icon-carat-right menu search cmu-wordmark

Webcasts

Stay informed of the latest research and solutions to software engineering, cybersecurity, and AI engineering problems with SEI webcasts. Whether you're interested in DevOps, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webcast series has you covered.

Subscribe

Filter by

1 - 10 of 182
  • The State of DevSecOps in the DoD: Where We Are, and What’s Next

    Webcast
    By Brigid O'Hearn, Eileen Wrubel

    In this webcast, the SEI’s Brigid O'Hearn and Eileen Wrubel and George Lamb, DoD’s Director of Cloud and Software Modernization, discuss how key findings of The State of DevSecOps in …

    LISTEN
  • I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds

    Webcast
    By Destiney Plaza

    In this webcast, Destiney Plaza reveals five ways to protect yourself from getting your password cracked.

    LISTEN
  • A New Performance Zone for Software for National Security

    Webcast
    By Will Hayes, Hasan Yasar, Joe Yankel

    In this webcast, Hasan Yasar, Will Hayes, and Joe Yankel assert that software engineering practices are an ingredient that should not be left behind as national security and defense organizations …

    LISTEN
  • Identifying and Mitigating Cyber Risk

    Webcast
    By Matthew J. Butkovic

    In this webcast, Matt Butkovic, Greg Crabbe, and Beth-Anne Bygum explore how best to align business and resilience objectives.

    LISTEN
  • Malware Research: If You Cannot Replicate it, You Will Not Use It

    Webcast
    By Edward J. Schwartz, Leigh B. Metcalf

    In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools …

    LISTEN
  • New Data Exchange Standard Eases Insider Incident Data Collection and Sharing

    Webcast
    By Austin Whisnant, Daniel L. Costa

    In this webcast, Austin Whisnant and Dan Costa introduce The Insider Incident Data Exchange Standard (IIDES) that enables researchers and practitioners to easily build insider threat case data and share …

    LISTEN
  • Threat Hunting: What Should Keep All of Us Up at Night

    Webcast
    By Daniel Ruef, Matthew J. Butkovic

    In this webcast, Dan Ruef explains how cybersecurity professionals can stay on task to secure networks and systems even as the big promises of the latest and greatest tools and …

    LISTEN
  • Can a Cybersecurity Parametric Cost Model be Developed?

    Webcast
    By Christopher Miller

    In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost …

    LISTEN
  • Elements of Effective Communications for Cybersecurity Teams

    Webcast
    By Sharon Mudd

    In this webcast, Cybersecurity Operations Researcher Sharon Mudd leverages the National Institute of Standards and Technology Cybersecurity Framework and the Forum of Incident Response and Security Teams CSIRT Services Framework …

    LISTEN
  • Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise

    Webcast
    By Matthew J. Butkovic

    In this webcast, Greg Crabbe and Matt Butkovic share their experiences in establishing and maintaining operational resilience programs.

    LISTEN