show episodes
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork

1
The Learning Circle

Defense Acquisition University

Unsubscribe
Unsubscribe
Monthly
 
The show devoted to learning, instructional design and technology. We bring you conversations with leading lights in our industry. From theory to practice, from the classroom to online delivery, we cover it all. Brought to you by the award-winning Defense Acquisition University.
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

Unsubscribe
Unsubscribe
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
The Defense Entrepreneurs Forum (DEF) inspires, connects and empowers people in order to promote an innovative culture in the U.S. national security. The Minimum Viable Podcast (MVP) is our way of sharing about people, events, and activities going on across the virtuous insurgency. You should also follow us on social media and subscribe to our monthly newsletter to stay in the loop! You can learn more about the DEF community and get involved at def.org/join.
  continue reading
 
Loading …
show series
 
Within a very short amount of time, the productivity and creativity improvements envisioned by generative artificial intelligence (AI), such as using tools based on large language models (LLMs), have taken the software engineering community by storm. The industry is in a race to develop your next best software development tool. Organizations are pe…
  continue reading
 
Traditionally, cybersecurity has focused on finding and removing vulnerabilities. This is like driving backward down the highway using your rearview mirror. Most breaches are due to defects in design or code; thus, the only way to truly address the issue is to design and build more secure solutions. In this webcast, Tim Chick discusses how security…
  continue reading
 
Modern analytic methods, including artificial intelligence (AI) and machine learning (ML) classifiers, depend on correlations; however, such approaches fail to account for confounding in the data, which prevents accurate modeling of cause and effect and often leads to prediction bias. The Software Engineering Institute (SEI) has developed a new AI …
  continue reading
 
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these sys…
  continue reading
 
According to the Verizon Data Breach Report, Log4j-related exploits have occurred less frequently over the past year. However, this Common Vulnerabilities and Exposures (CVE) flaw was originally documented in 2021. The threat still exists despite increased awareness. Over the past few years, the Software Engineering Institute (SEI) has developed gu…
  continue reading
 
We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innova…
  continue reading
 
Compliance standards, privileged access management, software bills of materials (SBOMs), maturity models, cloud services, vulnerability management, etc. The list of potential solutions to supply chain risk management (SCRM) challenges seems unending as much as it is daunting to address. In this webcast, Brett Tucker explores some of these solutions…
  continue reading
 
Generative AI (GenAI) has been around for decades, but the latest leap in progress, fueled by high-capability large language models (LLMs), image and video generators, and AI pair programmers, has captivated audiences across a variety of disciplines. What can GenAI do well? What are the risks and opportunities of using GenAI? SEI experts Doug Schmi…
  continue reading
 
AI system trustworthiness is dependent on end users’ confidence in the system’s ability to augment their needs. This confidence is gained through evidence of the system’s capabilities. Trustworthy systems are designed with an understanding of the context of use and careful attention to end-user needs. In this webcast, SEI researchers discuss how to…
  continue reading
 
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of …
  continue reading
 
Insider threats pose an enduring, ever-evolving risk to an organization’s critical assets that require enterprise-wide participation to manage effectively. Many organizations struggle to make critical tasks in insider risk management “stick,” relying on several crutches to drive temporary organizational change, only to see those changes come undone…
  continue reading
 
In this webcast, Fred Schenker, Jerome Hugues, and Linda Parker Gates discuss the benefits of using a model-based approach to improve the design of a CPS’ embedded computing resources. This is accomplished by (1) building virtual architectural models of the CPS’ embedded computing resources early in the system development lifecycle and (2) using th…
  continue reading
 
The Rust programming language makes some strong claims about the security of Rust code. In this webcast, David Svoboda and Joe Sible will evaluate the Rust programming language from a cybersecurity perspective. They will examine Rust's security model, both in what it promises and its limitations. They will also examine how secure Rust code has been…
  continue reading
 
Historically, a lot of discussion in software security focused on the project level, emphasizing code scanning, penetration testing, reactive approaches for incident response, and so on. Today, the discussion has shifted to the program level to align with business objectives. In the ideal outcome of such a shift, software teams would act in alignme…
  continue reading
 
Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. Howe…
  continue reading
 
Join us as DEF's Executive Director sits with Dr. Marina Theodotou, Lolita Horne and Eric Farraro of DAU! Using industry and academic research, and insights from the workforce, the Defense Acquisition University (DAU) created the Innovation Competencies and Skills Model. The model includes a self-assessment and personalized learning recommendations…
  continue reading
 
