines, summarizing the software engineering and management practices needed for a product line approach.
Watch
 
-
Panel Discussion of the Master of Science in Information Technology-Software Engineering Management
November 2010 Webinar
Philip Miller
This panel discussion - led by Dr. Phil Miller - gives prospective CMU MSIT-SEM students insight into the program and how it can prepare them to become leaders in their organization.
Watch
 
-
Are You Ready for the Release? What You Need to Know About CMMI V1.3
October 2010 Webinar
Eileen C. Forrester
In this 2010 webinar, Eileen Forrester discusses the release of CMMI V1.3 and additional plans for CMMI-SVC for 2011.
Watch
 
-
Improving Customer Satisfaction: A People CMM Perspective
October 2010 Webinar
Deen BlashPalma Buttles-ValdezShane McGraw
This webinar explores how the People Capability Maturity Model (People CMM) can improve workforce practices that contribute to improved customer service delivery.
Watch
 
-
Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat
September 2010 Webinar
Greg Porter (Heinz College at Carnegie Mellon University)Randall F. Trzeciak
In this 2010 webinar, the presenters provide essential information to help healthcare technology executives secure patient information and systems from threats.
Watch
 
-
Transforming Your Operational Resilience Management Capabilities: CERT’s Resilience Management Model
July 2010 Webinar
Richard A. Caralli
In this webinar, Rich Caralli, architect of CERT RMM, describes how an organization can use the RMM to transform its operational resilience.
Watch
 
-
Software Architecture Fundamentals: Technical, Business, and Social Influences
July 2010 Webinar
Rob Wojcik
Rob Wojcik discusses the the role that software architecture plays in an organization, the role of quality attribute requirements in architectural design, and more.
Watch
 
-
Critical Lessons Learned in the Content and Delivery of Six Sigma Training
June 2010 Webinar
Robert W. StoddardDavid Zubrow
In this webinar, Robert W. Stoddard and David Zubrow summarize critical lessons learned from several large corporations in both the content and delivery of Six Sigma training.
Watch
 
-
Securing Global Software Supply Chains
June 2010 Webinar
Robert J. Ellison
In this 2010 webinar, Bob Ellison examines the software side pf supply chain and provides examples to help acquirers manage supply chains.
Watch
 
-
SCAMPI v1.3: Sampling
June 2010 Webinar
Will Hayes
In this second webinar about SCAMPI v1.3, the SCAMPI Upgrade Team will be sharing detailed information about the scoping and sampling process designed for the method upgrade.
Watch
 
-
Engineering Improvement in Software Assurance: A Landscape Framework
May 2010 Webinar
Lisa BrownswordCarol Woody
In this 2010 webinar, Carol Woody describes and presents a pilot of the Assurance Modeling Framework, and discusses insights gained from its application.
Watch
 
-
Agile Development & Software Architecture - Crossing the Great Divide
April 2010 Webinar
Nanette Brown
In this webinar, we will take a journey to each camp to dispel misconceptions and discuss how Agilists and Architects can learn from and benefit each other.
Watch
 
-
SCAMPI v1.3 Changes
March 2010 Webinar
Will Hayes
In this 2010 webinar, Will Hayes discusses the major technical changes anticipated in SCAMPI v1.3 and provides insights about present challenges and future improvements to SCAMPI.
Watch
 
-
CMMI for Services
February 2010 Webinar
Eileen C. Forrester
In this webinar, Eileen Forrester presents an overview on the results and status of CMMI-SVC use to date, opportunities for its users and partners, and more.
Watch
 
-
What to Expect from CMMI v1.3
February 2010 Webinar
Mike Phillips
In this webinar, Mike Phillips discusses what users can expect with the latest release of the CMMI Product Suite - CMMI Version 1.3 in the November 2010.
Watch
 
-
SoS Architecture Evaluation and Quality Attribute Specification
January 2010 Webinar
Michael J. Gagliardi
Mike Gagliardi shares a SoS architecture definition and evaluation approach that involves stakeholders in augmenting end-to-end mission threads with quality attribute considerations.
Watch
 
-
The Impact of Scale
December 2009 Webinar
Linda M. Northrop
This talk shares the results of a study on ULS systems, documented in the book Ultra-Large-Scale Systems: The Software Challenge of the Future, as well as recent work in that area.
Watch
 
-
How Unstated Customer Needs May Drive Innovation
December 2009 Webinar
Robert W. Stoddard
Robert W. Stoddard discusses SEI SEMA's efforts on Voice-of-the-Customer methods, which are shown to be effective at identifying unstated customer needs (Dec. 2009).
Watch
 
-
Cloud Computing
November 2009 Webinar
Grace Lewis
Grace Lewis gives an introductory-level presentation on cloud computing. Lewis discusses the different types of cloud computing environments and the barriers for its adoption.
Watch
 
-
How to Use the People CMM to Create Effective Managers
November 2009 Webinar
Palma Buttles-ValdezGian Wemyss
This presentation focuses on teaching managers how they can use maturity level 2 practices of the P-CMM to build workforce capacity in an organization.
Watch
 
-
Love and Marriage: Why CMMI and Agile Need Each Other
October 2009 Webinar
Hillel Glazer - Entinex Inc.
In this 2009 webinar, Hillel Glazer discusses how Agile and CMMI complete each others' capabilities and can lead to fast, affordable, visible, and long-term benefits.
Watch
 
-
The Survivability Analysis Framework
October 2009 Webinar
Robert J. EllisonCarol Woody
In this October 2009 webinar, Robert Ellison and Carol Woody present the Survivability Analysis Framework.
Watch
 
