search menu icon-carat-right cmu-wordmark

Components and Considerations in Building an Insider Threat Program

Webcast
In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.
Publisher

Software Engineering Institute

Watch

Abstract

Watch Carly Huth and Robin Ruefle discuss components and considerations in building an insider threat program from the virtual event Managing the Insider Threat: What Every Organization Should Know.

About the Speakers

Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management Directorate in the CERT Program at the Software Engineering Institute (SEI). Huth's current areas of research include the intersections of privacy and technology, as well as the effects of the current regulatory environment on insider threat prevention practices.

Robin Ruefle is a member of the technical staff of the CERT Program at the Software Engineering Institute (SEI) at Carnegie Mellon University. Ruefle has co-authored: Handbook for CSIRTs 2nd Edition, Organizational Models for CSIRTs Handbook, CSIRT Services List, State of the Practice of CSIRTs, Defining Incident Management Processes for CSIRTs: A Work in Progress, and numerous other articles and guides.

About the Speaker

Carly L. Huth

Carly Huth is an SEI alumni employee.

Read more
Robin M. Ruefle

Robin Ruefle

Robin Ruefle is a member of the technical staff of the CERT Program at the Software Engineering Institute (SEI) at Carnegie Mellon University. Ruefle's focus is on the development of management, procedural, and technical guidelines and practices for the establishment, maturation, operation, and evaluation of Computer Security Incident Response Teams …

Read more