In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges. They provide an overview of data science, including a discussion of what constitutes a good problem to solve with data science. They also discuss applying data science to cybersecurity cha…
  continue reading
 
As Artificial Intelligence permeates mission-critical capabilities, it is paramount to design modular solutions to ensure rapid evolution and interoperability. During this webcast, we’ll discuss some of the primary quality attributes guiding such design, and how a Next Generation Architecture can facilitate an integrated future state. What attendee…
  continue reading
 
All technology acquired by an organization requires the support of (or integration with) components, tools, and services delivered by a diverse set of supply chains. However, the practices critical to addressing supply chain risks are typically scattered across many parts of the acquiring organization, and they are performed in isolated stovepipes.…
  continue reading
 
DEF's executive director Trish Martinelli talks with Heath Murray, the Indiana Agora lead, about the recent DEF Drink and Think and the importance of local Agoras in the national DEF ecosystem. Trish and Heath also discussed the unique nature of the DEF community and how it connects and empowers innovative thinkers in the national security space.…
  continue reading
 
DEF's executive director Trish Martinelli talks with Nicholas Marchand, the lead for the 757 Agora. Nick hosted one of many DEF events on November 10, 2022, now unofficially known as National DEF Day. Trish and Nick discussed the 757 Agora, its unique position in the national security ecosystem, and the value local Agoras add to DEF's mission to in…
  continue reading
 
DEF's executive director Trish Martinelli talks with Alex Gorsuch, the Chicago Agora lead, about his recent DEFx event, the Chicago entrepreneurial ecosystem, and his company Ascent. Trish and Alex also discuss future plans for the Chicago Agora and for DEF overall, and why individuals interested in the national security innovation space should get…
  continue reading
 
Understanding and articulating cybersecurity risk is hard. With the adoption of DevSecOps tools and techniques and the increased coupling between the product being built and the tools used to build them, the attack surface of the product continues to grow by incorporating segments of the development environment. Thus, many enterprises are concerned…
  continue reading
 
As a Software Engineering community, we started to hear new words with new definitions to achieve some challenges with deciding the shelf life of said terms. Some examples include: DevOps is dead, long live NoOps, SecOps, NoCode, SRE, GitOps, and recently Platform Engineering. We often confuse these terms in order to achieve certain software engine…
  continue reading
 
Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning and configuration of their IT infrastructure. This concept also aids organizations in applying the DevOps process (plan, code, build, test, release, deploy, operate, monitor, repeat) to their infrastructure. Ansible is a popular choice within the IaC t…
  continue reading
 
The lack of qualified cybersecurity professionals in the United States is a threat to our national security. We cannot adequately protect the systems that our government, economy, and critical infrastructure sectors rely on without an appropriately sized cyber workforce. By some estimates, there are over 700,000 cybersecurity job openings across th…
  continue reading
 
Ransomware poses an imminent threat to most organizations. Whereas most traditional cyber attacks require extended threat actor engagement to seeking out critical information, exporting data, and demanding ransom from victims, ransomware shortens the process and puts immediate pressure on the victim to respond with payment. Unfortunately, the rise …
  continue reading
 
By all recent measures, the cybersecurity workforce is woefully understaffed. According to (ISC)², the cyber workforce gap in the United States was 377,000 open positions in 2021. The Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) has been working with the U.S. government to development novel approaches designed to shrink …
  continue reading
 
In this webcast, Carol Smith, Carrie Gardner, and Michael Mattarock discuss maturing artificial intelligence (AI) practices based on our current body of knowledge. Much as it did for software engineering in the 1980s, the SEI has begun formalizing the field of AI engineering, beginning with identifying three fundamental pillars to guide AI engineer…
  continue reading
 
What role do clear meaning and purpose play in performance? Wendi Peck and Bill Casey of Executive Leadership Group (ELG.net) join me to discuss "Success on Purpose," how the elevated "why" behind one's work is so vital to motivation, performance and success. The article, Success on Purpose, may be read at https://bit.ly/3DmfAjH / This special "epi…
  continue reading
 
DEF's executive director Trish Martinelli talks with Alexis Bonnell about her time as a facilitator at I Am Remarkable, a Google project seeking to inspire and empower working people to take pride in their achievements. This kind of empowerment is a critical component to true success and fulfillment in both the defense and innovation spheres.…
  continue reading
 
In this webcast, Shannon Gallagher and Dominic Ross discuss what deepfakes are, and how they are building AI/ML tech to distinguish real from fake. They will start with some well-known examples of deepfakes and discuss what makes them distinguishable as fake for people and computers.By Shannon Gallagher and Dominic Ross
  continue reading
 
