Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Robert Floodeen
May 2014 - Webinar Heartbleed: Analysis, Thoughts, and Actions

Topics: Network Situational Awareness, Secure Coding

Authors: Will Dormann, Robert Floodeen, Brent Kennedy, William Nichols, Jason McCormick, Robert C. Seacord

Panelists discussed the impact of Heartbleed, methods to mitigate the vulnerability, and ways to prevent crises like this in the future.

November 2013 - Webinar Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

Topics: Insider Threat

Authors: Robert Floodeen, William R. Claycomb, Andrew P. Moore, Kurt C. Wallnau, Randall F. Trzeciak, Alex Nicoll

In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.

March 2013 - White Paper Identifying a Shared Mental Model Among Incident Responders

Topics: Incident Management

Authors: Robert Floodeen, John Haller, Brett Tjaden

In this paper, the authors explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident.

September 2012 - Technical Note Communication Among Incident Responders – A Study

Topics: Incident Management

Authors: Brett Tjaden, Robert Floodeen

In this report, the authors describe three factors for helping or hindering the cooperation of incident responders.

January 2012 - White Paper Communication Among Incident Responders - A Study

Topics: Incident Management

Authors: Brett Tjaden, Robert Floodeen

In this paper, the authors describe preliminary results of a study of how effective nine autonomous incident response organizations are.

October 2010 - Presentation The Key to Successful Monitoring for Detection of Insider Attacks

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Robert Floodeen

In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.