#
Title
1

Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities

2

Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen

3

With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable

4

Maturing AI Adoption: From Chaos to Consistency

5

Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

6

AI for the Warfighter: Acquisition Challenges and Guidance

7

Visibility Through the Clouds with Network Flow Logs

8

Orchestrating the Chaos: Protecting Wireless Networks from Cyber Attacks

9

From Data to Performance: Understanding and Improving Your AI Model

10

What Could Possibly Go Wrong? Safety Analysis for AI Systems

11

Getting Your Software Supply Chain In Tune with SBOM Harmonization

12

API Security: An Emerging Concern in Zero Trust Implementations

13

Delivering Next-Generation AI Capabilities

14

The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems

15

Threat Modeling: Protecting Our Nation's Complex Software-Intensive Systems

16

Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds

17

Mitigating Cyber Risk with Secure by Design

18

The Magic in the Middle: Evolving Scaled Software Solutions for National Defense

19

Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space

20

Deploying on the Edge

21

The Best and Brightest: 6 Years of Supporting the President's Cup Cybersecurity Competition

22

Updating Risk Assessment in the CERT Secure Coding Standard

23

Delivering Next Generation Cyber Capabilities to the DoD Warfighter

24

Getting the Most Out of Your Insider Risk Data with IIDES

25

Grace Lewis Outlines Vision for IEEE Computer Society Presidency

26

Improving Machine Learning Test and Evaluation with MLTE

27

DOD Software Modernization: SEI Impact and Innovation

28

Securing Docker Containers: Techniques, Challenges, and Tools

29

An Introduction to Software Cost Estimation

30

Cybersecurity Metrics: Protecting Data and Understanding Threats

31

3 Key Elements for Designing Secure Systems

32

Using Role-Playing Scenarios to Identify Bias in LLMs

33

Best Practices and Lessons Learned in Standing Up an AISIRT

34

3 API Security Risks (and How to Protect Against Them)

35

Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices

36

Capability-based Planning for Early-Stage Software Development

37

Safeguarding Against Recent Vulnerabilities Related to Rust

38

Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)

