loader from loading.io
Achieving Balance: Agility, MBSE, and Architecture show art Achieving Balance: Agility, MBSE, and Architecture

SEI Webcasts

Often, agile implementations are a struggle. Dedicated agile teams focus hard and deliver value on a regular cadence. But when results are tallied, the value teams produce may not fit neatly into the expectations of senior stakeholders. Why? In this webcast, Peter Capell addresses the importance of a practical vision to express outcomes, so that the program's “target picture” is clear to all parties involved. Peter highlights the value of tools such as Model-Based Systems Engineering (MBSE) in engineering processes, and how the combination of architecture and MBSE can anchor the...

info_outline
Identifying AI Talent for the DoD Workforce show art Identifying AI Talent for the DoD Workforce

SEI Webcasts

Finding and growing AI and Data talent is essential for mission success, but many skilled workers remain unseen because they lack traditional credentials. This session introduces practical strategies and prototype tools that help individuals demonstrate what they know while helping managers identify and evaluate emerging talent in these fields. Attendees will explore micro-assessments reflecting real data science and AI workflows, see how skills can be measured meaningfully at scale, and gain insights on fostering AI and Data readiness across the federal workforce. Whether you’re building...

info_outline
Model Your Way to Better Cybersecurity show art Model Your Way to Better Cybersecurity

SEI Webcasts

Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. This webcast will preview a workshop to be held during the 2025 Secure Software by Design conference to be held on August 19 and 20. What Attendees Will...

info_outline
DevSecOps: See, Use, Succeed show art DevSecOps: See, Use, Succeed

SEI Webcasts

DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without lessening quality or reducing security. What Attendees Will Learn: Issues from complex DevSecOps pipelines What observability adds for DevSecOps efforts The way in which a new open-source tool, Polar, helps

info_outline
An Introduction to the MLOps Tool Evaluation Rubric show art An Introduction to the MLOps Tool Evaluation Rubric

SEI Webcasts

Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed systems at scale. This webcast introduces the MLOps Tool Evaluation Rubric, designed to help acquisition teams pinpoint organizational priorities for MLOps tooling, customize rubrics to evaluate those key capabilities, and ultimately select tools...

info_outline
The State of DevSecOps in the DoD: Where We Are, and What’s Next show art The State of DevSecOps in the DoD: Where We Are, and What’s Next

SEI Webcasts

DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization partnered with the Software Engineering Institute (SEI) to conduct the first study to baseline the state of DoD DevSecOps, highlight successes, and offer insights for next steps. George Lamb, DoD’s Director of Cloud and Software Modernization, joins...

info_outline
I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds show art I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds

SEI Webcasts

Did you know there are 500 million tweets per day? 3 billion monthly active Facebook users? 1 billion LinkedIn members? Are you one of them? In this webcast, Destiney Marie Plaza reveals how a hacker can use seemingly benign public information to customize an attack on a victim by showing a scenario-based attack and demo (using free and open-source tools). Additionally, you will learn how hackers can gather information about you, common mistakes that put your information at risk, and how to protect yourself. What Attendees Will Learn: how to use open-source tools used to crack passwords,...

info_outline
A New Performance Zone for Software for National Security show art A New Performance Zone for Software for National Security

SEI Webcasts

Today, we have seen our national security organizations working to adopt modern software practices, particularly Agile methods and DevSecOps practices, efforts challenged by a mismatch of tempos between operational needs and development processes. The newly mandated Software Acquisition Pathway helps to align those tempos. However, to sustain a competitive advantage through software, we need to see our defense organizations recall and reapply disciplined engineering practices. What Attendees Will Learn: An assessment of current efforts to adopt modern software practices Why and where the pace...

info_outline
Identifying and Mitigating Cyber Risk show art Identifying and Mitigating Cyber Risk

SEI Webcasts

An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.

info_outline
Malware Research: If You Cannot Replicate it, You Will Not Use It show art Malware Research: If You Cannot Replicate it, You Will Not Use It

SEI Webcasts

Why aren't malware analysis practitioners making more use academic research results? In this webcast, we suggest that one reason is the general difficulty of replicating and reproducing research results in this field. We randomly selected 100 papers on "malware classification" from Google Scholar results and attempted to replicate each one. We were only able to find released code for 6 of these 100 papers, and what's worse, only 6 of the 88 remaining papers contained a specific listing for the algorithm. We offer suggestions for improving the state of the field and end with a call to action...

info_outline
 
More Episodes

Compliance standards, privileged access management, software bills of materials (SBOMs), maturity models, cloud services, vulnerability management, etc. The list of potential solutions to supply chain risk management (SCRM) challenges seems unending as much as it is daunting to address. In this webcast, Brett Tucker explores some of these solutions. More importantly, he renews an emphasis on using robust enterprise risk management to achieve operational resilience in the cyber supply chain.

What attendees will learn

  • A means of decomposing strategic objectives and critical services into high-value assets that point to prioritization of limited risk response resources
  • Enterprise risk governance, appetite, and policy as they relate to and integrate cyber risks into a global risk portfolio
  • The application and impacts of Cybersecurity Maturity Model Certification (CMMC) and other regulatory directives on third-party risk
  • A kick-off announcement about the SEI CERT Supply Chain Risk Management Symposium to be held in February 2024