6 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Ask Us Anything: Supply Chain Risk Management
According to the Verizon Data Breach Report, Log4j-related exploits have occurred less frequently over the past year. However, this Common Vulnerabilities and Exposures (CVE) flaw was originally documented in 2021. The threat still exists despite increased awareness. Over the past few years, the Software Engineering Institute (SEI) has developed guidance and practices to help organizations reduce threats to U.S. supply chains. In this webcast,...
January 31, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Leveraging Software Bill of Materials P...
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of leading practices for building an SBOM and using it to support risk reduction. The SEI SBOM Frame...
September 6, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Addressing Supply Chain Risk and Resili...
All technology acquired by an organization requires the support of (or integration with) components, tools, and services delivered by a diverse set of supply chains. However, the practices critical to addressing supply chain risks are typically scattered across many parts of the acquiring organization, and they are performed in isolated stovepipes. This situation causes inconsistencies, gaps, and slow response to crises. The Acquisition Securi...
February 21, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Follow the CUI: Setting the Boundaries...
One of the primary drivers of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) is the congressional mandate to reduce the risk of accidental disclosure of controlled unclassified information (CUI). However, a full CMMC assessment can seem daunting to organizations in the Defense Industrial Base (DIB), and many might not know where to start. In this webcast, Model Architects Gavin Jurecko and Matt Trevors will r...
September 15, 2020
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Risk Management for the Enterprise: Get...
Risk managers must often sift through the cacophony of demands for resources and advocacy to identify a diverse set of risks to include in their organization’s risk register. These managers of cyber risk face this problem when trying to prioritize risks within the scope of their function, only to then turn to executives and justify the need for resources. OCTAVE FORTE, a new and upcoming Enterprise Risk Management (ERM) process model dev...
August 19, 2020
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Cyber Hygiene: Why the Fundamentals Matter
In this webcast, as a part of National Cybersecurity Awareness Month, our experts will provide an overview of the concept of cyber hygiene, which bears an analogy to the concept of hygiene in the medical profession. Like the practice of washing hands to prevent infections, cyber hygiene addresses simple sets of actions that users can take to help reduce cybersecurity risks. Matt Butkovic, Randy Trzeciak, and Matt Trevors will discuss what some...
October 16, 2019
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Back to Search Begin New Search