39

Automated Repair of Static Analysis Alerts

40

Developing and Using a Software Bill of Materials Framework

41

Using Large Language Models in the National Security Realm

42

Atypical Applications of Agile and DevSecOps Principles

43

When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction

44

The Impact of Architecture on Cyber-Physical Systems Safety

45

ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies

46

The Cybersecurity of Quantum Computing: 6 Areas of Research

47

User-Centric Metrics for Agile

48

The Product Manager's Evolving Role in Software and Systems Development

49

Measuring the Trustworthiness of AI Systems

50

Actionable Data in the DevSecOps Pipeline

51

Insider Risk Management in the Post-Pandemic Workplace

52

An Agile Approach to Independent Verification and Validation

53

Zero Trust Architecture: Best Practices Observed in Industry

54

Automating Infrastructure as Code with Ansible and Molecule

55

Identifying and Preventing the Next SolarWinds

56

A Penetration Testing Findings Repository

57

Understanding Vulnerabilities in the Rust Programming Language

58

We Live in Software: Engineering Societal-Scale Systems

59

Secure by Design, Secure by Default

60

Key Steps to Integrate Secure by Design into Acquisition and Development

61

An Exploration of Enterprise Technical Debt

62

The Messy Middle of Large Language Models

63

An Infrastructure-Focused Framework for Adopting DevSecOps

64

Software Security in Rust

65

Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron

66

Asking the Right Questions to Coordinate Security in the Supply Chain

67

Securing Open Source Software in the DoD

68

A Model-Based Tool for Designing Safety-Critical Systems

69

Managing Developer Velocity and System Security with DevSecOps

70

A Method for Assessing Cloud Adoption Risks

71

Software Architecture Patterns for Deployability

72

ML-Driven Decision Making in Realistic Cyber Exercises

73

A Roadmap for Creating and Using Virtual Prototyping Software

74

Software Architecture Patterns for Robustness

75

A Platform-Independent Model for DevSecOps

76

Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems

77

Trust and AI Systems

78

A Dive into Deepfakes

79

Challenges and Metrics in Digital Engineering

80

The 4 Phases of the Zero Trust Journey

81

DevSecOps for AI Engineering

82

Undiscovered Vulnerabilities: Not Just for Critical Software

83

Explainable AI Explained

84

Model-Based Systems Engineering Meets DevSecOps

85

Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy

86

Software and Systems Collaboration in the Era of Smart Systems

87

Securing the Supply Chain for the Defense Industrial Base

88

Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis

89

Envisioning the Future of Software Engineering

90

Implementing the DoD's Ethical AI Principles

91

Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems

92

Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems

93

A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad

94

Enabling Transition From Sustainment to Engineering Within the DoD

95

The Silver Thread of Cyber in the Global Supply Chain

96

Measuring DevSecOps: The Way Forward

97

Bias in AI: Impact, Challenges, and Opportunities

98

Agile Strategic Planning: Concepts and Methods for Success

99

Applying Scientific Methods in Cybersecurity

100

Zero Trust Adoption: Benefits, Applications, and Resources

101

Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions

102

11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula

103

Benefits and Challenges of Model-Based Systems Engineering

104

Can DevSecOps Make Developers Happier?

105

Is Your Organization Ready for AI?

106

Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems

107

AI Workforce Development

108

Moving from DevOps to DevSecOps

109

Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs

110

Digital Engineering and DevSecOps

111

A 10-Step Framework for Managing Risk

112

7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts

113

Ransomware: Evolution, Rise, and Response

114

VINCE: A Software Vulnerability Coordination Platform

115

Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network

116

An Introduction to CMMC Assessment Guides

117

The CMMC Level 3 Assessment Guide: A Closer Look

118

The CMMC Level 1 Assessment Guide: A Closer Look

119

Achieving Continuous Authority to Operate (ATO)

120

Challenging the Myth of the 10x Programmer

121

A Stakeholder-Specific Approach to Vulnerability Management

122

Optimizing Process Maturity in CMMC Level 5

123

Reviewing and Measuring Activities for Effectiveness in CMMC Level 4

124

Situational Awareness for Cybersecurity: Beyond the Network

125

Quantum Computing: The Quantum Advantage

126

CMMC Scoring 101

127

Developing an Effective CMMC Policy

128

The Future of Cyber: Educating the Cybersecurity Workforce

129

Documenting Process for CMMC

130

Agile Cybersecurity

131

CMMC Levels 1-3: Going Beyond NIST SP-171

132

The Future of Cyber: Secure Coding

133

Challenges to Implementing DevOps in Highly Regulated Environments

134

The Future of Cyber: Cybercrime

135

An Ethical AI Framework

136

The CERT Guide to Coordinated Vulnerability Disclosure

137

The Future of Cyber: Security and Privacy

138

The Future of Cyber: Security and Resilience

139

Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools

140

Benchmarking Organizational Incident Management Practices

141

Machine Learning in Cybersecurity: 7 Questions for Decision Makers

142

Human Factors in Software Engineering

143

Improving the Common Vulnerability Scoring System

144

Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities

145

Selecting Metrics for Software Assurance

146

AI in Humanitarian Assistance and Disaster Response

147

The AADL Error Library: 4 Families of Systems Errors

148

Privacy in the Blockchain Era

149

Cyber Intelligence: Best Practices and Biggest Challenges

150

Assessing Cybersecurity Training

151

DevOps in Highly Regulated Environments

152

The Role of the Software Factory in Acquisition and Sustainment

153

Defending Your Organization Against Business Email Compromise

154

Managing Technical Debt: A Focus on Automation, Design, and Architecture

155

Leading in the Age of Artificial Intelligence

156

Applying Best Practices in Network Traffic Analysis

157

10 Types of Application Security Testing Tools and How to Use Them

158

Using Test Suites for Static Analysis Alert Classifiers

159

Blockchain at CMU and Beyond

160

System Architecture Virtual Integration: ROI on Early Discovery of Defects

161

A Technical Strategy for Cybersecurity

162

Best Practices for Security in Cloud Computing

163

Risks, Threats, and Vulnerabilities in Moving to the Cloud

164

How to Be a Network Traffic Analyst

165

Workplace Violence and Insider Threat

166

Why Does Software Cost So Much?

