Rank #1: Three Software Innovations that DoD Needs Now
Watch Jeff Boleng, Robert Schiela, Samuel Procter, Lena Pons, and Nathan VanHoudnos discuss "Three Software Innovations that DoD Needs Now".
Mar 09 2018
Rank #2: Agile and DevOps: Your Questions. Our Answers.
Watch this lively discussion in which we answered attendee questions on all things Agile and DevOps.
Mar 02 2018
Rank #3: Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability.
Nov 28 2017
Rank #4: Is Software Spoiling Us?
Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
Nov 20 2017
Rank #5: Four Valuable Data Sources for Network Security Analytics
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.
Oct 05 2017
Rank #6: Three Secrets to Successful Agile Metrics
Watch this webcast to gain insights into effective metrics programs in government settings.
Sep 11 2017
Rank #7: Five Keys to Effective Agile Test Automation for Government Programs
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss 5 key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment are likely to have.
Aug 25 2017
Rank #8: Practical Considerations in Adopting Agile-Lean in Government Settings
This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.
Jul 05 2017
Rank #9: 5 Things You Need to Know About Leading a Successful Large IT Modernization Project
In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.
Mar 06 2017
Rank #10: Secure Coding Best Practices
Learn why secure coding practices are important to reduce common programming errors that lead to vulnerabilities.
Aug 01 2016
Rank #11: Security Requirements Engineering
Learn the importance of developing security requirements in the same time frame as functional requirements.
Aug 01 2016
Rank #12: Secure Software Development Landscape
Last summer's Wired article describing vulnerabilities in the Jeep shows that software is being created and deployed with exploitable, yet avoidable, security flaws. So far, the automotive attacks have been largely demonstrations. However, successful cyber-attacks have been carried out on steel furnaces in Germany and the electrical grid in Ukraine. Insecurely written software in cyber-physical systems places people and property in jeopardy. Fortunately, there are many techniques available to those building software for cyber physical systems that can greatly reduce their vulnerability. This talk starts with an in-depth review of the Jeep scenario. It then examines how security can be introduced throughout the software development lifecycle to blunt such vulnerabilities.
Jul 30 2016
Rank #13: What Makes a Good Software Architect?
Jun 02 2016
Rank #14: A Taxonomy of Testing Types
Jan 28 2016
Rank #15: Cyber-Vulnerabilities in Aviation Today
SEI Chief Operating Officer, Robert F. Behler discusses Cyber-Vulnerabilities in Aviation Today.
Dec 16 2015
Rank #16: Web Traffic Analysis with CERT Tapioca
Will Dormann discusses a tool that shows whether a connection to the web is secure and what information is being transmitted.
Dec 16 2015
Rank #17: Generalized Automated Cyber-Readiness Evaluator (ACE)
Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.
Dec 16 2015
Rank #18: Culture Shock: Unlocking DevOps with Collaboration and Communication
Aug 27 2015
Rank #19: Advancing Cyber Intelligence Practices Through the SEI's Consortium
Sound cyber intelligence practices can help organizations prevent or mitigate major security breaches. For several years, researchers at the SEI have been examining methodologies, processes, technology, and training to help organizations understand what it means to perform the work of cyber intelligence. To spur further development and advance understanding in this important area, the SEI launched the Cyber Intelligence Research Consortium, aimed at helping organizations make better judgments and quicker decisions related to cyber intelligence. The consortium's membership consists of practitioners and decision makers from multiple sectors, including government, energy, banking, defense contracting, and academia. At this webinar SEI practitioners will provide a detailed overview of the consortium's work during this inaugural year. Efforts for this year include how-to guides for navigating key analytical practices and technologies, tradecraft labs, and an in-person crisis simulation event. Webinar participants will also receive a guide for evaluating intelligence they can use in their own organizations.
Feb 20 2015
Rank #20: Lessons in External Dependency and Supply Chain Risk Management
Jan 05 2015