Derrick Spooner
Software Engineering Institute
Publications by Derrick Spooner
-
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 03, 2018 • White Paper
Derrick SpoonerGeorge SilowashDaniel L. Costa
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
read -
Low Cost Technical Solutions to Jump Start an Insider Threat Program
December 12, 2016 • Technical Note
George SilowashDerrick SpoonerDaniel L. Costa
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
read -
An Insider Threat Indicator Ontology
May 10, 2016 • Technical Report
Daniel L. CostaMichael J. AlbrethsenMatthew L. Collins
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
read -
An Ontology for Insider Threat Indicators
November 24, 2014 • Conference Paper
Daniel L. CostaMatthew L. CollinsSamuel J. Perl
In this paper, the authors describe their ongoing development of an insider threat indicator ontology.
read -
Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)
May 20, 2013 • Technical Note
Matthew L. CollinsDerrick SpoonerDawn Cappelli
In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.
read -
Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised
October 01, 2012 • White Paper
Todd LewellenAndrew P. MooreDawn Cappelli
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
read -
A Preliminary Model of Insider Theft of Intellectual Property
June 01, 2011 • Technical Note
Andrew P. MooreDawn CappelliThomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University)
In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.
read -
Spotlight On: Insider Threat from Trusted Business Partners
February 01, 2010 • White Paper
Robert Weiland (Carnegie Mellon University)Andrew P. MooreDawn Cappelli
In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.
read -
Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2009)
June 01, 2009 • White Paper
Derrick SpoonerDawn CappelliAndrew P. Moore
In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.
read