167

Cybersecurity Engineering & Software Assurance: Opportunities & Risks

168

Software Sustainment and Product Lines

169

Best Practices in Cyber Intelligence

170

The Evolving Role of the Chief Risk Officer

171

Obsidian: A Safer Blockchain Programming Language

172

Agile DevOps

173

Is Software Spoiling Us? Technical Innovations in the Department of Defense

174

Is Software Spoiling Us? Innovations in Daily Life from Software

175

How Risk Management Fits into Agile & DevOps in Government

176

5 Best Practices for Preventing and Responding to Insider Threat

177

Pharos Binary Static Analysis: An Update

178

Positive Incentives for Reducing Insider Threat

179

Mission-Practical Biometrics

180

At Risk Emerging Technology Domains

181

DNS Blocking to Disrupt Malware

182

Best Practices: Network Border Protection

183

Verifying Software Assurance with IBM's Watson

184

The CERT Software Assurance Framework

185

Scaling Agile Methods

186

Ransomware: Best Practices for Prevention and Response

187

Integrating Security in DevOps

188

SEI Fellows Series: Peter Feiler

189

NTP Best Practices

190

Establishing Trust in Disconnected Environments

191

Distributed Artificial Intelligence in Space

192

Verifying Distributed Adaptive Real-Time Systems

193

10 At-Risk Emerging Technologies

194

Technical Debt as a Core Software Engineering Practice

195

DNS Best Practices

196

Three Roles and Three Failure Patterns of Software Architects

197

Security Modeling Tools

198

Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks

199

Cyber Security Engineering for Software and Systems Assurance

200

Moving Target Defense

201

Improving Cybersecurity Through Cyber Intelligence

202

A Requirement Specification Language for AADL

203

Becoming a CISO: Formal and Informal Requirements

204

Predicting Quality Assurance with Software Metrics and Security Methods

205

Network Flow and Beyond

206

A Community College Curriculum for Secure Software Development

207

Security and the Internet of Things

208

The SEI Fellow Series: Nancy Mead

209

An Open Source Tool for Fault Tree Analysis

210

Global Value Chain – An Expanded View of the ICT Supply Chain

211

Intelligence Preparation for Operational Resilience

212

Evolving Air Force Intelligence with Agile Techniques

213

Threat Modeling and the Internet of Things

214

Open Systems Architectures: When & Where to Be Closed

215

Effective Reduction of Avoidable Complexity in Embedded Systems

216

Toward Efficient and Effective Software Sustainment

217

Quality Attribute Refinement and Allocation

218

Is Java More Secure Than C?

219

Identifying the Architectural Roots of Vulnerabilities

220

Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations

221

An Interview with Grady Booch

222

Structuring the Chief Information Security Officer Organization

223

How Cyber Insurance Is Driving Risk and Technology Management

224

A Field Study of Technical Debt

225

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework

226

A Software Assurance Curriculum for Future Engineers

227

Four Types of Shift Left Testing

228

Toward Speed and Simplicity: Creating a Software Library for Graph Analytics

229

Capturing the Expertise of Cybersecurity Incident Handlers

230

Improving Quality Using Architecture Fault Analysis with Confidence Arguments

231

A Taxonomy of Testing Types

232

Reducing Complexity in Software & Systems

233

Designing Security Into Software-Reliant Systems

234

Agile Methods in Air Force Sustainment

235

Defect Prioritization With the Risk Priority Number

236

SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers

237

An Introduction to Context-Aware Computing

238

Data Driven Software Assurance

239

Applying Agile in the DoD: Twelfth Principle

240

Supply Chain Risk Management: Managing Third Party and External Dependency Risk

241

Introduction to the Mission Thread Workshop

242

Applying Agile in the DoD: Eleventh Principle

243

A Workshop on Measuring What Matters

244

Applying Agile in the DoD: Tenth Principle

245

Predicting Software Assurance Using Quality and Reliability Measures

246

Applying Agile in the DoD: Ninth Principle

247

Cyber Insurance and Its Role in Mitigating Cybersecurity Risk

248

AADL and Dassault Aviation

249

Tactical Cloudlets

250

Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs

251

Coding with AADL

252

The State of Agile

253

Applying Agile in the DoD: Eighth Principle

254

A Taxonomy of Operational Risks for Cyber Security

255

Agile Metrics

256

Four Principles for Engineering Scalable, Big Data Systems

257

An Appraisal of Systems Engineering: Defense v. Non-Defense

258

HTML5 for Mobile Apps at the Edge

259

Applying Agile in the DoD: Seventh Principle

260

AADL and Edgewater

261

Security and Wireless Emergency Alerts

262

Safety and Behavior Specification Using the Architecture Analysis and Design Language

