5 webcasts found
+ 12 past events found
Back to Search Begin New Search Save Search Auto-Notify
Hitting the Ground Running: Reviewing t...
In this webcast, CMMC Architects, Gavin Jurecko & Matt Trevors will provide insight on how to evaluate and assess your organization’s readiness for meeting the practice requirements of CMMC Level 1.
Add Favorite
Trust, Verify & Authorize with DevSecOps
You may have a secure application today, but you cannot guarantee that it will still be secure tomorrow. Application security is a living process that must be constantly addressed throughout the application lifecycle. This requires continuous security assessments at every phase of the software development lifecycle (SDLC). The SEI has researched a continuous authorization concept—DevSecOps—that allows for constant interaction betwe...
Add Favorite
A Discussion on DoD Software Advances a...
SEI Chief Technology Officer Tom Longstaff will interview Jeff Boleng, a senior advisor to the U.S. Department of Defense, on recent DoD software advances and accomplishments. They will discuss how the DoD is implementing recommendations from the Defense Science Board on continuous development of best practices for software, source selection for evaluating software factories, risk reduction and metrics for new programs, developing workforce co...
Add Favorite
Follow the CUI: Setting the Boundaries...
One of the primary drivers of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) is the congressional mandate to reduce the risk of accidental disclosure of controlled unclassified information (CUI). However, a full CMMC assessment can seem daunting to organizations in the Defense Industrial Base (DIB), and many might not know where to start. In this webcast, Model Architects Gavin Jurecko and Matt Trevors will r...
Add Favorite
What Is Cybersecurity Engineering and W...
When systems were predominately hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability. Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability—and its cyber risk! Software components are specified loosely, if at...
Add Favorite
Back to Search Begin New Search