show episodes
 
Weekly interview show with people at the forefront of transformational technologies, scientific research, and bold new thinking that enables humans to operate at higher levels — better able to achieve whatever each person values most in life. This could be in fields as diverse as neuroscience, computer science, psychology, bio-tech, augmented reality, nutrition & fitness and so many more areas of pioneering work.
 
Loading …
show series
 
Software vulnerability coordination at the CERT Coordination Center (CERT/CC) has traditionally relied on a hub-and-spoke model, with reports submitted to analysts at the CERT/CC analysts who would then work with contact affected vendors. To scale communications and increase the level of collaboration between vulnerability reporters, coordinators, …
 
The COVID-19 pandemic has forced significant changes in enterprise work practices, including an increased use of telecommunications technologies required by the new work-from-home policies that most organizations have instituted in response. In this podcast, Phil Groce, a senior network defense analyst in the CERT Division of the Carnegie Mellon Un…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
Authority to Operate (ATO) is a process that certifies a system to operate for a certain period of time by evaluating the risk of the system's security controls. ATO is based on the National Institute of Standards and Technology’s Risk Management Framework (NIST 800-37). In this podcast, Shane Ficorilli and Hasan Yasar, both with the Carnegie Mello…
 
A pervasive belief in software engineering is that some programmers are much, much better than others (the times-10, or 10x, programmer), and that the skills, abilities, and talents of these programmers exert an outsized influence on that organizations’ success or failure. Bill Nichols, a researcher with the Carnegie Mellon University Software Engi…
 
Many organizations use the Common Vulnerability Scoring System (CVSS) to prioritize actions during vulnerability management. This podcast—which highlights the latest work in prioritizing actions during vulnerability management—presents a testable Stakeholder-Specific Vulnerability Categorization (SSVC) that avoids some problems with CVSS. SSVC take…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
Situational awareness makes it possible to get relevant information from across an organization, to integrate that information, and to disseminate it to help leaders make more informed decisions. In this SEI Podcast, Angela Horneman and Timothy Morrow, researchers in the SEI's CERT Division, discuss the importance of looking beyond the network to a…
 
My guest today is Akshay Kothari, the Chief Operating Officer at Notion. As COO, Akshay is one of the top people driving the ship at this next-generation software platform that's enabling everyday users to create their own software tools instead of settling for what's provided on the market. Despite Notion being a young and small company of around …
 
While actual quantum computers are available from several different companies, we are currently in the Noisy Intermediate-Scale Quantum (NISQ) era. Working in the NISQ era presents a number of challenges, and the SEI is working to use NISQ devices not only to solve specific mission applications for the Department of Defense, but also to help determ…
 
The Cybersecurity Maturity Model Certification (CMMC) for Defense Industrial Base (DIB) suppliers defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices f…
 
The Cybersecurity Maturity Model Certification (CMMC) for the Defense Industrial Base (DIB) defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices from mu…
 
The culture of computers and information technology changes quickly. The Future of Cyber Podcast series explores the future of cyber and whether we can use the innovations of the past to address the problems of the future. In our latest episode, Bobbie Stempfley, director of the SEI’s CERT Division, interviews Dr. Diana Burley, executive director a…
 
The Cybersecurity Maturity Model Certification (CMMC) for the Defense Industrial Base (DIB) defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices from mu…
 
Software development is shifting to incremental delivery to meet the demand for software quicker and at lower costs. With the current cyber threat climate, the demand for cybersecurity is growing but existing compliance processes focus on a completed product and do not support incremental delivery. Cybersecurity must be carefully woven into each in…
 
The Cybersecurity Maturity Model Certification (CMMC) defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices from multiple standards, including the Nation…
 
For more than 30 years, the cybersecurity community has worked to increase the effectiveness of our cybersecurity and resilience efforts. Today we face an explosion of devices, the pervasiveness of software, the threat of adversarial capability, and the dependence of national capabilities on the cyber domain. These challenges demand that we think a…
 
In this SEI podcast, Hasan Yasar and Jose Morales discuss challenges to implementing DevOps in highly regulated environments (HREs), exploring issues such as environment parity, the approval process, and compliance. This podcast is the second to explore DevOps in HREs.By Hasan Yasar
 
The culture of computers and information technology evolves quickly. In this environment, how can we build a culture of security through regulations and best practices when technology can move so much faster than legislative bodies? The Future of Cyber Podcast Series explores whether we can use the innovations of the past to address the problems of…
 
Artificially intelligent (AI) systems hold great promise to empower us with knowledge and enhance human effectiveness. As a senior research scientist in human-machine interaction at the Software Engineering Institute's Emerging Technology Center, Carol Smith works to further understand how humans and machines can better collaborate to solve importa…
 
