63 subscribers
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


Adapting Agile and DevSecOps to Improve Non-Software Development Teams
Manage episode 335536172 series 1264075
Agile and DevSecOps have revolutionized software engineering practices. The strategies put forward in Agile and DevSecOps have eased many software engineering challenges and paved the way for continuous deployment pipelines. But what do you do when you're facing a problem that doesn't fit the model of a pure software engineering project?
In this webcast, we will share our experiences applying Agile and DevSecOps practices in atypical ways. We will focus our discussion around two atypical examples:
1) managing a program office’s acquisition process 2) developing and maintaining computing enclave operations
Using these examples, we will discuss the specific applications of the tools and practices we used to enhance a team's capabilities and better support end users' missions. We will also share the lessons we learned along the way.
165 פרקים
Manage episode 335536172 series 1264075
Agile and DevSecOps have revolutionized software engineering practices. The strategies put forward in Agile and DevSecOps have eased many software engineering challenges and paved the way for continuous deployment pipelines. But what do you do when you're facing a problem that doesn't fit the model of a pure software engineering project?
In this webcast, we will share our experiences applying Agile and DevSecOps practices in atypical ways. We will focus our discussion around two atypical examples:
1) managing a program office’s acquisition process 2) developing and maintaining computing enclave operations
Using these examples, we will discuss the specific applications of the tools and practices we used to enhance a team's capabilities and better support end users' missions. We will also share the lessons we learned along the way.
165 פרקים
כל הפרקים
×
1 The State of DevSecOps in the DoD: Where We Are, and What’s Next 58:42

1 I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds 57:16

1 A New Performance Zone for Software for National Security 1:02:23

1 Identifying and Mitigating Cyber Risk 47:33

1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07

1 Cybersecurity Priorities in 2025 32:21

1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05

1 Secure Systems Don’t Happen by Accident 59:08

1 Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance 38:50

1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22

1 Ask Us Anything: Supply Chain Risk Management 41:11

1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10

1 Cyber Supply Chain Risk Management: No Silver Bullet 38:40

1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03

1 Institutionalizing the Fundamentals of Insider Risk Management 56:33

1 What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems? 56:06

1 Will Rust Solve Software Security? 53:38

1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31

1 Does your DevSecOps Pipeline only Function as Intended? 52:40

1 Finding Your Way with Software Engineering Buzzwords 1:01:38

1 Infrastructure as Code Through Ansible 54:27

1 Applying the Principles of Agile to Strengthen the Federal Cyber Workforce 58:42

1 Ransomware: Defense and Resilience Strategies 58:55

1 Using Open Source to Shrink the Cyber Workforce Gap 50:19

1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07

1 Predictable Use of Multicore in the Army and Beyond 58:18

1 Ask Us Anything: Zero Trust Edition 1:02:27

1 Acquisition Disasters? Ideas For Reducing Acquisition Risk 47:28

1 Engineering Tactical and AI-Enabled Systems 22:08
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.