Home  >  ASQ Washington, DC &...  >  Special Interest Groups  >  Software SIG   >>   Related Links  |  Capers Jones stats       Printable Version Tell a friend

Software Special Interest Group (SSIG)

Purpose

The purpose of the Software Special Interest Group is to provide software quality professionals and software professionals interested in quality with an opportunity for growth and exchange of ideas with other software professionals, and to facilitate growth in the number and expertise of the ASQ membership.

Objectives

  • Arrange meetings (currently monthly) at a convenient time and place.
  • Provide a diversity of speaker topics within the general heading of software quality.
  • Provide knowledgeable speakers from the professional and/or academic worlds.
  • Keep in touch with and respond to the professional communities desires for the meetings.
  • Reach out to students, who will soon enter the software profession.
  • Disseminate information about: ASQ membership, the Software Division, certification, and training opportunities.

For more information about Section 509's Software Special Interest Group Contact Rhonda Farrell (farrell_rhonda@bah.com).

Software SIG Next Meeting

Risk Management Frameworks, Life Cycle Application, and

Professional Certifications

Presented by Mr. Walter Cekala, ISSA-NOVA

Deputy-VP for Education

Tuesday, May 23, 2017

5:30 – 6:00 PM Networking & Pizza

6:00 – 7:00 PM – Evening Program

7:00 – 7:15 PM – Special Announcements

*There is no cost to attend at McLean or Silver Spring

Specialized professional certifications benefit practitioners and employers through application of good practices and specific bodies of knowledge – ASQ offers members 19 quality certifications.

In this session, consideration will be given to value added by professional certification in general and risk certifications in particular. There is knowledge gained through education, skill gained through experience, and evolution gained through membership in professional organizations involving collaboration with your peers.  What better way to improve the quality of the practice than continuous improvement and life-long learning?  These are more than catch phrases. How many frameworks do we need?  Which life cycles apply? What are the appropriate certifications? What are the criteria and qualifications for obtaining these certifications? To address these questions, we will take a glimpse at two of the many risk management frameworks and how they may intersect or overlap. We will provide an introductory compare and contrast of the National Institute of Standards and Technology approach and the Program Management Institute (PMI). Where do these fit in the life cycle of our activities? How do these fit in your personal and organizational goals?

 Only personal opinions are expressed.

Walter Cekala is a Senior Network Architect at Defense Point Security, LLC.  His previous positions include program risk manager for a Major Acquisition Program leading a team of more than 30 support staff delivering land mobile radio program support to approximately 95,000 users.  He has been an active member of the IEEE Antenna and Propagation society for more than 10 years and is a life member of the Armed Forces Communications Electronics Association.  As the telecommunications manager for the Department of Defense Education Activity from 1993 to 2000, He traveled extensively to manage multiple teams for design and installation of Local Area Networks and Internet connections at schools in 17 countries supporting more than 12,000 staff and 100,000 students.  In the 1980s, He worked as a liaison to the North Atlantic Treaty Organization improving quality, reliability, and resilience of secure communications.  He began teaching circuit conditioning in 1975 and in 1980 was recognized for risk management and engineering activities improving secure, international network engineering efforts support of a significant Department of Defense communications network.  His risk related certifications include FITSP-A, FITSP-O, CRISC, and PMI-RMP.

Locations and Registration

The presenter will be at the MITRE-2 location with presentation remote dial-in available to the out of region participants (FDA, NJ, etc.).

Registration: http://www.asq509.org/ht/d/DoSurvey/i/26913

May Flyer here.

Past Software SIG Presentations

What is Performance Engineering and How is it Relevant?, presented by Dr. Danny Moore, 28 March, 2017

We are paying for What? It Asset Management: security, sanity, and saving money, presented by Mr. David Morse, 28 February, 2017

Secure SDLC: How to Drive Adoption, presented by Mr. Curtis Bragdon, 24 Jan 2017

Lean Risk Management, presented by Mr. Mike Helton, 29 Nov 2016

Understanding Cyber Adversaries with ATT&CK -- The Post-Exploit Threat Model, presented by Dr. Andy Applebaum, 25 Oct 2016

Radical Risk Identification for the 21st Century, presented by Ms. Laurie Wiggins, 27 SEP 2016

Using Non-Traditional Voice of the Customer Techniques to Measure and Manage the Customer Experience, presented by Mr. John Goodman, 23 AUG 2016

Cybersecurity Discoveries from Machine Learning, presented by Mr. Curtis Bragdon, Darktrace 26 JUL, 2016

The "Whys" and "Hows" of a Creativity Toolkit presented by Ms. Janet Cook, 28 JUN 2016

Software Defects and Software Reliability Assessment presented by Kristine Hejna 05/24/2016

The IT Infrastructure Library - a Tool for Creating and Maintaining Value in IT Services  presented by Jeanne Schock 04/26/2016

Information System Contingency Plan (ISCP) A Success Story  presented by Rob White 03/22/2016

Building Proficiency in Process Improvement Skills  presented by Tim Kelley 02/23/2016

Evaluating Hazards in Critical Software Dependent Systems  presented by Sushil Birla 12/15/2015

A Lean Approach to Requirements Validation  presented by Cary Bryczek 11/24/2015

Mobile Security: the Risk We All Carry  presented by Alex Gladd 10/27/2015

Practical Risk Management  presented by Mary Lewis 9/22/2015 -- accompanying document: US Department of Energy, Risk Management: A Practical Guide

