
New Paper Recommends Secure by Design Standard
• Article
SEI CERT Division director Greg Touhill coauthored an AFCEA International study on how to make more secure software systems.
Read More
Secure Software by Design Event Opens Call for Participation and Registration
• Press Release
The two-day event in August will promote security as an integral aspect of the entire software lifecycle.
Read More
New Research Supports SEI AISIRT Mission to Secure Artificial Intelligence
• Article
Academia, industry, and the SEI collaborated to illuminate the need for coordinated disclosure of AI vulnerabilities and propose solutions.
Read More
New DoD Memo Accelerates Software Acquisition Modernization
• Article
The directive signals an accelerated uptake of the Software Acquisition Pathway, which reforms software development and acquisition within the Defense Department.
Read More
Silent Sentinel Tool Automates Software Risk Analysis
• Article
The recently released open source tool provides software development and cybersecurity teams a consistent, repeatable process.
Read More
SEI Support for President's Cup Leaves Lasting Legacy
• Article
As CISA’s sixth annual cybersecurity competition begins with a new supporting vendor, the SEI looks back at five years of success.
Read More
2024 SEI Research Review Materials Now Available
• Article
The event’s videos, presentation slides, and posters showcase SEI methods, prototypes, and tools that address the nation’s software challenges.
Read MoreEvents
Insider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterA New Performance Zone for Software for National Security
May 7, 2025 · 1:30-2:30PM (ET)
In this webcast, Hasan Yasar, Will Hayes, and Joe Yankel assert that software engineering practices are an ingredient that should not be left behind as national security and defense organizations adopt leap-ahead technologies.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterI Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
May 14, 2025 · 1:30-2:30PM (ET)
In this webcast, Destiney Marie Plaza reveals five ways to protect yourself from getting your password cracked.
RegisterAsh Carter Exchange on Innovation and National Security and A+ Expo 2025
Jun 2-4, 2025
Join us June 2-4, 2025, at The Ash Carter Exchange, co-located with the second AI+ Expo. This event, hosted by SCSP and Mrs. Stephanie Carter, is set to continue the extraordinary discussions and connections made at previous events.
Register