Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
The No Fluff Just Stuff (NFJS) Software Symposium Tour has delivered over 400 events with over 65,000 attendees. NFJS speakers are well-known developers, authors, and project leaders from the software development community. Join us for news and discussion around software development. Current topics include: Java, JavaScript, Scala, Groovy, Clojure, Cloud, Docker, Software Architecture, HTML 5, CSS, NoSQL, Spring, and other development technologies.
…
continue reading
An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.By Matt Butkovic, Greg Crabbe and Beth-Anne Bygum
…
continue reading

1
Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
…
continue reading

1
Threat Hunting: What Should Keep All of Us Up at Night
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
…
continue reading

1
Can a Cybersecurity Parametric Cost Model be Developed?
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
…
continue reading

1
Elements of Effective Communications for Cybersecurity Teams
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Communications, both in times of crisis and during normal operations, are essential to the overall success and sustainability of an incident response or security operations team. How you plan for and manage these communications and how they are received and actioned by your audience will influence your trustworthiness, reputation, and ultimately yo…
…
continue reading

1
Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Surviving disruptive cyber events requires a specific form of planning. One must strike a balance between defending against threats (e.g., managing conditions) and effectively handling the effects of disruption (e.g., managing consequences). Employing a model (such as the CERT Resilience Management Model) provides a catalog of practices and a syste…
…
continue reading
Chief Information Security Officers (CISOs) perpetually navigate a dynamic set of challenges. Applying focus and aligning resources is imperative for success. In this Intersect, Matthew Butkovic and Gregory Touhill, reflect on 2024 and explore the topics that should be front of mind for CISOs in 2025. They provide insights and advice for those cont…
…
continue reading

1
Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02No organization can comprehensively avoid disruptive cyber events. All must strive to maintain operational resilience during times of organizational stress. Ransomware incidents create disruption that can be fatal to the unprepared. In this webcast, we explore how to maintain operational resilience during a ransomware incident. Experts with varied …
…
continue reading
As the strategic importance of AI increases, so too does the importance of defending those AI systems. To understand AI defense, it is necessary to understand AI offense—that is, counter AI. In this session, Matthew Butkovic, CISA, CISSP, technical director for risk and resilience, and Nathan VanHoudnos, senior machine learning researcher explore t…
…
continue reading

1
Cyber Challenges in Health Care: Managing for Operational Resilience
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37Health-care organizations are seemingly besieged by a complex set of cyber threats. The consequences of disruptive cyber events in health care are in many ways uniquely troubling. Health-care organizations often face these challenges with modest resources. In this webcast, Matthew Butkovic and Darrell Keeling will explore approaches to maximize ret…
…
continue reading

1
Independent Verification and Validation for Agile Projects
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Traditionally, independent verification and validation (IV&V) is performed by an independent team throughout a program’s milestones or once the software is formally delivered. This approach allows the IV&V team to provide input at the various milestone gates. As more programs move to an Agile approach, those milestones aren’t as clearly defined sin…
…
continue reading

1
Generative AI and Software Engineering Education
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05Within a very short amount of time, the productivity and creativity improvements envisioned by generative artificial intelligence (AI), such as using tools based on large language models (LLMs), have taken the software engineering community by storm. The industry is in a race to develop your next best software development tool. Organizations are pe…
…
continue reading
Traditionally, cybersecurity has focused on finding and removing vulnerabilities. This is like driving backward down the highway using your rearview mirror. Most breaches are due to defects in design or code; thus, the only way to truly address the issue is to design and build more secure solutions. In this webcast, Tim Chick discusses how security…
…
continue reading

1
Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Modern analytic methods, including artificial intelligence (AI) and machine learning (ML) classifiers, depend on correlations; however, such approaches fail to account for confounding in the data, which prevents accurate modeling of cause and effect and often leads to prediction bias. The Software Engineering Institute (SEI) has developed a new AI …
…
continue reading

1
Using a Scenario to Reason About Implementing a Zero Trust Strategy
1:02:22
1:02:22
Play later
Play later
Lists
Like
Liked
1:02:22There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these sys…
…
continue reading