Testing Software where Cause is De-coupled from Effect  presented by George Hurlburt 8/25/2015


Software Service Level Agreement and Database HA solutions  presented by Michael Chapiro 7/21/2015

Teaching and Old Dog new Tricks: Agile for Legacy Systems  presented by Craeg Strong 6/23/2015

Cyber-Security Policy and Ethics
  presented by Kelly Yamaguchi 5/26/2015

Be Careful What You Pay For 
presented by Rick Spiewak 4/28/2015

Website Performance Testing Strategies to use in Emergency Situations 
presented by Rudy Regner 3/24/2015

CISQ Quality Standard Overview and Integrating Security into SDLC 
presented by Shahid Shah 2/24/2015

If It Passes Test, It Must Be OK Common Misconceptions and The Immutable Laws of Software Development
  presented by Girish Seshagiri 1/27/2015

Automated Quality Testing Challenges with Big Data  presented by Michael Chapiro 11/25/2014

Risk Management 103: Risk Metrics Part 2 - Metrics Applications  presented by Mike Helton 10/28/2014

Risk Management 103: Risk Metrics Part 1 - Measuring Risk and the Risk Process  presented by Mike Helton 09/23/2014

The Discipline of Software Engineering 
presented by Mark Doernhoefer of MITRE 08/26/2014

Applying Process Mining to IT Big Data  presented by Richard Eng of MITRE 07/22/2014

A Rules Engine Experiment:  Lessons Learned on When and How to use a Rules-Based Solution  presented by Cris Hutto of MITRE 06/24/2014


Using Agile Principles to Deliver Real Business Value at Scale  presented by: Mark Shima and Joseph Hilger 5/27/2014

Building a Software Assurance Road-map and Using It Effectively  presented by Robert Martin of MITRE 04/22/2014

Open Source Software and Government  presented by David Wheeler of the Institute for Defense Analysis 02/25/2014

Get the Requirements Right...the First Time...  presented by Wayne Beekman of Information Concepts 01/28/2014

Success with Enterprise Architecture  presented by Phil Homan 12/17/2013

A Special Pre-presentation on IEEE Benefits, Including a Video and the IEEE-USA Congressional Representation Preceded the Main Program.  10/29/2013

Development of a Configuration Management Standard for a Government Agency  presented by Ron Perrella and Russ Roseman 10/29/2013

Leadership and Career Development  presented by Joe Ludford 9/24/2013

Model-based Architecture and Engineering  presented by Victor Harrison 8/27/2013

Risk Management 102  presented by Mike Helton 7/23/2013

Open Stack  presented by Pat Holben 6/25/2013

Requirements Metrics for Requirements Statements  presented by Chao Y. Din 5/28/2013

High Maturity Practices and Lifetime Warranty Against Software Defects  presented by Girish Seshagiri 4/23/2013

The Rise of Big Data and Data Science  presented by Donald Miner 3/26/2013

Risk Management presented by Al Florence 2/26/2013

Configuration Management presented by Russ Roseman 1/22/2013 audio file

Near Future of Automated Software Testing  presented by Elfriede Dustin 11/29/2012

Knowledge Extraction and Analysis of Software  presented by Mike Oara and Rama Moorthy of Hatha Systems 10/23/2012  audio file

Agile Quality Management Techniques  presented by Jim Jamieson 9/25/2012 audio file

Software Security Assurance: Enabling Security Automation and Software Supply Chain Risk Management  Presented by Joe Jarzombek of DHS 8/30/2012  audio file

Requirements-Management Requirements -- Requistite Doors to Success  Presented by Alfred Kromholz of MITRE 7/24/2012  (No slides or audio file available)

Systems Engineering Management Process (SEMP)  Presented by Jim Todd of DRC  6/26/2012  (The link is to the audio recording.  No slides were used.)

Software Assurance Metrics and Tool Evaluation (SAMATE) Overview  Presented by Tim Boland of NIST  5/29/2012.

Cybersecurity Myths, Twists, and Strategies  Presented by Bill Neugent of MITRE  4/24/2012. audio file

Exposing Security Risks for Commercial Mobile Devices (CMDs) Presented by Jeff Voas of NIST and Angelos Stavrou of GMU  3/27/2012.  audio file

Understanding How the Bad Guys Attack Your Software: CAPEC Presented by Sean Barnum of MITRE  2/21/2012.  audio file

Building Watson--An Overview of the DeepQA Project Presented by David A. Ferrucci of IBM  1/24/2012  (slides are not available).

Leveraging Semantic Web Technologies for Improved Decision Making Presented by Samuel Chance 11/29/2011.  rescheduled from earlier  audio file

Predicting Software Quality Early  Presented by Girish Seshagiri 10/25/2011. audio file

Transforming Technical Leads into Effective project Managers  Presented by Rita Hadden 9/20/2011. audio file

Leveraging Semantic Web Technologies for Improved Decision Making  Presented by Samuel Chance 8/23/2011.  meeting canceled

Software Quality in 2011: A Survey of the State of the Art  Presented by Capers Jones 7/26/2011.

The Smart Grid: Power for the 21st Century  Presented by George Arnold 6/28/2011.  audio file of Smart Grid

Overview of the NIST Risk Management Framework as described in SP 800-37  Presented by Lance Kelson 5/24/2011.    audio file 1