Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Greg Porter (Heinz College at Carnegie Mellon University)
January 2016 - Article CYBURGH, PA: Using Technology Wisely to Protect Your Organization

Authors: Greg Porter (Heinz College at Carnegie Mellon University)

In this teQ Magazine article, Greg Porter discusses the role technology plays in solving today's cybersecurity challenges.

January 2014 - Technical Note Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase II, Expanded Analysis and Recommendations

Topics: Insider Threat

Authors: Lori Flynn, Greg Porter (Heinz College at Carnegie Mellon University), Chas DiFatta (No Affiliation)

In this report, the authors discuss the countermeasures that cloud service providers use and how they understand the risks posed by insiders.

November 2013 - Technical Note Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase I

Topics: Insider Threat

Authors: Greg Porter (Heinz College at Carnegie Mellon University)

In this report, Greg Porter documents preliminary findings from interviews with cloud service providers on their insider threat controls.

June 2013 - Video Medical Identity Theft, An Alarming Trend: Incident Response Considerations

Topics: Cybersecurity Engineering, Incident Management

Authors: Greg Porter

In this video, Greg Porter presents an alarming trend—medical identity theft.

September 2010 - Webinar Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

Topics: Cybersecurity Engineering, Insider Threat

Authors: Greg Porter (Heinz College at Carnegie Mellon University), Randall F. Trzeciak

In this 2010 webinar, the presenters provide essential information to help healthcare technology executives secure patient information and systems from threats.