1
Ask Us Anything: Supply Chain Risk Management
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11According to the Verizon Data Breach Report, Log4j-related exploits have occurred less frequently over the past year. However, this Common Vulnerabilities and Exposures (CVE) flaw was originally documented in 2021. The threat still exists despite increased awareness. Over the past few years, the Software Engineering Institute (SEI) has developed gu…
…
continue reading

1
The Future of Software Engineering and Acquisition with Generative AI
1:32:10
1:32:10
Play later
Play later
Lists
Like
Liked
1:32:10We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innova…
…
continue reading

1
Cyber Supply Chain Risk Management: No Silver Bullet
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Compliance standards, privileged access management, software bills of materials (SBOMs), maturity models, cloud services, vulnerability management, etc. The list of potential solutions to supply chain risk management (SCRM) challenges seems unending as much as it is daunting to address. In this webcast, Brett Tucker explores some of these solutions…
…
continue reading

1
Ask Us Anything: Generative AI Edition
1:30:37
1:30:37
Play later
Play later
Lists
Like
Liked
1:30:37Generative AI (GenAI) has been around for decades, but the latest leap in progress, fueled by high-capability large language models (LLMs), image and video generators, and AI pair programmers, has captivated audiences across a variety of disciplines. What can GenAI do well? What are the risks and opportunities of using GenAI? SEI experts Doug Schmi…
…
continue reading

1
Evaluating Trustworthiness of AI Systems
1:02:08
1:02:08
Play later
Play later
Lists
Like
Liked
1:02:08AI system trustworthiness is dependent on end users’ confidence in the system’s ability to augment their needs. This confidence is gained through evidence of the system’s capabilities. Trustworthy systems are designed with an understanding of the context of use and careful attention to end-user needs. In this webcast, SEI researchers discuss how to…
…
continue reading

1
Leveraging Software Bill of Materials Practices for Risk Reduction
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of …
…
continue reading

1
Institutionalizing the Fundamentals of Insider Risk Management
56:33
56:33
Play later
Play later
Lists
Like
Liked
56:33Insider threats pose an enduring, ever-evolving risk to an organization’s critical assets that require enterprise-wide participation to manage effectively. Many organizations struggle to make critical tasks in insider risk management “stick,” relying on several crutches to drive temporary organizational change, only to see those changes come undone…
…
continue reading

1
What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems?
56:06
56:06
Play later
Play later
Lists
Like
Liked
56:06In this webcast, Fred Schenker, Jerome Hugues, and Linda Parker Gates discuss the benefits of using a model-based approach to improve the design of a CPS’ embedded computing resources. This is accomplished by (1) building virtual architectural models of the CPS’ embedded computing resources early in the system development lifecycle and (2) using th…
…
continue reading
The Rust programming language makes some strong claims about the security of Rust code. In this webcast, David Svoboda and Joe Sible will evaluate the Rust programming language from a cybersecurity perspective. They will examine Rust's security model, both in what it promises and its limitations. They will also examine how secure Rust code has been…
…
continue reading

1
Top 5 Challenges to Overcome on Your DevSecOps Journey
1:00:36
1:00:36
Play later
Play later
Lists
Like
Liked
1:00:36Historically, a lot of discussion in software security focused on the project level, emphasizing code scanning, penetration testing, reactive approaches for incident response, and so on. Today, the discussion has shifted to the program level to align with business objectives. In the ideal outcome of such a shift, software teams would act in alignme…
…
continue reading

1
Improving Analytics Using Enriched Network Flow Data
1:02:25
1:02:25
Play later
Play later
Lists
Like
Liked
1:02:25Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. Howe…
…
continue reading

1
How Can Data Science Solve Cybersecurity Challenges?
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges. They provide an overview of data science, including a discussion of what constitutes a good problem to solve with data science. They also discuss applying data science to cybersecurity cha…
…
continue reading
As Artificial Intelligence permeates mission-critical capabilities, it is paramount to design modular solutions to ensure rapid evolution and interoperability. During this webcast, we’ll discuss some of the primary quality attributes guiding such design, and how a Next Generation Architecture can facilitate an integrated future state. What attendee…
…
continue reading

