60 subscribers
Gå offline med appen Player FM !
Podcasts der er værd at lytte til
SPONSORERET


1 Pushing Past Stagnation & Business Plateaus 30:21
Can a Cybersecurity Parametric Cost Model be Developed?
Manage episode 471842609 series 1264075
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurity activities, estimate an overall cybersecurity cost for a program, and obtain a defined and normalized set of cybersecurity data. In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost modeling.
What Attendees Will Learn:
• a proposed work breakdown structure identifying cybersecurity-related activities and cost items, and existing descriptions of secure coding practices and levels of rigor for those practices based on data availability
• an approach to develop a cybersecurity parametric cost model
• a methodology to develop the cost model
161 episoder
Manage episode 471842609 series 1264075
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurity activities, estimate an overall cybersecurity cost for a program, and obtain a defined and normalized set of cybersecurity data. In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost modeling.
What Attendees Will Learn:
• a proposed work breakdown structure identifying cybersecurity-related activities and cost items, and existing descriptions of secure coding practices and levels of rigor for those practices based on data availability
• an approach to develop a cybersecurity parametric cost model
• a methodology to develop the cost model
161 episoder
Alle episoder
×
1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07


1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05

1 Secure Systems Don’t Happen by Accident 59:08

1 Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance 38:50

1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22

1 Ask Us Anything: Supply Chain Risk Management 41:11

1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10

1 Cyber Supply Chain Risk Management: No Silver Bullet 38:40

1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03

1 Institutionalizing the Fundamentals of Insider Risk Management 56:33

1 What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems? 56:06


1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31

1 Does your DevSecOps Pipeline only Function as Intended? 52:40

1 Finding Your Way with Software Engineering Buzzwords 1:01:38

1 Infrastructure as Code Through Ansible 54:27

1 Applying the Principles of Agile to Strengthen the Federal Cyber Workforce 58:42

1 Ransomware: Defense and Resilience Strategies 58:55

1 Using Open Source to Shrink the Cyber Workforce Gap 50:19

1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07

1 Predictable Use of Multicore in the Army and Beyond 58:18

1 Ask Us Anything: Zero Trust Edition 1:02:27

1 Acquisition Disasters? Ideas For Reducing Acquisition Risk 47:28

1 Engineering Tactical and AI-Enabled Systems 22:08

1 A Cybersecurity Engineering Strategy for DevSecOps 59:23

1 CRO Success Factors in the Age of COVID 55:59


1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44

1 Modeling DevSecOps to Reduce the Time-to-Deploy and Increase Resiliency 59:45

1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11

1 Busting the Myths of Programmer Productivity 54:21

1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Becoming a Better Software Architect 1:02:01

1 Designing Trustworthy AI: A User Experience (UX) Framework 40:56

1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27


1 Deepfakes—What Can Really Be Done Today? 12:13

1 Artificial Intelligence and Machine Learning – Hype vs Reality 21:27

1 Defending Your Computer Network from DNS Hijacking 13:43

1 Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them 56:52


1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26


1 Follow the CUI: Setting the Boundaries for Your CMMC Assessment 45:56

1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34

1 Agile in Government: Go for Insight, Not Just Oversight 55:00

1 Organizational Resilience in a Time of Crisis 59:56

1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33

1 Software Architecture: A Mature Discipline? 43:45

1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20

1 Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices 53:33

1 The DoD’s Cybersecurity Maturity Model Certification and Process Maturity 21:06

1 Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite 28:59

1 At What Point Does DevSecOps Become Too Risky for the Business? 57:15

1 Panel Discussion: Managing the Insider Threat: What Every Organization Should Know 57:11

1 Illicit Cyber Activity Involving Fraud 45:33

1 United States Postal Inspection Service (USPIS) 42:56

1 Department of Homeland Security Cyber Resilience Review (Case Study) 28:42

1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38


1 Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data 46:27

1 Overview of the CERT® Resilience Management Model (CERT®-RMM) 28:33

1 Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape 29:45

1 Security Practitioner Perspective on DevOps for Building Secure Solutions 57:12


1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47

1 Agile and DevOps: Your Questions. Our Answers. 36:23
Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.