Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Welcome to the Osage Nation Podcast! This is 𐓂𐒼𐒻𐒼𐒻𐒷 “Talking To One Another” hosted by Wahzhazhe Communications. The Osage Nation Communications team led by Abby Mashunkashey continues to diversify our platforms in efforts to reach our Wahzhazhe people and other community members and allies from around the world. This podcast offers yet another way to access insights into Osage Nation governance, culture, history, education, community events, and more, with host Russ Tallchief and a variety ...
  continue reading
 
Artwork

1
Conservation Starters

Thurston Conservation District

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Conservation Starters is a podcast created by the Thurston Conservation District. This series is dedicated to empowering Thurston County residents to steward our shared natural resources. Through thoughtful conversations with TCD staff, community partners, and community members we explore a program or issue related to the work of the Conservation District and how our community can engage with us and our staff.
  continue reading
 
Get to know precision machining suppliers! Speaking of Suppliers is a brand new podcast where PMPA Technical Members are interviewed by PMPA Staff and share who they are, what they do and how they help the precision machining industry.
  continue reading
 
We are a team of 30+ highly skilled SEO professionals and web designers, all hand trained in my Standard Operating Procedures. All of the Rank Fortress Staff came to me needing to learn how to do SEO, and I have taught them everything required to rank a site or GMB listing. When I first started my Agency, it was just two vas, and over the past year, we quickly grew our agency to where it is now. With a specialized staff, each staff member has specific tasks they are responsible for. For exam ...
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
Artwork

1
Flat and Thru

Olivia Green & Leslie Smith

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Flat and Thru with Liv Green and Leslie Smith! We are diving into all things Field Hockey. In this podcast, we will be talking to coaches and recent graduates of all divisions and conferences, support staff, former club coaches and overall “hockey heads” about an array of topics that cover situations beyond the technical and tactical parts of the game. We are going to explore topics such as differences in collegiate divisions, daily life as a SA, mental health, physical training, ...
  continue reading
 
Loading …
show series
 
Explore how Osage culture and values are shaping the future of justice. Host Russ Tallchief sits down with Osage Nation Supreme Court Chief Justice Meredith Drent and Associate Professor Dr. Jean Dennison to discuss the integration of Osage language, traditions, and community values into the Nation’s judicial system. Hear how recent gatherings of t…
  continue reading
 
Bringing a codebase into compliance with the SEI CERT Coding Standards, requires a cost of time and effort, namely in the form of a static analysis tool. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making s…
  continue reading
 
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
  continue reading
 
The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
  continue reading
 
What does it mean to be a sovereign nation in the 21st century? Join Osage Nation Communications Manager Russ Tallchief, Osage Nation Supreme Chief Court Justice Meredith Drent, and Associate Professor Dr. Jean Denison as they explore the governance, history, and culture of the Osage Nation. This inaugural episode, "Nation with a Capital N," delves…
  continue reading
 
When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
  continue reading
 
Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
  continue reading
 
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
  continue reading
 
On this month's episode of Conservation Starters, we are joined by TCD's Board of Supervisors TJ Johnson, Betsie De Wreede, Doug Rushton, Marianne Tompkins, and David Iyall. During this episode, we get to know each of our board members and hear more about TCD's organizational goals. We discuss the responsibilities of board supervisors and learn mor…
  continue reading
 
Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI’s Tactical and AI-Enabled Systems Initiative, was elected the 2026 president of the IEEE Computer Society (CS), the largest community of computer scientists and engineers, with more than 370,000 members around the world. In…
  continue reading
 
Communications, both in times of crisis and during normal operations, are essential to the overall success and sustainability of an incident response or security operations team. How you plan for and manage these communications and how they are received and actioned by your audience will influence your trustworthiness, reputation, and ultimately yo…
  continue reading
 
Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mellon University Software Engineering Institute and the U.S. Army AI Integration Center (AI2C) discuss Machine Learning Test and Evaluation (MLTE), a new tool that provides a process and infrastructure for…
  continue reading
 
As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more important than ever. In this discussion moderated by Matthew Butkovic, technical director of risk and resilience in the SEI CERT Division, SEI director Paul Nielsen outlines the SEI’s work with the DoD on sof…
  continue reading
 
On this month's episode of Conservation Starters, we are joined by Senior WSU Extension Coordinator & Educator, Erica Guttman. During this episode we dive even deeper into the world of hedgerows, exploring hedgerow design and planting plans. We discuss how to examine your landscape and choose the best plants for your space. We also talk about sourc…
  continue reading
 
Surviving disruptive cyber events requires a specific form of planning. One must strike a balance between defending against threats (e.g., managing conditions) and effectively handling the effects of disruption (e.g., managing consequences). Employing a model (such as the CERT Resilience Management Model) provides a catalog of practices and a syste…
  continue reading
 