1
Addressing Supply Chain Risk and Resilience for Software-Reliant Systems
1:01:31
1:01:31
Play later
Play later
Lists
Like
Liked
1:01:31All technology acquired by an organization requires the support of (or integration with) components, tools, and services delivered by a diverse set of supply chains. However, the practices critical to addressing supply chain risks are typically scattered across many parts of the acquiring organization, and they are performed in isolated stovepipes.…
…
continue reading

1
Does your DevSecOps Pipeline only Function as Intended?
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40Understanding and articulating cybersecurity risk is hard. With the adoption of DevSecOps tools and techniques and the increased coupling between the product being built and the tools used to build them, the attack surface of the product continues to grow by incorporating segments of the development environment. Thus, many enterprises are concerned…
…
continue reading

1
Finding Your Way with Software Engineering Buzzwords
1:01:38
1:01:38
Play later
Play later
Lists
Like
Liked
1:01:38As a Software Engineering community, we started to hear new words with new definitions to achieve some challenges with deciding the shelf life of said terms. Some examples include: DevOps is dead, long live NoOps, SecOps, NoCode, SRE, GitOps, and recently Platform Engineering. We often confuse these terms in order to achieve certain software engine…
…
continue reading
Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning and configuration of their IT infrastructure. This concept also aids organizations in applying the DevOps process (plan, code, build, test, release, deploy, operate, monitor, repeat) to their infrastructure. Ansible is a popular choice within the IaC t…
…
continue reading

1
Applying the Principles of Agile to Strengthen the Federal Cyber Workforce
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42The lack of qualified cybersecurity professionals in the United States is a threat to our national security. We cannot adequately protect the systems that our government, economy, and critical infrastructure sectors rely on without an appropriately sized cyber workforce. By some estimates, there are over 700,000 cybersecurity job openings across th…
…
continue reading

1
Ransomware: Defense and Resilience Strategies
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Ransomware poses an imminent threat to most organizations. Whereas most traditional cyber attacks require extended threat actor engagement to seeking out critical information, exporting data, and demanding ransom from victims, ransomware shortens the process and puts immediate pressure on the victim to respond with payment. Unfortunately, the rise …
…
continue reading

1
Using Open Source to Shrink the Cyber Workforce Gap
50:19
50:19
Play later
Play later
Lists
Like
Liked
50:19By all recent measures, the cybersecurity workforce is woefully understaffed. According to (ISC)², the cyber workforce gap in the United States was 377,000 open positions in 2021. The Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) has been working with the U.S. government to development novel approaches designed to shrink …
…
continue reading

1
Exploring an AI Engineering Body of Knowledge
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this webcast, Carol Smith, Carrie Gardner, and Michael Mattarock discuss maturing artificial intelligence (AI) practices based on our current body of knowledge. Much as it did for software engineering in the 1980s, the SEI has begun formalizing the field of AI engineering, beginning with identifying three fundamental pillars to guide AI engineer…
…
continue reading

1
What are Deepfakes, and How Can We Detect Them?
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00In this webcast, Shannon Gallagher and Dominic Ross discuss what deepfakes are, and how they are building AI/ML tech to distinguish real from fake. They will start with some well-known examples of deepfakes and discuss what makes them distinguishable as fake for people and computers.By Shannon Gallagher and Dominic Ross
…
continue reading

1
Adapting Agile and DevSecOps to Improve Non-Software Development Teams
1:03:07
1:03:07
Play later
Play later
Lists
Like
Liked
1:03:07Agile and DevSecOps have revolutionized software engineering practices. The strategies put forward in Agile and DevSecOps have eased many software engineering challenges and paved the way for continuous deployment pipelines. But what do you do when you're facing a problem that doesn't fit the model of a pure software engineering project? In this we…
…
continue reading

1
Predictable Use of Multicore in the Army and Beyond
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18Complex, cyber-physical DoD systems, such as aircraft, depend on correct timing to properly and reliably execute crucial sensing, computing, and actuation functions. In this webcast, SEI staff members Bjorn Andersson, PhD, Dionisio de Niz, PhD, and William Vance of the U.S. Army Combat Capabilities Development Command Aviation & Missile Center disc…
…
continue reading

