63 subscribers
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 How AI is saving billions of years of human research time | Max Jaderberg 19:15
DevSecOps: See, Use, Succeed
Manage episode 491216381 series 1264075
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without lessening quality or reducing security.
What Attendees Will Learn:
- Issues from complex DevSecOps pipelines
- What observability adds for DevSecOps efforts
- The way in which a new open-source tool, Polar, helps
169 פרקים
Manage episode 491216381 series 1264075
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without lessening quality or reducing security.
What Attendees Will Learn:
- Issues from complex DevSecOps pipelines
- What observability adds for DevSecOps efforts
- The way in which a new open-source tool, Polar, helps
169 פרקים
כל הפרקים
×
1 Identifying AI Talent for the DoD Workforce 1:01:42

1 Model Your Way to Better Cybersecurity 1:02:54

1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23

1 The State of DevSecOps in the DoD: Where We Are, and What’s Next 58:42

1 I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds 57:16

1 A New Performance Zone for Software for National Security 1:02:23

1 Identifying and Mitigating Cyber Risk 47:33

1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07

1 Cybersecurity Priorities in 2025 32:21

1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05

1 Secure Systems Don’t Happen by Accident 59:08

1 Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance 38:50

1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22

1 Ask Us Anything: Supply Chain Risk Management 41:11

1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10

1 Cyber Supply Chain Risk Management: No Silver Bullet 38:40

1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03

1 Institutionalizing the Fundamentals of Insider Risk Management 56:33

1 What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems? 56:06

1 Will Rust Solve Software Security? 53:38

1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31

1 Does your DevSecOps Pipeline only Function as Intended? 52:40

1 Finding Your Way with Software Engineering Buzzwords 1:01:38

1 Infrastructure as Code Through Ansible 54:27

1 Applying the Principles of Agile to Strengthen the Federal Cyber Workforce 58:42

1 Ransomware: Defense and Resilience Strategies 58:55

1 Using Open Source to Shrink the Cyber Workforce Gap 50:19

1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07

1 Predictable Use of Multicore in the Army and Beyond 58:18

1 Ask Us Anything: Zero Trust Edition 1:02:27

1 Acquisition Disasters? Ideas For Reducing Acquisition Risk 47:28

1 Engineering Tactical and AI-Enabled Systems 22:08

1 A Cybersecurity Engineering Strategy for DevSecOps 59:23

1 CRO Success Factors in the Age of COVID 55:59


1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44

1 Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency 59:45

1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11

1 Busting the Myths of Programmer Productivity 54:21

1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Threats for Machine Learning 1:01:23

1 Follow the CUI: Setting the Boundaries for Your CMMC Assessment 45:56

1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34

1 Agile in Government: Go for Insight, Not Just Oversight 55:00

1 Organizational Resilience in a Time of Crisis 59:56

1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33

1 Defending Your Computer Network from DNS Hijacking 13:43

1 Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them 56:52

1 Secure Your Code with AI and NLP 58:39

1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26

1 Panel Discussion: Managing the Insider Threat: What Every Organization Should Know 57:11

1 Illicit Cyber Activity Involving Fraud 45:33

1 United States Postal Inspection Service (USPIS) 42:56

1 Department of Homeland Security Cyber Resilience Review (Case Study) 28:42

1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38


1 Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data 46:27

1 Software Architecture: A Mature Discipline? 43:45

1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20

1 Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices 53:33

1 The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 21:06

1 Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite 28:59

1 At What Point Does DevSecOps Become Too Risky for the Business? 57:15

1 Becoming a Better Software Architect 1:02:01

1 Designing Trustworthy AI: A User Experience (UX) Framework 40:56

1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27


1 Deepfakes—What Can Really Be Done Today? 12:13

1 Artificial Intelligence and Machine Learning – Hype vs Reality 21:27

1 Overview of the CERT® Resilience Management Model (CERT®-RMM) 28:33

1 Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape 29:45

1 Security Practitioner Perspective on DevOps for Building Secure Solutions 57:12


1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47

1 Agile and DevOps: Your Questions. Our Answers. 36:23

1 Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability 1:06:07


1 Four Valuable Data Sources for Network Security Analytics 46:57

1 Three Secrets to Successful Agile Metrics 1:24:16

1 Five Keys to Effective Agile Test Automation for Government Programs 1:29:54

1 The Evolving Role of the Chief Risk Officer 1:04:55

1 Practical Considerations in Adopting Agile-Lean in Government Settings 1:01:12
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.