63 subscribers
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


The Future of Software Engineering and Acquisition with Generative AI
Manage episode 397576331 series 1264075
We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innovation, concerns have emerged. These concerns encompass security risks, unforeseen failures, and issues of trust. Empirical research on generative AI development assistants reveals that productivity and quality gains depend not only on the sophistication of tools but also on task flow redesign and expert judgment.
In this webcast, Software Engineering Institute (SEI) researchers will explore the future of software engineering and acquisition using generative AI technologies. They’ll examine current applications, envision future possibilities, identify research gaps, and discuss the critical skill sets that software engineers and stakeholders need to effectively and responsibly harness generative AI’s potential. Fostering a deeper understanding of AI’s role in software engineering and acquisition accentuates its potential and mitigates its risks.
What Attendees Will Learn
• how to identify suitable use cases when starting out with generative AI technology
• the practical applications of generative AI in software engineering and acquisition
• how developers and decision makers can harness generative AI technology
169 פרקים
Manage episode 397576331 series 1264075
We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innovation, concerns have emerged. These concerns encompass security risks, unforeseen failures, and issues of trust. Empirical research on generative AI development assistants reveals that productivity and quality gains depend not only on the sophistication of tools but also on task flow redesign and expert judgment.
In this webcast, Software Engineering Institute (SEI) researchers will explore the future of software engineering and acquisition using generative AI technologies. They’ll examine current applications, envision future possibilities, identify research gaps, and discuss the critical skill sets that software engineers and stakeholders need to effectively and responsibly harness generative AI’s potential. Fostering a deeper understanding of AI’s role in software engineering and acquisition accentuates its potential and mitigates its risks.
What Attendees Will Learn
• how to identify suitable use cases when starting out with generative AI technology
• the practical applications of generative AI in software engineering and acquisition
• how developers and decision makers can harness generative AI technology
169 פרקים
כל הפרקים
×
1 Identifying AI Talent for the DoD Workforce 1:01:42

1 Model Your Way to Better Cybersecurity 1:02:54

1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23

1 The State of DevSecOps in the DoD: Where We Are, and What’s Next 58:42

1 I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds 57:16

1 A New Performance Zone for Software for National Security 1:02:23

1 Identifying and Mitigating Cyber Risk 47:33

1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07

1 Cybersecurity Priorities in 2025 32:21

1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05

1 Secure Systems Don’t Happen by Accident 59:08

1 Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance 38:50

1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22

1 Ask Us Anything: Supply Chain Risk Management 41:11

1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10

1 Cyber Supply Chain Risk Management: No Silver Bullet 38:40

1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03

1 Institutionalizing the Fundamentals of Insider Risk Management 56:33

1 What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems? 56:06

1 Will Rust Solve Software Security? 53:38

1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31

1 Does your DevSecOps Pipeline only Function as Intended? 52:40

1 Finding Your Way with Software Engineering Buzzwords 1:01:38

1 Infrastructure as Code Through Ansible 54:27

1 Applying the Principles of Agile to Strengthen the Federal Cyber Workforce 58:42

1 Ransomware: Defense and Resilience Strategies 58:55

1 Using Open Source to Shrink the Cyber Workforce Gap 50:19

1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07

1 Predictable Use of Multicore in the Army and Beyond 58:18

1 Ask Us Anything: Zero Trust Edition 1:02:27

1 Acquisition Disasters? Ideas For Reducing Acquisition Risk 47:28

1 Engineering Tactical and AI-Enabled Systems 22:08

1 A Cybersecurity Engineering Strategy for DevSecOps 59:23

1 CRO Success Factors in the Age of COVID 55:59


1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44

1 Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency 59:45

1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11

1 Busting the Myths of Programmer Productivity 54:21

1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Threats for Machine Learning 1:01:23

