12 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Best Practices and Lessons Learned in Standing Up an AISIRT
Manage episode 438975247 series 3018913
In the wake of widespread adoption of artificial intelligence (AI) in critical infrastructure, education, government, and national security entities, adversaries are working to disrupt these systems and attack AI-enabled assets. With nearly four decades in vulnerability management, the Carnegie Mellon University Software Engineering Institute (SEI) recognized a need to create an entity that would identify, research, and identify mitigation strategies for AI vulnerabilities to protect national assets against traditional cybersecurity, adversarial machine learning, and joint cyber-AI attacks. In this SEI podcast, Lauren McIlvenny, director of threat analysis in the SEI’s CERT Division, discusses best practices and lessons learned in standing up an AI Security Incident Response Team (AISIRT).
409 episodes
Manage episode 438975247 series 3018913
In the wake of widespread adoption of artificial intelligence (AI) in critical infrastructure, education, government, and national security entities, adversaries are working to disrupt these systems and attack AI-enabled assets. With nearly four decades in vulnerability management, the Carnegie Mellon University Software Engineering Institute (SEI) recognized a need to create an entity that would identify, research, and identify mitigation strategies for AI vulnerabilities to protect national assets against traditional cybersecurity, adversarial machine learning, and joint cyber-AI attacks. In this SEI podcast, Lauren McIlvenny, director of threat analysis in the SEI’s CERT Division, discusses best practices and lessons learned in standing up an AI Security Incident Response Team (AISIRT).
409 episodes
All episodes
×
1 The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition 21:40

1 Updating Risk Assessment in the CERT Secure Coding Standard 26:04

1 Delivering Next Generation Cyber Capabilities to the DoD Warfighter 27:16

1 Getting the Most Out of Your Insider Risk Data with IIDES 39:14

1 Grace Lewis Outlines Vision for IEEE Computer Society Presidency 18:14

1 Improving Machine Learning Test and Evaluation with MLTE 29:06

1 DOD Software Modernization: SEI Impact and Innovation 27:12

1 Securing Docker Containers: Techniques, Challenges, and Tools 39:09

1 An Introduction to Software Cost Estimation 22:55

1 Cybersecurity Metrics: Protecting Data and Understanding Threats 27:00

1 3 Key Elements for Designing Secure Systems 36:28

1 Using Role-Playing Scenarios to Identify Bias in LLMs 45:07

1 Best Practices and Lessons Learned in Standing Up an AISIRT 38:29

1 3 API Security Risks (and How to Protect Against Them) 19:28

1 Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices 43:05

1 Capability-based Planning for Early-Stage Software Development 33:55

1 Safeguarding Against Recent Vulnerabilities Related to Rust 26:25

1 Developing a Global Network of Computer Security Incident Response Teams (CSIRTs) 30:51


1 Developing and Using a Software Bill of Materials Framework 37:37

1 Using Large Language Models in the National Security Realm 34:45

1 Atypical Applications of Agile and DevSecOps Principles 33:41

1 When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction 35:21

1 The Impact of Architecture on Cyber-Physical Systems Safety 34:05

1 ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies 46:22

1 The Cybersecurity of Quantum Computing: 6 Areas of Research 23:01


1 The Product Manager’s Evolving Role in Software and Systems Development 24:19

1 Measuring the Trustworthiness of AI Systems 19:27


1 Insider Risk Management in the Post-Pandemic Workplace 47:34

1 An Agile Approach to Independent Verification and Validation 31:57

1 Zero Trust Architecture: Best Practices Observed in Industry 27:53

1 Automating Infrastructure as Code with Ansible and Molecule 39:38

1 Identifying and Preventing the Next SolarWinds 46:04


1 Understanding Vulnerabilities in the Rust Programming Language 36:45

1 We Live in Software: Engineering Societal-Scale Systems 39:31


1 Key Steps to Integrate Secure by Design into Acquisition and Development 48:50

1 An Exploration of Enterprise Technical Debt 25:56


1 An Infrastructure-Focused Framework for Adopting DevSecOps 43:35


1 Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron 51:16
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.