Those who work in computing today bring a wide array of backgrounds and experiences to the profession. In this podcast learn how Madison Quinn Oliver, who wanted to work at Carnegie Mellon University since childhood, relied on a strong work ethic and lifelong pursuit of education to become an associate vulnerability engineer on the Vulnerability Co…
 
My guest today is Dr. Bertalan Mesko, also known as The Medical Futurist. He's the Director of The Medical Futurist Institute, delivers keynote addresses all over the world, and runs a popular magazine and YouTube channel on the future of medicine with an emphasis on how technology will shape healthcare. Dr. Mesko is a physician with a PhD in genom…
 
In this podcast, Allen Householder and David Warren discuss the CERT Guide to Coordinated Vulnerability Disclosure, which is intended for use by security researchers, software vendors, and other stakeholders in navigating the complexities of informing others about security vulnerabilities.By Allen Householder, David Warren
 
My guest today is Nir Eyal, who writes and teaches about the intersection of psychology, technology, and business. The MIT Technology Review dubbed Nir, "The Prophet of Habit-Forming Technology." Nir has taught at the Stanford Graduate School of Business and the Institute of Design at Stanford. He's the author of two bestselling books, "Hooked: How…
 
Dr. April Galyardt, a machine learning research scientist at the SEI, discusses her career journey, challenges, and lessons learned along the way. This episode is the latest installment in our series highlighting the work of women in software and cybersecurity.By Dr. April Galyardt
 
Computers and information technology are getting more and more integrated into our daily lives, so they need to be easy to use. But recent, historically large data breaches have demonstrated the need to make systems more secure and to protect information about individuals. How will the security−privacy−usability triangle successfully accommodate th…
 
For more than 30 years, the cybersecurity community has worked to increase the effectiveness of our cybersecurity and resilience efforts. Today we face an explosion of devices, the pervasiveness of software, the threat of adversarial capability, and the dependence of national capabilities on the cyber domain. These challenges demand that we think a…
 
In this podcast, Jeff Gennari and Cory Cohen discuss updates to the Pharos Binary Analysis Framework in GitHub, including a new plug-in to import OOAnalyzer analysis into the NSA's recently released Ghidra software reverse engineering tool suite.By Jeff Gennari, Cory Cohen
 
My guest today is Anders Ericsson, author of the renowned book "Peak: Secrets from the New Science of Expertise". He is among the world's leading authorities on how to new master skills. Anders is a Professor of Psychology and conducted much of the research on expertise and peak performance that Malcolm Gladwell famously referenced to develop the 1…
 
My guest today is Steven Kotler. Steven is one of the world's leading experts on achieving Ultimate Human Performance through Flow States. "Flow" is the cognitive state of full immersion and focus in which brain activity changes to enable peak human capability across an intellectual or physical activity. It's characterized by rapt attention so deep…
 
My guest today is Douglas Rushkoff, who has been named one of the “world’s ten most influential intellectuals” by MIT. He's an author and documentarian who studies human autonomy in the digital age. He's written over twenty books include the recently-published "Team Human", and he hosts a popular podcast, also called "Team Human", focusing on the e…
 
My guest today is Dr. Christof Koch, one of the worlds foremost experts on neuroscience and consciousness. Dr. Koch is the Chief Scientist and President of the Allen Institute for Brain Science. He recently released his latest book, The Feeling of Life Itself – Why Consciousness is Everywhere But Can’t be Computed. It explores new insights and pers…
 
Successful management of incidents that threaten an organization's computer security is a complex endeavor. Frequently an organization's primary focus is on the response aspects of security incidents, which results in its failure to manage incidents beyond simply reacting to threatening events. In this SEI Podcast, Robin Ruefle and Mark Zajicek dis…
 
In this SEI Podcast, Kristi Roth, a summer 2019 intern in the Software Solutions Division at the Software Engineering Institute, discusses the path that led from a childhood spent calculating math problems in her head to a high school Introduction to Programming class to Penn State University where she is a senior computer science major.…
 
My guest today is Paul Shapiro, author of the national bestseller "Clean Meat: How Growing Meat Without Animals Will Revolutionize Dinner and the World". He's also the CEO and co-founder of The Better Meat Co., a four-time TEDx speaker, the co-host of the Business for Good Podcast. In our conversation today we explore the future of food, with a par…
 
We explore Human Enhancement and Personal Performance Hacking with Matt Ward (@mattwardio), the host The Disruptors podcast, startup investor, adviser and business innovation consultant. Matt and I thought it would be fun to do two episodes, one here on MIND & MACHINE and the other on The Disruptors, where we explore what we've learned, the ideas w…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login