Chief Information Security Officers (CISOs) perpetually navigate a dynamic set of challenges. Applying focus and aligning resources is imperative for success. In this Intersect, Matthew Butkovic and Gregory Touhill, reflect on 2024 and explore the topics that should be front of mind for CISOs in 2025. They provide insights and advice for those cont…
  continue reading
 
No organization can comprehensively avoid disruptive cyber events. All must strive to maintain operational resilience during times of organizational stress. Ransomware incidents create disruption that can be fatal to the unprepared. In this webcast, we explore how to maintain operational resilience during a ransomware incident. Experts with varied …
  continue reading
 
On this month's episode of Conservation Starters we are joined by Xerces Society's Senior Endangered Species Conservation Biologist and Freshwater Mussel Lead, Emilie Blevins and Washington Department of Fish & Wildlife's Native Freshwater Fish and Freshwater Shellfish Specialist, Marie Winkowski to discuss the secret strength of freshwater mussels…
  continue reading
 
As the strategic importance of AI increases, so too does the importance of defending those AI systems. To understand AI defense, it is necessary to understand AI offense—that is, counter AI. In this session, Matthew Butkovic, CISA, CISSP, technical director for risk and resilience, and Nathan VanHoudnos, senior machine learning researcher explore t…
  continue reading
 
Containerization allows developers to run individual software applications in an isolated, controlled, repeatable way. With the increasing prevalence of cloud computing environments, containers are providing more and more of their underlying architecture. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Sasa…
  continue reading
 
Software cost estimation is an important first step when beginning a project. It addresses important questions regarding budget, staffing, scheduling, and determining if the current environment will support the project. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Anandi Hira, a data scientist on the SEI…
  continue reading
 
On this month's episode of Conservation Starters we are joined by TCD's Senior Natural Resource Specialist, Emily Landrus and Natural Resource Specialist, Aimee Richardson to discuss our farm equipment rental program. Together, we discuss all the details about the low-cost farm equipment and hand tools we rent as a resource to our local community. …
  continue reading
 
Health-care organizations are seemingly besieged by a complex set of cyber threats. The consequences of disruptive cyber events in health care are in many ways uniquely troubling. Health-care organizations often face these challenges with modest resources. In this webcast, Matthew Butkovic and Darrell Keeling will explore approaches to maximize ret…
  continue reading
 
Traditionally, independent verification and validation (IV&V) is performed by an independent team throughout a program’s milestones or once the software is formally delivered. This approach allows the IV&V team to provide input at the various milestone gates. As more programs move to an Agile approach, those milestones aren’t as clearly defined sin…
  continue reading
 
One of the biggest challenges in collecting cybersecurity metrics is scoping down objectives and determining what kinds of data to gather. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Bill Nichols, who leads the SEI’s Software Engineering Measurements and Analysis Group, discusses the importance of cyber…
  continue reading
 
To make secure software by design a reality, engineers must intentionally build security throughout the software development lifecycle. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Timothy A. Chick, technical manager of the Applied Systems Group in the SEI’s CERT Division, discusses building, designing, …
  continue reading
 
On this month's episode of Conservation Starters, we are joined by our local Master Gardener, Cor Carlton, WSU Master Gardener and Master Recycler Composter Program Manager. Together, we talk about the two programs she manages and discuss how to get involved. She shares fall gardening tips and we share information about our annual plant sales. Reso…
  continue reading
 
Harmful biases in large language models (LLMs) make AI less trustworthy and secure. Auditing for biases can help identify potential solutions and develop better guardrails to make AI safer. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Katie Robinson and Violet Turri, researchers in the SEI’s AI Division,…
  continue reading
 
In the wake of widespread adoption of artificial intelligence (AI) in critical infrastructure, education, government, and national security entities, adversaries are working to disrupt these systems and attack AI-enabled assets. With nearly four decades in vulnerability management, the Carnegie Mellon University Software Engineering Institute (SEI)…
  continue reading
 
On this month's episode of Conservation Starters sit down with TCD's Senior Natural Resource Specialist, Kendall Carman to better understand the way we support community members in the Thurston County. Together, we break down what terms like technical assistance and cost-share mean. We also discuss what these processes look like and share resources…
  continue reading
 
The exposed and public nature of application programming interfaces (APIs) come with risks including the increased network attack surface. Zero trust principles are helpful for mitigating these risks and making APIs more secure. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconiers-Hasan, a solu…
  continue reading
 
How can we effectively use large language models (LLMs) for cybersecurity tasks? In this Carnegie Mellon University Software Engineering Institute podcast, Jeff Gennari and Sam Perl discuss applications for LLMs in cybersecurity, potential challenges, and recommendations for evaluating LLMs.
  continue reading
 
Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategically deciding what is needed and how to effectively achieve it. Both business and government acquisition domains use CBP for financial success or to design a well-balanced defense system. The definitions understa…
  continue reading
 
Loading …
Listen to this show while you explore
Play