SEI Webcasts-logo

SEI Webcasts

Technology Podcasts >

SEI experts offer a scheduled presentation and Q&A as a webinar that is recorded live and later offered as a webcast.

SEI experts offer a scheduled presentation and Q&A as a webinar that is recorded live and later offered as a webcast.
More Information

Location:

United States

Description:

SEI experts offer a scheduled presentation and Q&A as a webinar that is recorded live and later offered as a webcast.

Twitter:

@SEINews

Language:

English

Contact:

412-268-5800


Episodes

Secure Your Code with AI and NLP

6/6/2019
More
As every software engineer knows, writing secure software is an incredibly difficult task. There are many techniques available to assist developers in finding bugs hiding in their code, but none are perfect, and an adversary only needs one to cause problems. In this talk, we’ll discuss how a branch of artificial intelligence called Natural Language Processing, or NLP, is being applied to computer code. Using NLP, we can find bugs that aren’t visible to existing techniques, and we can start...

Duration:00:58:39

What Makes a Good Software Architect (2019 Edition)?

4/10/2019
More
In 2017, the Software Engineering Institute (SEI) Webcast, What Makes a Good Software Architect? (https://www.youtube.com/watch?v=CbLJC...) explored the skills and knowledge needed by successful software architects. The architect’s role continues to evolve; in this webcast we revisited the question in the context of today’s role and responsibilities. We explored the challenges of working in an environment with rapidly evolving technology options, such as the serverless architecture style,...

Duration:01:01:00

Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator

3/18/2019
More
Cybersecurity operators have to keep up with a world that's constantly changing, and they may lack the tools, time, and access to learn how to face actual threats. Simulated environments may not appear or behave the way they do in real life, and classroom-based approaches don’t provide the big picture. Throughout this talk, our team of researchers and engineers discuss the solutions we developed to help achieve a new level of realism in simulated cyber environments. Specific solutions...

Duration:01:02:12

Improve Your Static Analysis Audits Using CERT SCALe

12/20/2018
More
In this webcast, Lori Flynn, a CERT senior software security researcher, describes the new features in SCALe v3, a research prototype tool. SCALe v2, available on GitHub, offers a subset of features available in SCALe v3. Over the last three years, as part of alert classification and prioritization research projects she has led, her team has added new features to the (privately released) 2015 version of SCALe (v1) that are intended to assist with automated static analysis alert...

Duration:01:00:53

Digital Footprints: What Can be Learned from the Traces We Leave on Social Networks

11/1/2018
More
In this first webcast in a two-part series, April Galyardt and Carson Sestili described what metadata is and what information can be gleaned from it. Social networks have become part of our daily lives. We browse, share, “like,” and generally communicate with friends using these tools every day. In the midst of all this, we rarely stop to consider how much information about ourselves we are freely handing over to the social network companies. This information, called “metadata,”...

Duration:01:03:48

Blockchain: Your Questions. Our Answers.

11/1/2018
More
In this webcast, we explain how the technology works and what makes it fundamentally different than its predecessors. We discuss where it fits (and where it doesn’t fit) and help set a rubric to help you determine if you need this technology.

Duration:01:01:26

Three Software Innovations that DoD Needs Now

3/9/2018
More
Watch Jeff Boleng, Robert Schiela, Samuel Procter, Lena Pons, and Nathan VanHoudnos discuss "Three Software Innovations that DoD Needs Now".

Duration:01:02:47

Agile and DevOps: Your Questions. Our Answers.

3/2/2018
More
Watch this lively discussion in which we answered attendee questions on all things Agile and DevOps.

Duration:00:36:23

Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability

11/28/2017
More
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability.

Duration:01:06:07

Is Software Spoiling Us?

11/20/2017
More
Have software's repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?

Duration:01:00:56

Four Valuable Data Sources for Network Security Analytics

10/5/2017
More
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.

Duration:00:46:57

Three Secrets to Successful Agile Metrics

9/11/2017
More
Watch this webcast to gain insights into effective metrics programs in government settings.

Duration:01:24:16

Five Keys to Effective Agile Test Automation for Government Programs

8/25/2017
More
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss 5 key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment are likely to have.

Duration:01:29:54

The Evolving Role of the Chief Risk Officer

8/25/2017
More
In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.

Duration:01:04:55

Practical Considerations in Adopting Agile-Lean in Government Settings

7/5/2017
More
This webinar summarizes much of what the SEI has learned in its eight years of researching and facilitating adoption of Agile and Lean methods in software-reliant systems in government.

Duration:01:01:12

Building Analytics for Network Flow Records

5/1/2017
More
Network flow records provide a useful overview of traffic on a network that uses the Internet protocol (IP) to pass information. Huge numbers of bytes and thousands of packets can be summarized by a relatively small number of records, with few privacy concerns and a small record size (which aids both speed of retrieval and duration of storage). However, examining these records to build an awareness of the security situation on a network requires automation, and it can be daunting to develop...

Duration:00:59:04

5 Things You Need to Know About Leading a Successful Large IT Modernization Project

3/6/2017
More
In this webinar, we discuss topics to consider when planning a large modernization project and share mitigation strategies for executing the modernization effort.

Duration:00:59:59

Building and Scaling a Malware Analysis System

1/19/2017
More
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.

Duration:01:02:28

How to Reduce the Graveyard of Software Tools with UI/UX Capability

1/19/2017
More
For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this impacts the software quality outcomes.

Duration:01:04:57

From Secure Coding to Secure Software

11/11/2016
More
In this webinar, we discussed how you can improve your organization's secure coding capabilities and how to improve your workforce, processes, and tools to develop and verify the security of your software before it is deployed.

Duration:01:04:20