31 past events found
+ 4 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Ask Us Anything: Supply Chain Risk Management
According to the Verizon Data Breach Report, Log4j-related exploits have occurred less frequently over the past year. However, this Common Vulnerabilities and Exposures (CVE) flaw was originally documented in 2021. The threat still exists despite increased awareness. Over the past few years, the Software Engineering Institute (SEI) has developed guidance and practices to help organizations reduce threats to U.S. supply chains. In this webcast,...
January 31, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
The Future of Software Engineering and...
We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innovation, concerns have emerged. These concerns encompass security risks, unforeseen failures, and is...
January 24, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Connecting Stakeholders for DoD Softwar...
The Deputy Secretary of Defense approved and signed the Department of Defense (DoD) Software Modernization Strategy on February 1, 2022. This act initiated a transformative journey for the department to deliver robust software capabilities at the pace of evolving demands. Though system complexity and stakeholder decentralization often challenge our ability to securely deliver capabilities on time and on budget, fostering collaboration and faci...
November 16, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Evaluating Trustworthiness of AI Systems
AI system trustworthiness is dependent on end users’ confidence in the system’s ability to augment their needs. This confidence is gained through evidence of the system’s capabilities. Trustworthy systems are designed with an understanding of the context of use and careful attention to end-user needs. In this webcast, we’ll discuss how to evaluate trustworthiness of AI systems given their dynamic nature and the challeng...
September 13, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Leveraging Software Bill of Materials P...
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of leading practices for building an SBOM and using it to support risk reduction. The SEI SBOM Frame...
September 6, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Top 5 Challenges to Overcome on Your De...
Historically, a lot of discussion in software security focused on the project level, emphasizing code scanning, penetration testing, reactive approaches for incident response, and so on. Today, the discussion has shifted to the program level to align with business objectives. In the ideal outcome of such a shift, software teams would act in alignment with business goals, organizational risk, and solution architecture and would understand that...
May 2, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
How Can Data Science Solve Cybersecurit...
In this talk, we will present and discuss approaches to using data science and machine learning to address cybersecurity challenges. We provide an overview of data science, including a discussion of what constitutes a good problem to solve with data science. We also discuss applying data science to cybersecurity challenges, highlighting specific challenges such as detecting advanced persistent threats (APTs), assessing risk and trust, determin...
March 28, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
AI Next Generation Architecture
As Artificial Intelligence permeates mission-critical capabilities, it is paramount to design modular solutions to ensure rapid evolution and interoperability. During this webcast, we’ll discuss some of the primary quality attributes guiding such design, and how a Next Generation Architecture can facilitate an integrated future state. What attendees will learn: current challenges facing AI engineering approaches to promoting interoperabi...
March 16, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Improving Analytics Using Enriched Netw...
Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. However, a consequence of this limited detail is that analysis results based on this data provide inf...
March 8, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Addressing Supply Chain Risk and Resili...
All technology acquired by an organization requires the support of (or integration with) components, tools, and services delivered by a diverse set of supply chains. However, the practices critical to addressing supply chain risks are typically scattered across many parts of the acquiring organization, and they are performed in isolated stovepipes. This situation causes inconsistencies, gaps, and slow response to crises. The Acquisition Securi...
February 21, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Back to Search Begin New Search