Agile and DevSecOps have revolutionized software engineering practices. The strategies put forward in Agile and DevSecOps have eased many software engineering challenges and paved the way for continuous deployment pipelines. But what do you do when you're facing a problem that doesn't fit the model of a pure software engineering project? In this we…
  continue reading
 
We sit down with Cheryl Johnson, Learning Consultant and author of the book, AMBITION: The Missing Attribute in Your Employees. We use the concepts of IQ and EQ and AQ (Ambition Quotient) as a springboard for a conversation that explores human performance through the lens of Ambition. Johnson contends that "AQ" is the cream that rises to the top of…
  continue reading
 
Complex, cyber-physical DoD systems, such as aircraft, depend on correct timing to properly and reliably execute crucial sensing, computing, and actuation functions. In this webcast, SEI staff members Bjorn Andersson, PhD, Dionisio de Niz, PhD, and William Vance of the U.S. Army Combat Capabilities Development Command Aviation & Missile Center disc…
  continue reading
 
If we're honest, ELearning development can be overwhelming, especially for newer instructional designers. There's a wealth of theory to learn, plus multiple disciplines that come together to form the requisite skillset. Who can we turn to to make it easier? Tim Slade is an author, speaker and freelance eLearning designer who has been recognized and…
  continue reading
 
The Forrester report, "The Definition of Modern Zero Trust," defines Zero Trust as an information security model that denies access to applications and data by default. Zero Trust adoption can be difficult for organizations to undertake. It is not a specific technology to adopt; instead, it’s an initiative that an enterprise must understand, interp…
  continue reading
 
The National Security Innovation Network (NSIN “Esign”) runs a program called “Foundry” that matches DOD technology with Entrepreneurs with the goal of creating private entities to sell the DOD technology to both the commercial and public/DoD sector. Featuring: Mark Anholt – Program Manager of Foundry, can speak to program, selection critea, histor…
  continue reading
 
On January 31st, 2022 we hosted our first Agora Launch party. An event where we 'unboxed' the Agora-In-A-Box tool and demonstrated the process it takes to start a new Agora. We had a great turnout and are excited to see how many Agora will emerge in the coming months. If you weren't able to attend you can now listen to the recording from the event.…
  continue reading
 
The status quo for how we acquire cyber-physical weapon systems (CPS) needs to be changed. It is almost certain (for any acquisition of a CPS) that there will be cost overruns, schedule delays, and/or the loss of promised warfighter capability. Improved product development technologies could be applied, but they have not been adopted widely. We wil…
  continue reading
 
In this episode, Grace Lewis and Shane McGraw discuss how the SEI is applying research, through its highly successful Tactical and AI-Enabled Systems (TAS) initiative, to develop foundational principles, innovative solutions, and best practices for architecting, developing, and deploying tactical and AI-enabled systems. These systems will provide s…
  continue reading
 
On the 29th of January as another big storm bore down on the Northeast, the Defense Entrepreneurs Forum (DEF) held it’s quarterly volunteer summit, and the first Summit under the new Executive Director Trish Martinelli. More than 15 volunteers, leaders, staff, past and present Executive Directors, and DEF Board members kicked off the Summit and inv…
  continue reading
 
Zero Trust Architecture adoption is a challenge for many organizations. It isn't a specific technology to adopt; instead, it’s a security initiative that an enterprise must understand, interpret, and implement. Enterprise security initiatives are never simple, and their goal to improve the enterprise’s cybersecurity posture requires the alignment o…
  continue reading
 
In its 2021 report, the National Security Commission on AI (NSCAI) wrote, "The impact of artificial intelligence (AI) on the world will extend far beyond narrow national security applications." How do we move beyond those narrow AI applications to gain strategic advantage? Join Dr. Matt Gaston, Director of the SEI AI Division, Dr. Steve Chien, NSCA…
  continue reading
 
Dr. Patti Shank joins us to talk about her new book, Write Better Multiple Choice to Assess Learning. Often underestimated and sub-optimized, multiple choice questions are actually a powerful medium. Well-authored, they help us measure what matters in our learning. We explore the ways in which we go wrong and how to right the situation so we may ma…
  continue reading
 
Self-driving cars are being tested in our cities, bespoke movie and product recommendations populate our apps, and we can count on our phones to route us around highway traffic... Why, then, do most AI deployments fail? What is needed to create, deploy, and maintain AI systems we can trust to meet our mission needs, particularly for defense and nat…
  continue reading
 
Loading …

Quick Reference Guide