Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 161 results for the Insider Threat

Video | April 2017 - Video SEI Cyber Minute: Insider Threats By Randall F. Trzeciak

Watch Randy Trzeciak in this SEI Cyber Minute as he discusses

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

Brochure | February 2016 - Brochure CERT Insider Threat Center By CERT Insider Threat Center

This booklet describes the CERT Insider Threat Center's purpose, products, and services, including assessments, workshops, courses, and certificate programs.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.

Article | April 2016 - Article Introduction to the Special Issue on Insider Threat Modeling ... By Andrew P. Moore, Kirk A. Kennedy (Federal Bureau of Investigation), Thomas J. Dover (Federal Bureau of Investigation)

In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.

Technical Note | December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat ... By George Silowash, Derrick Spooner, Daniel L. Costa, Michael J. Albrethsen

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

Collection | April 2016 - Collection Special Issue on Insider Threat Modeling and Simulation

This special issue demonstrates how modeling and simulation can help understand the insider threat problem and help test mitigation controls in a secure environment.

White Paper | October 2015 - White Paper Effective Insider Threat Programs: Understanding and ... By Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.