icon-carat-right menu search cmu-wordmark
New DoD Memo Accelerates Software Acquisition Modernization

New DoD Memo Accelerates Software Acquisition Modernization

Article

The directive signals an accelerated uptake of the Software Acquisition Pathway, which reforms software development and acquisition within the Defense Department.

Read More
Silent Sentinel Tool Automates Software Risk Analysis

Silent Sentinel Tool Automates Software Risk Analysis

Article

The recently released open source tool provides software development and cybersecurity teams a consistent, repeatable process.

Read More
SEI Support for President's Cup Leaves Lasting Legacy

SEI Support for President's Cup Leaves Lasting Legacy

Article

As CISA’s sixth annual cybersecurity competition begins with a new supporting vendor, the SEI looks back at five years of success.

Read More
2024 SEI Research Review Materials Now Available

2024 SEI Research Review Materials Now Available

Article

The event’s videos, presentation slides, and posters showcase SEI methods, prototypes, and tools that address the nation’s software challenges.

Read More
Portend Toolset Creates Guardrails for Machine Learning Data Drift

Portend Toolset Creates Guardrails for Machine Learning Data Drift

Article

The SEI’s new, open source toolset provides an end-to-end machine-learning assurance solution for simulating drift, detecting it in operation, and generating alerts.

Read More
SEI Releases Security Engineering Framework

SEI Releases Security Engineering Framework

Article

The new framework compiles an actionable hierarchy of the key leading practices for building secure and resilient software-reliant systems.

Read More

Press Inquiries

SEI Public Relations
Media Line: 412-268-4793
Email: public-relations@sei.cmu.edu

Events

Apr 8

Insider Threat Program Manager (ITPM) Certificate Package

Apr 8-10, 2025
Training
In-Person

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Apr 8

Insider Threat Program Manager: Implementation and Operation

Apr 8-10, 2025
Training
In-Person

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Apr 23

Malware Research: If You Cannot Replicate it, You Will Not Use It

Apr 23, 2025 · 1:30-2:30PM (ET)
Free
SEI Speaking
Virtual Event

In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools can be more quickly used.

Register
Apr 28

Software Architecture: Principles and Practices

Apr 28-May 1, 2025
Training
Virtual Event

This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.

Register
May 6

Insider Threat Analyst

May 6-8, 2025
Training
Virtual Event

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Register