56 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده

Model Your Way to Better Cybersecurity
Manage episode 493691377 series 1264075
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. This webcast will preview a workshop to be held during the 2025 Secure Software by Design conference to be held on August 19 and 20.
What Attendees Will Learn:
- How MBSE can aid cybersecurity analysis and design
- The value of MBSE for cyber threat modeling
- An overview of threat modeling techniques using MBSE
173 قسمت
Manage episode 493691377 series 1264075
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. This webcast will preview a workshop to be held during the 2025 Secure Software by Design conference to be held on August 19 and 20.
What Attendees Will Learn:
- How MBSE can aid cybersecurity analysis and design
- The value of MBSE for cyber threat modeling
- An overview of threat modeling techniques using MBSE
173 قسمت
همه قسمت ها
×1 5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them 50:57
1 Using LLMs to Evaluate Code 1:02:10
1 Identifying AI Talent for the DoD Workforce 1:01:42
1 Model Your Way to Better Cybersecurity 1:02:54
1 DevSecOps: See, Use, Succeed 1:00:41
1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23
1 A New Performance Zone for Software for National Security 1:02:23
1 Independent Verification and Validation for Agile Projects 1:02:23
1 Generative AI and Software Engineering Education 1:02:05
1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22
1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10
1 Ask Us Anything: Generative AI Edition 1:30:37
1 Evaluating Trustworthiness of AI Systems 1:02:08
1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03
1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36
1 Improving Analytics Using Enriched Network Flow Data 1:02:25
1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01
1 AI Next Generation Architecture 1:01:44
1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31
1 Finding Your Way with Software Engineering Buzzwords 1:01:38
1 Exploring an AI Engineering Body of Knowledge 1:02:21
1 What are Deepfakes, and How Can We Detect Them? 1:00:00
1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07
1 Ask Us Anything: Zero Trust Edition 1:02:27
1 The Future of AI: Scaling AI Through AI Engineering 1:01:59
1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47
1 Balanced Approaches to Insider Risk Management 1:00:53
1 Software Development Open Forum: Ask Hasan Anything! 1:03:02
1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47
1 How Do We Teach Cybersecurity? 1:00:17
1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06
1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29
1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20
1 Amplifying Your Privacy Program: Strategies for Success 1:01:06
1 DevOps Enables Digital Engineering 1:00:44
1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18
1 Software Engineering for Machine Learning 1:03:11
1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05
1 Threats for Machine Learning 1:01:23
1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50
1 Quality Attribute Concerns for Microservices at the Edge 1:01:34
1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33
1 A Discussion on DoD Software Advances and What's Next from SEI 1:00:31
1 Top 5 Considerations Before Boarding the Container Ship 1:04:32
1 Trust, Verify & Authorize with DevSecOps 1:02:20
1 Becoming a Better Software Architect 1:02:01
1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.





