263

Applying Agile in the DoD: Sixth Principle

264

Characterizing and Prioritizing Malicious Code

265

Using Quality Attributes to Improve Acquisition

266

Best Practices for Trust in the Wireless Emergency Alerts Service

267

Three Variations on the V Model for System and Software Testing

268

Adapting the PSP to Incorporate Verified Design by Contract

269

Comparing IT Risk Assessment and Analysis Methods

270

AADL and Aerospace

271

Assuring Open Source Software

272

Security Pattern Assurance through Roundtrip Engineering

273

The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)

274

Applying Agile in the DoD: Fifth Principle

275

Software Assurance Cases

276

Raising the Bar - Mainstreaming CERT C Secure Coding Rules

277

AADL and Télécom Paris Tech

278

From Process to Performance-Based Improvement

279

An Approach to Managing the Software Engineering Challenges of Big Data

280

Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience

281

Situational Awareness Mashups

282

Applying Agile in the DoD: Fourth Principle

283

Architecting Systems of the Future

284

Acquisition Archetypes

285

Human-in-the-Loop Autonomy

286

Mobile Applications for Emergency Managers

287

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions

288

Applying Agile in the DoD: Third Principle

289

DevOps - Transform Development and Operations for Fast, Secure Deployments

290

Application Virtualization as a Strategy for Cyber Foraging

291

Common Testing Problems: Pitfalls to Prevent and Mitigate

292

Joint Programs and Social Dilemmas

293

Applying Agile in the DoD: Second Principle

294

Managing Disruptive Events - CERT-RMM Experience Reports

295

Reliability Validation and Improvement Framework

296

Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity

297

The Business Case for Systems Engineering

298

Applying Agile in the DoD: First Principle

299

The Evolution of a Science Project

300

Securing Mobile Devices aka BYOD

301

What's New With Version 2 of the AADL Standard?

302

The State of the Practice of Cyber Intelligence

303

Mitigating Insider Threat - New and Improved Practices Fourth Edition

304

Technology Readiness Assessments

305

Standards in Cloud Computing Interoperability

306

Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk

307

The Latest Developments in AADL

308

The Fundamentals of Agile

309

Software for Soldiers who use Smartphones

310

Managing Disruptive Events: Making the Case for Operational Resilience

311

Architecting Service-Oriented Systems

312

The SEI Strategic Plan

313

Quantifying Uncertainty in Early Lifecycle Cost Estimation

314

Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities

315

Architecting a Financial System with TSP

316

The Importance of Data Quality

317

How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them

318

Misaligned Incentives

319

How a Disciplined Process Enhances & Enables Agility

320

Agile Acquisition

321

An Architecture-Focused Measurement Framework for Managing Technical Debt

322

Cloud Computing for the Battlefield

323

U.S. Postal Inspection Service Use of the CERT Resilience Management Model

324

Insights from the First CERT Resilience Management Model Users Group

325

NIST Catalog of Security and Privacy Controls, Including Insider Threat

326

Cisco's Adoption of CERT Secure Coding Standards

327

How to Become a Cyber Warrior

328

Considering Security and Privacy in the Move to Electronic Health Records

329

Measuring Operational Resilience

330

Why Organizations Need a Secure Domain Name System

331

Controls for Monitoring the Security of Cloud Services

332

Building a Malware Analysis Capability

333

Using the Smart Grid Maturity Model (SGMM)

334

Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM

335

Conducting Cyber Exercises at the National Level

336

Indicators and Controls for Mitigating Insider Threat

337

How Resilient Is My Organization?

