9 past events found
Back to Search Begin New Search Save Search Auto-Notify
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
IEEE 2675 DevOps Standard to Build Reli...
IEEE 2675 standard specifies technical principles and practices to build, package, and deploy systems and applications in a reliable and secure way. The standard focuses on establishing effective compliance and IT controls. It presents principles of DevOps including mission first, customer focus, shift-left, continuous everything, and systems thinking. It also describes how stakeholders, including developers and operations staff, can collabora...
April 28, 2021
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Amplifying Your Privacy Program: Strate...
Privacy protection isn't just a compliance activity. but It’s also a key area of organizational risk that requires enterprise-wide support and participation; careful planning; and forward-leaning, data-driven controls. In this webcast, we highlight best practices for privacy program planning and implementation. We present strategies for leveraging existing capabilities within your organization to further advance privacy program building,...
March 31, 2021
Organizer: CMU - SEI
Location: Webcast
Add Favorite
FloCon 2021
Our theme of Using Data to Defend is more critical than ever, given the security challenges of moving customers and vendors online and supporting a remote workforce. The online conference will be held on January 12-15, 2021. FloCon 2021 focuses on using “big data” to solve difficult security problems. Its practical, practitioner-oriented sessions feature online training, presentations, and keynote speakers from the security and dat...
January 12-15, 2021
Organizer: CMU - SEI
Location: Virtual
Add Favorite
Threats for Machine Learning
This webcast illustrated where machine learning applications can be attacked, the means for carrying out the attack and some mitigations that can be employed. The elements in building and deploying a machine learning application are reviewed, considering both data and processes. The impact of attacks on each element is considered in turn. Special attention is given to transfer learning, a popular way to construct quickly a machine learning app...
October 6, 2020
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Risk Management for the Enterprise: Get...
Risk managers must often sift through the cacophony of demands for resources and advocacy to identify a diverse set of risks to include in their organization’s risk register. These managers of cyber risk face this problem when trying to prioritize risks within the scope of their function, only to then turn to executives and justify the need for resources. OCTAVE FORTE, a new and upcoming Enterprise Risk Management (ERM) process model dev...
August 19, 2020
Organizer: CMU - SEI
Location: Webcast
Add Favorite
A Discussion on DoD Software Advances a...
SEI Chief Technology Officer Tom Longstaff will interview Jeff Boleng, a senior advisor to the U.S. Department of Defense, on recent DoD software advances and accomplishments. They will discuss how the DoD is implementing recommendations from the Defense Science Board on continuous development of best practices for software, source selection for evaluating software factories, risk reduction and metrics for new programs, developing workforce co...
May 18, 2020
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Cyber Hygiene: Why the Fundamentals Matter
In this webcast, as a part of National Cybersecurity Awareness Month, our experts will provide an overview of the concept of cyber hygiene, which bears an analogy to the concept of hygiene in the medical profession. Like the practice of washing hands to prevent infections, cyber hygiene addresses simple sets of actions that users can take to help reduce cybersecurity risks. Matt Butkovic, Randy Trzeciak, and Matt Trevors will discuss what some...
October 16, 2019
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Software and Cyber Solutions Symposium 2019
Moving applications and data to the cloud has many benefits, including lower costs, accelerated computing speed, and the rapid provisioning of systems. The federal government is working to leverage the “anywhere, anytime” benefits of the cloud and has made cloud-adoption a central tenet of its IT modernization strategy. But choosing cloud services without becoming fully informed of the risks can also expose you to myriad commercial...
September 10-11, 2019
Organizer: CMU - SEI
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search