Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Tracy Cassidy
December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth Edition

Topics: Insider Threat

Authors: Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider Threats

Topics: Insider Threat

Authors: Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.

July 2014 - Conference Paper Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector

Topics: Insider Threat

Authors: Jeremy R. Strozer, Matthew L. Collins, Tracy Cassidy

In this paper, the authors provide documented research to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware).

April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Palma Buttles-Valdez, Michael C. Theis, George Silowash, Tracy Cassidy, Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program), Randall F. Trzeciak

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”