63 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
Can a Cybersecurity Parametric Cost Model be Developed?
Manage episode 471842609 series 1264075
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurity activities, estimate an overall cybersecurity cost for a program, and obtain a defined and normalized set of cybersecurity data. In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost modeling.
What Attendees Will Learn:
• a proposed work breakdown structure identifying cybersecurity-related activities and cost items, and existing descriptions of secure coding practices and levels of rigor for those practices based on data availability
• an approach to develop a cybersecurity parametric cost model
• a methodology to develop the cost model
165 قسمت
Manage episode 471842609 series 1264075
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurity activities, estimate an overall cybersecurity cost for a program, and obtain a defined and normalized set of cybersecurity data. In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost modeling.
What Attendees Will Learn:
• a proposed work breakdown structure identifying cybersecurity-related activities and cost items, and existing descriptions of secure coding practices and levels of rigor for those practices based on data availability
• an approach to develop a cybersecurity parametric cost model
• a methodology to develop the cost model
165 قسمت
Tous les épisodes
×


1 A New Performance Zone for Software for National Security 1:02:23









1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05


1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22


1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10


1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03



1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31


1 Finding Your Way with Software Engineering Buzzwords 1:01:38




1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07


1 Ask Us Anything: Zero Trust Edition 1:02:27





1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44


1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11


1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Threats for Machine Learning 1:01:23


1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34



1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33


1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20





1 Becoming a Better Software Architect 1:02:01


1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27






1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26




1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38





1 From Secure Coding to Secure Software 1:04:20

1 Data Science: What It Is and How It Can Help Your Company 1:01:53

1 What Makes a Good Software Architect? 1:29:02

1 Intelligence Preparation for Operational Resilience 1:00:58

1 Structuring the Chief Information Security Officer Organization 1:02:52

1 Context Enabled Computing 1:01:36

1 Using Network Flow to Gain Cyber Situational Awareness 1:00:14

1 DevOps Security: Ignore It As Much As You Would Ignore Regular Security 1:03:47

1 A Taxonomy of Testing Types 1:03:59

1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47


1 Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability 1:06:07

1 Is Software Spoiling Us? 1:00:56


1 Three Secrets to Successful Agile Metrics 1:24:16

1 Five Keys to Effective Agile Test Automation for Government Programs 1:29:54

1 The Evolving Role of the Chief Risk Officer 1:04:55

1 Practical Considerations in Adopting Agile-Lean in Government Settings 1:01:12



1 Building and Scaling a Malware Analysis System 1:02:28

1 How to Reduce the Graveyard of Software Tools with UI/UX Capability 1:04:57






1 Culture Shock: Unlocking DevOps with Collaboration and Communication 1:02:49




1 Advancing Cyber Intelligence Practices Through the SEI's Consortium 1:00:59


1 Lessons in External Dependency and Supply Chain Risk Management 1:27:53


1 Architecture Analysis with AADL 1:03:05


1 Heartbleed: Analysis, Thoughts, and Actions 1:31:52






1 Responding to a Large-Scale Cybersecurity Incident 1:01:46


به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.