Showing 1 - 10 of 161 results for the Insider Threat
Watch Randy Trzeciak in this SEI Cyber Minute as he discusses
Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
This booklet describes the CERT Insider Threat Center's purpose, products, and services, including assessments, workshops, courses, and certificate programs.
In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.
In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.
This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
This special issue demonstrates how modeling and simulation can help understand the insider threat problem and help test mitigation controls in a secure environment.