Is Software Spoiling Us?
In an almost incalculable number of ways, we delight in software’s benefits with no appreciation for the software that provides them. It fuels the breakthroughs we enjoy as our mobile devices, self-parking automobiles, smart home appliances, online purchasing websites, and more. Have software’s repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
In this panel discussion you will learn
• examples of and some reasons for software advancements
• future directions for software and cybersecurity
• difficulties for DoD in adopting software advances
• some suggestions for DoD and government
Four Valuable Data Sources for Network Security Analytics
This webinar focused on the development and application of combined data analytics, with several examples of analytics that combine domain resolution data, network device inventory and configuration data, network flow records, and intrusion detection system alerts. An overall approach to analytic development, first covered in a previous webinar, will be further applied to the variety of data. Interaction with webinar participants will be used to both guide the discussion and to facilitate the selection of examples. The webinar covered:
Specific characteristics of each of these sources of data, along with how they can inform security operations
Applying analysis at scale that combines multiple data sources, along with exploring the analytic model
Using the results of these analytics to further understand and improve network security
Open questions and answers with the participants
Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
Today, we worry about attacks from cyber adversaries, malicious activities, insiders, a capable nation state, risks to systems and information, and so on. It’s a tall order to thwart the myriad threats, especially when our task is compounded by deficient legacy technologies and emerging new technologies. However, the key social and business issue is TRUST. Together, security, privacy, resilience, and accountability build trust.
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability. He will describe how such “ensurance” can be sustained now and for the long run, and how to weave a stronger fabric of trust in IT operations.
What Attendees Will Learn
How security, privacy, resilience, and accountability work together to build TRUST
The meaning of ENSURE, how it differs from assure and insure, and its role in building trust
How to identify EMERGING technologies that ensure security, privacy, resilience, or accountability
Three Secrets to Successful Agile Metrics
This webinar provides insights into effective metrics programs in government settings where an Agile approach is used for development and sustainment of software-reliant systems. Based on research and the experience of the SEI Agile In Government team, the webinar addresses three critical elements of successful metrics programs:
• Exercising due care in collecting and using data
• Accommodating perspectives of multiple socio-technical systems
• Using automation appropriately in data collection and analysis
What Attendees Will Learn
• Important perspectives on Lean and Agile that drive different metrics
• Examples of metrics well suited to Agile program management
• Illustrations of metrics that are counterproductive for Agile programs
• Contrasts in metrics suited to different domains (e.g., IT modernization, Embedded Weapons, and Internal R&D projects)
Five Keys to Effective Agile Test Automation for Government Programs
In this discussion-focused webinar, Bob Binder and SuZ Miller will discuss 5 key questions that government organizations contemplating embarking on adopting automated test techniques and tools in an Agile environment are likely to have. Although the answers to these questions will naturally be context-specific, Bob and SuZ will discuss factors that differentiate one context (and therefore, one answer) from another.
What Will Attendees Learn
Recognize key factors that determine an organization’s readiness to consider automated testing
List 2-5 questions the organization adopting automated testing should be able to answe