-
How to Effectively Evaluate Software Architecture and Identify Risks
September 2009 Webinar
Felix Bachmann
In this 2009 webinar, Felix Bachmann discusses how using the Architecture Tradeoff Analysis Method (ATAM) can help identify risks early in a product's life cycle.
Watch
 
-
Secure Coding
August 2009 Webinar
Robert C. Seacord
In this webinar, Robert Seacord discusses work to develop secure coding standards for commonly used programming languages such as C, C++, and Java.
Watch
 
-
A Practical Approach for Managing Risk
June 2009 Webinar
Christopher J. AlbertsAudrey J. Dorofee
In this 2009 webinar, the authors provide an overview of the Mosaic approach, a suite of methods used to manage risk across the lifecycle and supply chain.
Watch
 
-
SQUARE Up Your Security Requirements Engineering with SQUARE
May 2009 Webinar
Nancy R. Mead
In this 2009 webinar, Nancy Mead provides an overview of the CERT SQUARE process, and discusses current activities and plans.
Watch
 
-
A Practical Approach for Building CMMI Process Performance Models
April 2009 Webinar
Kevin SchaaffRobert W. StoddardRusty Young
This 2009 webinar targets individuals who will be developing and using process performance models as part of an overall CMMI High Maturity improvement framework.
Watch
 
-
SMART: Analyzing the Feasibility of Migrating Legacy Systems to SOA Environments
April 2009 Webinar
Grace Lewis
Grace Lewis discusses how the Service Migration and Reuse Technique (SMART) can be used to help organizations to make decisions about reusing legacy systems within a SOA environment.
Watch
 
-
The Age of the Smart Grid is Here
March 2009 Webinar
William R. Wilson
This 2009 webinar marks the formal launching of a framework developed by CMU and the SEI which provides utilities with a roadmap through their smart grid transformation.
Watch
 
-
CMMI v1.2 and Beyond
February 2009 Webinar
Michael D. KonradMike Phillips
In this 2009 webinar, Michael D. Konrad and Mike Phillips describe the continued updates of CMMI to better address key elements such as acquisition and services.
Watch
 
-
The Method Framework for Engineering System Architectures
February 2009 Webinar
Donald Firesmith
In this 2009 webinar, Donald Firesmith introduces the Method Framework for Engineering System Architectures (MFESA), a methodology based on the concept of situational method engineering.
Watch
 
-
CMMI Version 1.3 Product Suite
February 2009 Webinar
Michael D. KonradRusty Young
In this 2009 webinar, Michael D. Konrad and Rusty Young discuss CMMI Version 1.3 and the changes that it will bring to the entire CMMI Product Suite.
Watch
 
-
Recursion and Iteration of CMMI Project Management Practices
February 2009 Webinar
Alfred Schenker
In this 2009 webinar, Fred Schenker of the Software Engineering Institute (SEI) examines project management practices from the perspective of both recursion and iteration.
Watch
 
-
Exploring Enterprise, System of Systems, and System and Software Architectures
January 2009 Webinar
Paul C. Clements
In this 2009 webinar, Paul C. Clements presents findings from a U.S. Army workshop on architecture that was held at the SEI in September 2008.
Watch
 
-
Process Improvement at the Edges
December 2008 Webinar
Ray C. Williams
In this 2008 webinar, SuZ Garcia discusses approaching CMMI and other model-based improvements by applying solutions from very small organizations to large multi-organizations.
Watch
 
-
Identifying Program Risks
December 2008 Webinar
Ray C. Williams
In this 2008 webinar, Ray C. Williams looks at group processes at the work group level (development team, IPT, small project) for identifying and documenting risk.
Watch
 
-
Using the Team Software Process to Improve Performance
November 2008 Webinar
Daniel Burton
In this 2008 webinar, Timothy A. Chick explains the Team Software Process (TSP) and how it can relate to CMMI, showing quantitative results demonstrated through TSP use.
Watch
 
-
CMMI-Agile
November 2008 Webinar
Michael D. Konrad
In this 2008 webinar, Michael D. Konrad talks about how Agile methods and CMMI can be used to dramatically improve business performance when properly used together.
Watch
 
-
Measurement and Analysis Infrastructure Diagnostic, Creating a Foundation for Effective Measurement and Analysis
October 2008 Webinar
Mark KasunicDavid Zubrow
This 2008 webinar describes the current status of an effort to develop MAID, a criteria-based approach for evaluating an organization‰s measurement and analysis infrastructure.
Watch
 
-
CMMI on the Web
September 2008 Webinar
Deen BlashShane McGraw
This presentation provides a high-level overview of CMMI and its related products on the SEI website. It was presented in an SEI Webinar on Thursday September 25, 2008.
Watch
 
-
A Jumpstart Method for Business Goals and Project Objectives Supporting CMMI High Maturity
August 2008 Webinar
Robert W. Stoddard
Robert W. Stoddard discusses an approach to jumpstart a business goal and objective activity in order to support process performance modeling in an organization.
Watch
 
-
Service-Oriented Architecture (SOA)
August 2008 Webinar
Grace Lewis
In this 2008 presentation, Grace Lewis provides an overview of SOA and explains the implications that SOA adoption has on the processes used to develop service-oriented systems.
Watch
 
-
Workforce Issues of the 21st Century, The People CMM to the Rescue
July 2008 Webinar
Palma Buttles-ValdezGian Weymss
In this 2008 presentation, Palma Buttles-Valdez discusses workforce issues that organizations are currently experiencing and how these issues can affect performance and retention.
Watch
 
-
Process Improvement in Multi-Model Environments (PrIME)
July 2008 Webinar
Patrick KirwanJeannine Siviy
Patrick Kirwan and Jeannine Siviy present currently available strategic and tactical methods for multui-model improvement in this July 2008 SEI presentation.
Watch