Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Randall F. Trzeciak
December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, 5th Edition

Topics: Insider Threat

Authors: Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

August 2016 - Video SEI Cyber Minute: Engaging Stakeholders on Insider Threat

Authors: Randall F. Trzeciak

Randy Trzeciak discusses "Engaging Stakeholders on Insider Threat."

July 2016 - Webinar How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate

Topics: Insider Threat

Authors: Randall F. Trzeciak

In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.

July 2016 - Video SEI Cyber Minute: Are You Vulnerable to Insider Threats?

Authors: Randall F. Trzeciak

Randy Trzeciak discusses "Are You Vulnerable to Insider Threats?"

October 2015 - White Paper Effective Insider Threat Programs: Understanding and Avoiding Potential Pitfalls

Topics: Insider Threat

Authors: Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

November 2014 - Presentation Insider Threats in the Software Development Life Cycle

Authors: Daniel L. Costa, Randall F. Trzeciak

This TSP Symposium 2014 presentation uncovers patterns from cases in which insiders exploited vulnerabilities in software development processes to harm their organizations.

April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Palma Buttles-Valdez, Michael C. Theis, George Silowash, Tracy Cassidy, Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program), Randall F. Trzeciak

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”

December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated and Revised

Topics: Insider Threat

Authors: Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

November 2013 - Webinar Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

Topics: Insider Threat

Authors: Robert Floodeen, William R. Claycomb, Andrew P. Moore, Kurt C. Wallnau, Randall F. Trzeciak, Alex Nicoll

In this webinar, a watch panel discusses Managing the Insider Threat: What Every Organization Should Know.

November 2013 - Webinar Illicit Cyber Activity Involving Fraud

Topics: Insider Threat

Authors: Randall F. Trzeciak

In this webinar, Randy Trzeciak discusses a study to develop insights and risk indicators related to malicious insider activity in the banking and finance sector.

November 2013 - Webinar Overview of the Threat Posed by Insiders to Critical Assets

Topics: Insider Threat

Authors: Randall F. Trzeciak, Dave Mundie

In this 2013 webinar, Randy Trzeciak and David Mundie discuss the challenges organizations face as they try to address insider threat.

August 2013 - Technical Note Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this report, the authors summarize best practices for mitigating insider threats in international contexts.

May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)

Topics: Insider Threat

Authors: Matthew L. Collins, Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.

December 2012 - Technical Note Analyzing Cases of Resilience Success and Failure - A Research Study

Topics: Cyber Risk and Resilience Management

Authors: Julia H. Allen, Pamela D. Curtis, Andrew P. Moore, Nader Mehravari, Kevin G. Partridge, Robert W. Stoddard, Randall F. Trzeciak

In this report, the authors describe research aimed at helping organizations to know the business value of implementing resilience processes and practices.

December 2012 - Technical Report Common Sense Guide to Mitigating Insider Threats, 4th Edition

Topics: Insider Threat

Authors: George Silowash, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall, Lori Flynn

In this report, the authors define insider threats and outline current insider threat patterns and trends.

October 2012 - Conference Paper Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this paper, the authors summarize best practices for mitigating insider threats in international contexts.

October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised

Topics: Insider Threat

Authors: Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

July 2012 - Special Report Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector

Topics: Insider Threat

Authors: Adam Cummings, Todd Lewellen, David McIntire, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors describe insights and risk indicators of malicious insider activity in the banking and finance sector.

January 2012 - Book The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

Topics: Insider Threat

Authors: Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this book, the authors present best practices for managing the security and survivability of people, information, technology, and facilities.

October 2011 - Webinar SEI Technologies Forum: The Insider Threat: Lessons Learned from Actual Insider Attacks

Topics: Insider Threat

Authors: Randall F. Trzeciak

In this 2011 webinar, Randy Trzeciak discusses the CERT Insider Threat Center, and the mitigation strategies and lessons learned from actual insider attacks.

June 2011 - Technical Note A Preliminary Model of Insider Theft of Intellectual Property

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak

In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.

February 2011 - Technical Note An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases

Topics: Insider Threat

Authors: Michael Hanley, Tyler Dean, Will Schroeder, Matt Houy, Randall F. Trzeciak, Joji Montelibano

In this report, the authors provide an overview of techniques used by malicious insiders to steal intellectual property.

October 2010 - Presentation The Key to Successful Monitoring for Detection of Insider Attacks

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Robert Floodeen

In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.

September 2010 - Webinar Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

Topics: Cybersecurity Engineering, Insider Threat

Authors: Greg Porter (Heinz College at Carnegie Mellon University), Randall F. Trzeciak

In this 2010 webinar, the presenters provide essential information to help healthcare technology executives secure patient information and systems from threats.

February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners

Topics: Insider Threat

Authors: Robert Weiland (Carnegie Mellon University), Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.

August 2009 - Podcast Mitigating Insider Threat: New and Improved Practices

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Andrew P. Moore, Julia H. Allen

Two hundred and eighty-two cases of actual insider attacks suggest 16 best practices for preventing and detecting insider threat.

July 2009 - White Paper Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak

In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.

June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2009)

Topics: Insider Threat

Authors: Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.

April 2009 - Presentation Best Practices For Mitigating Insider Threat: Lessons Learned From 250 Cases

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak

In this presentation, Dawn Cappelli and Randy Trzeciak describe sixteen best practices for mitigating insider threats.

March 2009 - White Paper Spotlight On: Malicious Insiders with Ties to the Internet Underground Community

Topics: Insider Threat

Authors: Michael Hanley, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak

In this report, the authors focus on insider threat cases in which the insider had relationships with the internet underground community.

January 2009 - White Paper Common Sense Guide to Prevention and Detection of Insider Threats 3rd Edition – Version 3.1

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall

In this paper, the authors present findings from examining insider crimes in a new way and add new practices that were not present in the second edition.

December 2008 - White Paper Spotlight On: Programming Techniques Used as an Insider Attack Tool

Topics: Insider Threat

Authors: Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.

May 2008 - Technical Report The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures

Topics: Insider Threat

Authors: Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak

In this report, the authors describe seven observations about insider IT sabotage based on their empirical data and study findings.

December 2006 - Technical Report Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis

Topics: Process Improvement

Authors: Steven R. Band (Counterintelligence Field Activity - Behavioral Science Directorate), Dawn Cappelli, Lynn F. Fischer, Andrew P. Moore, Eric D. Shaw, Randall F. Trzeciak

In this report, the authors examine the psychological, technical, organizational, and contextual factors that contribute to espionage and insider sabotage.

January 2006 - Presentation Insider Threats in the SDLC: Lessons Learned from Actual Incidents of Fraud, Theft of Sensitive Information and IT Sabotage

Topics: Insider Threat

Authors: Dawn Cappelli, Randall F. Trzeciak, Andrew P. Moore

In this 2006 presentation, the authors describe the lessons they learned from real-world fraud, theft, and sabotage incidents.

January 2006 - Presentation Insider Threats in the SDLC

Topics: Insider Threat

Authors: Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

This presentation on insider threats in the SDLC was delivered by Dawn Cappelli, Andrew P. Moore, and Randy Trzeciak of the Software Engineering Institute's CERT Program in 2006.