1 Follow the CUI: Setting the Boundaries for Your CMMC Assessment 45:56

1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34

1 Agile in Government: Go for Insight, Not Just Oversight 55:00

1 Organizational Resilience in a Time of Crisis 59:56

1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33

1 Software Architecture: A Mature Discipline? 43:45

1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20

1 Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices 53:33

1 The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 21:06

1 Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite 28:59

1 At What Point Does DevSecOps Become Too Risky for the Business? 57:15

1 Becoming a Better Software Architect 1:02:01

1 Designing Trustworthy AI: A User Experience (UX) Framework 40:56

1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27


1 Deepfakes—What Can Really Be Done Today? 12:13

1 Artificial Intelligence and Machine Learning – Hype vs Reality 21:27

1 Defending Your Computer Network from DNS Hijacking 13:43

1 Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them 56:52

1 Secure Your Code with AI and NLP 58:39

1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26

1 Panel Discussion: Managing the Insider Threat: What Every Organization Should Know 57:11

1 Illicit Cyber Activity Involving Fraud 45:33

1 United States Postal Inspection Service (USPIS) 42:56

1 Department of Homeland Security Cyber Resilience Review (Case Study) 28:42

1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38


1 Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data 46:27

1 Overview of the CERT® Resilience Management Model (CERT®-RMM) 28:33

1 Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape 29:45

1 Security Practitioner Perspective on DevOps for Building Secure Solutions 57:12


1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47

1 Agile and DevOps: Your Questions. Our Answers. 36:23

1 Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability 1:06:07


1 Four Valuable Data Sources for Network Security Analytics 46:57

1 Three Secrets to Successful Agile Metrics 1:24:16

1 Five Keys to Effective Agile Test Automation for Government Programs 1:29:54

1 The Evolving Role of the Chief Risk Officer 1:04:55

1 Practical Considerations in Adopting Agile-Lean in Government Settings 1:01:12

1 Building Analytics for Network Flow Records 59:05

1 5 Things You Need to Know About Leading a Successful Large IT Modernization Project 59:59

1 Building and Scaling a Malware Analysis System 1:02:28

1 How to Reduce the Graveyard of Software Tools with UI/UX Capability 1:04:57

1 From Secure Coding to Secure Software 1:04:20

1 Data Science: What It Is and How It Can Help Your Company 1:01:53


1 Security Requirements Engineering 36:45

1 Continuous Integration (Secure DevOps) 30:40

1 Coordinated Vulnerability Disclosure 30:54

1 Secure Software Development Landscape 45:44

1 What Makes a Good Software Architect? 1:29:02

1 Intelligence Preparation for Operational Resilience 1:00:58

1 Structuring the Chief Information Security Officer Organization 1:02:52


1 Using Network Flow to Gain Cyber Situational Awareness 1:00:14

1 DevOps Security: Ignore It As Much As You Would Ignore Regular Security 1:03:47

1 A Taxonomy of Testing Types 1:03:59

1 Cyber-Vulnerabilities in Aviation Today 28:39

1 Web Traffic Analysis with CERT Tapioca 46:12

1 Finding Related Malware Samples Using Run-Time Features 42:48

1 Enhancing Mobile Device Security 45:31

1 CERT® Alignment with Cyber COI Challenges and Gaps 29:59


1 Generalized Automated Cyber-Readiness Evaluator (ACE) 39:03

1 Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps 42:34


1 Culture Shock: Unlocking DevOps with Collaboration and Communication 1:02:49


1 Approaching Security from an "Architecture First" Perspective 45:31

1 Trends and New Directions in Software Architecture May 4, 2015 45:25

1 Advancing Cyber Intelligence Practices Through the SEI's Consortium 1:00:59

1 Tactical Cloudlets: Moving Cloud Computing to the Edge 58:48

1 Lessons in External Dependency and Supply Chain Risk Management 1:27:53

1 Risk Priority Number (RPN) – A Method for Software Defect Report Analysis 55:21

1 Architecture Analysis with AADL 1:03:05

1 Taking Advantage of Agile while Minimizing Risk 43:46

1 Heartbleed: Analysis, Thoughts, and Actions 1:31:52

1 Why Should Government Care about Technical Debt and Software Architecture? 26:57

1 When Measurement Benefits the Measured 58:00

1 Overview of the Threat Posed by Insiders to Critical Assets 50:20

1 Software Architecture for Big Data Systems 54:34

1 Architectural Implications of DevOps 57:17

1 CERT® RMM User Panel Discussion: USPIS, DHS, DoE, SunGard, & Lockheed Martin 56:56

1 Best Practices and Controls for Mitigating Insider Threats 49:38

1 Responding to a Large-Scale Cybersecurity Incident 1:01:46

1 Achieving Mission Assurance Through Resilience Management 58:20

1 Observations of Successful Cyber Security Operations 59:56
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.