Events
Threat Hunting: What Should Keep All of Us Up at Night
Mar 26, 2025 · 1-2PM (ET)
In this webcast, Dan Ruef explains how cybersecurity professionals can stay on task to secure networks and systems even as the big promises of the latest and greatest tools and other distractions vie for their attention.
RegisterNew Data Exchange Standard Eases Insider Incident Data Collection and Sharing
Apr 2, 2025 · 2:30-3:30PM (ET)
In this webcast, Austin Whisnant and Dan Costa introduce The Insider Incident Data Exchange Standard (IIDES) that enables researchers and practitioners to easily build insider threat case data and share analysis and insights.
RegisterNavy League Sea Air Space (SAS) 2025
Apr 7-9, 2025
The SEI will be exhibiting at Sea-Air-Space, the premier maritime exposition in the U.S. Powered by the Navy League of the United States, SAS brings together defense industry leaders and top military decision-makers from around the world to share the latest advancements in the maritime domain. SAS is a must-attend for anyone invested in the future of U.S. maritime strength and innovation.
Register40th Space Symposium 2025
Apr 7-10, 2025
Space Symposium is the premier event uniting global space professionals from all sectors, providing a unique platform to explore critical space issues, foster dialogue, and drive innovation across the space industry.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Apr 8-10, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Apr 8-10, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterSoftware Architecture: Principles and Practices
Apr 28-May 1, 2025
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterAsh Carter Exchange on Innovation and National Security and A+ Expo 2025
Jun 2-4, 2025
Join us June 2-4, 2025, at The Ash Carter Exchange, co-located with the second AI+ Expo. This event, hosted by SCSP and Mrs. Stephanie Carter, is set to continue the extraordinary discussions and connections made at previous events.
RegisterSoftware Architecture Design and Analysis
Jun 10-13, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Risk Management Symposium 2025
Jun 12, 2025
The theme of this year's event is “Technology-Driven Changes to the Insider Risk Landscape". This symposium will explore how recent technical advancements have changed the threat landscape for insider risk management program practitioners, and how these same emerging technologies can (and cannot) be used to help organizations more effectively manage insider risk.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jun 24-26, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Jun 24-26, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInternational Workshop on Envisioning the AI-Augmented Software Development Life Cycle
Jun 26, 2025 · Full Day
This workshop, collocated with FSE 2025, seeks to explore how AI might transform end-to-end software systems development workflows and emphasizes the need to collect relevant data now to assess the long-term effects of AI throughout the software development life cycle (SDLC).
RegisterTechnical Meeting for CSIRTs with National Responsibility (NatCSIRT 2025)
Jun 27, 2025
The 20th Annual Technical Meeting for CSIRTs with National Responsibility (NatCSIRT 2025) is an invitation-only meeting restricted to technical and managerial staff members of National CSIRTs. The meeting provides a forum for National CSIRTs to share information, tools, techniques, and strategies that address problems unique to CSIRTs that are responsible for a nation or economy.
RegisterInsider Threat Program Manager: Implementation and Operation
Jul 22-24, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jul 22-24, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterCybersecurity Oversight for the Business Executive
Jul 29-30, 2025
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
RegisterDocumenting Software Architectures
Aug 4-7, 2025
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Aug 5-7, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Aug 5-7, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDesigning Modern Service-Based Systems
Aug 11, 2025
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
RegisterSoftware Architecture Design and Analysis
Aug 12-15, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterDesign Guidelines and Patterns for Microservices
Aug 18-21, 2025
This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
RegisterAFCEA TechNet Augusta 2025
Aug 18-21, 2025
With assistance from the U.S. Army Cyber Center of Excellence and industry, this three-day conference is designed to open the lines of communication between the military and commercial sector and provide a space where government and industry professionals can discuss issues and share solutions surrounding cyber electromagnetic activities and unified land operations.
RegisterSecure Software by Design 2025
Aug 19-20, 2025
Join thought leaders in Secure Software by Design for presentations and discussions on all aspects of secure software systems development including application threat modeling, development of security requirements, secure software architectures, DevSecOps, secure development platforms & pipelines, software assurance, secure coding practices, software testing, and more.
RegisterModel-Based Systems Engineering (MBSE) Conference 2025
Aug 21, 2025
Join us to gain practical insights from seasoned MBSE adopters, discover innovative solutions to common challenges, and shape the future of systems engineering in an increasingly complex world.
RegisterInsider Threat Program Manager: Implementation and Operation
Sep 16-18, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Sep 16-18, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterAdvanced Topics in Incident Handling
Sep 23-26, 2025
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
RegisterDeveloping a National or Government CSIRT
Oct 7-8, 2025
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.
RegisterSoftware Architecture Design and Analysis
Oct 14-17, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterRisk Program Development - Governance and Appetite Workshop
Oct 15-16, 2025
This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.
RegisterInsider Threat Program Manager: Implementation and Operation
Oct 21-23, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Oct 21-23, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Oct 28-30, 2025
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Risk Management: Measures of Effectiveness
Oct 28-30, 2025
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterIntroduction to the CERT Resilience Management Model
Dec 2-3, 2025
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
RegisterInsider Threat Analyst
Dec 9-11, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Register