338

Public-Private Partnerships: Essential for National Cyber Security

339

Software Assurance: A Master's Level Curriculum

340

How to Develop More Secure Software - Practices from Thirty Organizations

341

Mobile Device Security: Threats, Risks, and Actions to Take

342

Establishing a National Computer Security Incident Response Team (CSIRT)

343

Securing Industrial Control Systems

344

The Power of Fuzz Testing to Reduce Security Vulnerabilities

345

Protect Your Business from Money Mules

346

Train for the Unexpected

347

The Role of the CISO in Developing More Secure Software

348

Computer and Network Forensics: A Master's Level Curriculum

349

Introducing the Smart Grid Maturity Model (SGMM)

350

Leveraging Security Policies and Procedures for Electronic Evidence Discovery

351

Integrating Privacy Practices into the Software Development Life Cycle

352

Using the Facts to Protect Enterprise Networks: CERT's NetSA Team

353

Ensuring Continuity of Operations When Business Is Disrupted

354

Managing Relationships with Business Partners to Achieve Operational Resiliency

355

The Smart Grid: Managing Electrical Power Distribution and Use

356

Electronic Health Records: Challenges for Patient Privacy and Security

357

Mitigating Insider Threat: New and Improved Practices

358

Rethinking Risk Management

359

The Upside and Downside of Security in the Cloud

360

More Targeted, Sophisticated Attacks: Where to Pay Attention

361

Is There Value in Identifying Software Security "Never Events?"

362

Cyber Security, Safety, and Ethics for the Net Generation

363

An Experience-Based Maturity Model for Software Security

364

Mainstreaming Secure Coding Practices

365

Security: A Key Enabler of Business Innovation

366

Better Incident Response Through Scenario Based Training

367

An Alternative to Risk Management for Information and Software Security

368

Tackling Tough Challenges: Insights from CERT's Director Rich Pethia

369

Climate Change: Implications for Information Technology and Security

370

Using High Fidelity, Online Training to Stay Sharp

371

Integrating Security Incident Response and e-Discovery

372

Concrete Steps for Implementing an Information Security Program

373

Virtual Communities: Risks and Opportunities

374

Developing Secure Software: Universities as Supply Chain Partners

375

Security Risk Assessment Using OCTAVE Allegro

376

Getting to a Useful Set of Security Metrics

377

How to Start a Secure Software Development Program

378

Managing Risk to Critical Infrastructures at the National Level

379

Analyzing Internet Traffic for Better Cyber Situational Awareness

380

Managing Security Vulnerabilities Based on What Matters Most

381

Identifying Software Security Requirements Early, Not After the Fact

382

Making Information Security Policy Happen

383

Becoming a Smart Buyer of Software

384

Building More Secure Software

385

Connecting the Dots Between IT Operations and Security

386

Getting in Front of Social Engineering

387

Using Benchmarks to Make Better Security Decisions

388

Protecting Information Privacy - How To and Lessons Learned

389

Initiating a Security Metrics Program: Key Points to Consider

390

Insider Threat and the Software Development Life Cycle

391

Tackling the Growing Botnet Threat

392

Building a Security Metrics Program

393

Inadvertent Data Disclosure on Peer-to-Peer Networks

394

Information Compliance: A Growing Challenge for Business Leaders

395

Internal Audit's Role in Information Security: An Introduction

396

What Business Leaders Can Expect from Security Degree Programs

397

The Path from Information Security Risk Assessment to Compliance

398

Computer Forensics for Business Leaders: Building Robust Policies and Processes

399

Business Resilience: A More Compelling Argument for Information Security

400

Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity

401

The Human Side of Security Trade-Offs

402

Dual Perspectives: A CIO's and CISO's Take on Security

403

Tackling Security at the National Level: A Resource for Leaders

404

Reducing Security Costs with Standard Configurations: U.S. Government Initiatives

405

Real-World Security for Business Leaders

406

Using Standards to Build an Information Security Program

407

Getting Real About Security Governance

408

Convergence: Integrating Physical and IT Security

409

IT Infrastructure: Tips for Navigating Tough Spots

410

The Value of De-Identified Personal Data

411

Adapting to Changing Risk Environments: Operational Resilience

412

Computer Forensics for Business Leaders: A Primer

413

The Real Secrets of Incident Management

414

The Legal Side of Global Security

415

A New Look at the Business of IT Education

416

Crisis Communications During a Security Incident

417

Assuring Mission Success in Complex Environments

418

Privacy: The Slow Tipping Point

419

Building Staff Competence in Security

420

Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology

421

Inside Defense-in-Depth

422

Protecting Against Insider Threat

423

Change Management: The Security 'X' Factor

424

CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT

425

The ROI of Security

426

Compliance vs. Buy-in

427

Why Leaders Should Care About Security

428

Proactive Remedies for Rising Threats