
Software Engineering Institute (SEI) Podcast Series Podcast
1) Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems
In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat mo...Show More
2) Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supp...Show More
3) Mitigating Cyber Risk with Secure by Design
Software enables our way of life, but market forces have sidelined security concerns, leaving software vulnerable to attack. Fixing this problem will require the software industry to develop an initia...Show More
AUDIO REMOVED: The podcast creator has removed the audio for this episode.4) The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, “We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonom...Show More
5) Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive to...Show More
6) Deploying on the Edge
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Soft...Show More
7) The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America’s cybersecurity workforce, the Departme...Show More
8) Updating Risk Assessment in the CERT Secure Coding Standard
Bringing a codebase into compliance with the SEI CERT Coding Standards, requires a cost of time and effort, namely in the form of a static analysis tool. But those who are familiar with static analys...Show More
AUDIO REMOVED: The podcast creator has removed the audio for this episode.9) Delivering Next Generation Cyber Capabilities to the DoD Warfighter
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyb...Show More
10) Getting the Most Out of Your Insider Risk Data with IIDES
Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute,...Show More