1
Ask Us Anything: Zero Trust Edition
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27The Forrester report, "The Definition of Modern Zero Trust," defines Zero Trust as an information security model that denies access to applications and data by default. Zero Trust adoption can be difficult for organizations to undertake. It is not a specific technology to adopt; instead, it’s an initiative that an enterprise must understand, interp…
…
continue reading

1
Acquisition Disasters? Ideas For Reducing Acquisition Risk
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28The status quo for how we acquire cyber-physical weapon systems (CPS) needs to be changed. It is almost certain (for any acquisition of a CPS) that there will be cost overruns, schedule delays, and/or the loss of promised warfighter capability. Improved product development technologies could be applied, but they have not been adopted widely. We wil…
…
continue reading

1
Engineering Tactical and AI-Enabled Systems
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08In this episode, Grace Lewis and Shane McGraw discuss how the SEI is applying research, through its highly successful Tactical and AI-Enabled Systems (TAS) initiative, to develop foundational principles, innovative solutions, and best practices for architecting, developing, and deploying tactical and AI-enabled systems. These systems will provide s…
…
continue reading

1
A Cybersecurity Engineering Strategy for DevSecOps
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23In this webcast, Carol Woody presents the scope of a cybersecurity engineering strategy for DevSecOps along with the criticality of sharing information with direct and indirect stakeholders.By Carol Woody
…
continue reading
In this webcast, Brett Tucker, Ryan Zanin, and Abid Adam discuss the critical factors for risk executives to be successful to not only protect critical assets but also to take advantage of new opportunities created via the pandemic.By Brett Tucker, Ryan Zanin, and Abid Adam
…
continue reading
Zero Trust Architecture adoption is a challenge for many organizations. It isn't a specific technology to adopt; instead, it’s a security initiative that an enterprise must understand, interpret, and implement. Enterprise security initiatives are never simple, and their goal to improve the enterprise’s cybersecurity posture requires the alignment o…
…
continue reading

1
The Future of AI: Scaling AI Through AI Engineering
1:01:59
1:01:59
Play later
Play later
Lists
Like
Liked
1:01:59In its 2021 report, the National Security Commission on AI (NSCAI) wrote, "The impact of artificial intelligence (AI) on the world will extend far beyond narrow national security applications." How do we move beyond those narrow AI applications to gain strategic advantage? Join Dr. Matt Gaston, Director of the SEI AI Division, Dr. Steve Chien, NSCA…
…
continue reading

1
AI Engineering: Ask Us Anything About Building AI Better
1:04:47
1:04:47
Play later
Play later
Lists
Like
Liked
1:04:47Self-driving cars are being tested in our cities, bespoke movie and product recommendations populate our apps, and we can count on our phones to route us around highway traffic... Why, then, do most AI deployments fail? What is needed to create, deploy, and maintain AI systems we can trust to meet our mission needs, particularly for defense and nat…
…
continue reading

1
Balanced Approaches to Insider Risk Management
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53Misuse of authorized access to an organization’s critical assets is a significant concern for organizations of all sizes, missions, and industries. We at the CERT National Insider Threat Center have been collecting and analyzing data on incidents involving malicious and unintentional insider since 2001, and have worked with numerous organizations a…
…
continue reading

1
Software Development Open Forum: Ask Hasan Anything!
1:03:02
1:03:02
Play later
Play later
Lists
Like
Liked
1:03:02The software development lifecycle has changed a lot and continues to evolve. Almost every company now is a software company. Meeting business needs and adapting to the speed of the market for new features requires an agility mindset and continuous-delivery techniques throughout application-development lifecycles. You have software development and …
…
continue reading

1
Software Supply Chain Concerns for DevSecOps Programs
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47In a DevSecOps world the software supply chain extends beyond libraries upon which developed software depends. In this webinar we will look at the Solarwinds incident as a worst-case exemplifying the breadth of the software supply chain issues confronting complex DevSecOps programs. We will explore the important architectural aspects of DevSecOps t…
…
continue reading