Back to Search Begin New Search Save Search Auto-Notify
The Future of Software Engineering and...
We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innovation, concerns have emerged. These concerns encompass security risks, unforeseen failures, and is...
January 24, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Connecting Stakeholders for DoD Softwar...
The Deputy Secretary of Defense approved and signed the Department of Defense (DoD) Software Modernization Strategy on February 1, 2022. This act initiated a transformative journey for the department to deliver robust software capabilities at the pace of evolving demands. Though system complexity and stakeholder decentralization often challenge our ability to securely deliver capabilities on time and on budget, fostering collaboration and faci...
November 16, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Evaluating Trustworthiness of AI Systems
AI system trustworthiness is dependent on end users’ confidence in the system’s ability to augment their needs. This confidence is gained through evidence of the system’s capabilities. Trustworthy systems are designed with an understanding of the context of use and careful attention to end-user needs. In this webcast, we’ll discuss how to evaluate trustworthiness of AI systems given their dynamic nature and the challeng...
September 13, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Leveraging Software Bill of Materials P...
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of leading practices for building an SBOM and using it to support risk reduction. The SEI SBOM Frame...
September 6, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Top 5 Challenges to Overcome on Your De...
Historically, a lot of discussion in software security focused on the project level, emphasizing code scanning, penetration testing, reactive approaches for incident response, and so on. Today, the discussion has shifted to the program level to align with business objectives. In the ideal outcome of such a shift, software teams would act in alignment with business goals, organizational risk, and solution architecture and would understand that...
May 2, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
How Can Data Science Solve Cybersecurit...
In this talk, we will present and discuss approaches to using data science and machine learning to address cybersecurity challenges. We provide an overview of data science, including a discussion of what constitutes a good problem to solve with data science. We also discuss applying data science to cybersecurity challenges, highlighting specific challenges such as detecting advanced persistent threats (APTs), assessing risk and trust, determin...
March 28, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
AI Next Generation Architecture
As Artificial Intelligence permeates mission-critical capabilities, it is paramount to design modular solutions to ensure rapid evolution and interoperability. During this webcast, we’ll discuss some of the primary quality attributes guiding such design, and how a Next Generation Architecture can facilitate an integrated future state. What attendees will learn: current challenges facing AI engineering approaches to promoting interoperabi...
March 16, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Improving Analytics Using Enriched Netw...
Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. However, a consequence of this limited detail is that analysis results based on this data provide inf...
March 8, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Addressing Supply Chain Risk and Resili...
All technology acquired by an organization requires the support of (or integration with) components, tools, and services delivered by a diverse set of supply chains. However, the practices critical to addressing supply chain risks are typically scattered across many parts of the acquiring organization, and they are performed in isolated stovepipes. This situation causes inconsistencies, gaps, and slow response to crises. The Acquisition Securi...
February 21, 2023
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Finding Your Way with Software Engineer...
As a software engineering community, we have started to hear new sentences, words that help us meet the challenges of determining the shelf life of software engineering technologies and practices. Examples include the following: Sentences DevOps is dead. Long live NoOps. Terms/Phrases SecOps, NoCode, SRE, GitOps, and recently Platform Engineering. We often confuse these terms when trying to define certain software engineering job types. In res...
November 30, 2022
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Back to Search Begin New Search