Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Bradford J. Willke
April 2011 - Technical Report Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0

Topics: Incident Management

Authors: John Haller, Samuel A. Merrell, Matthew J. Butkovic, Bradford J. Willke

In this 2011 report, an update to its 2010 counterpart, the authors provide insight that interested organizations and governments can use to develop a national incident management capability.

June 2010 - Special Report Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability

Topics: Incident Management

Authors: John Haller, Samuel A. Merrell, Matthew J. Butkovic, Bradford J. Willke

In this report, the authors provide insight that interested organizations and governments can use to develop a national incident management capability.

August 2008 - Podcast Managing Risk to Critical Infrastructures at the National Level

Authors: Bradford J. Willke, Julia H. Allen

In this podcast, Bradford Willke explain how protecting critical infrastructures and the information they use are essential for preserving our way of life.

January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government Sector

Topics: Insider Threat

Authors: Eileen Kowalski (United States Secret Service), Dawn Cappelli, Bradford J. Willke, Andrew P. Moore

In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.

June 2005 - Technical Note Information Asset Profiling

Topics: Cyber Risk and Resilience Management

Authors: James F. Stevens, Richard A. Caralli, Bradford J. Willke

In this 2005 report, the authors describe IAP, a documented and repeatable process for developing consistent asset profiles.

December 2004 - Technical Note Managing for Enterprise Security

Topics: Cyber Risk and Resilience Management

Authors: Richard A. Caralli, Julia H. Allen, James F. Stevens, Bradford J. Willke, William R. Wilson

In this 2004 report, the authors itemize characteristics of common approaches to security that limit effectiveness and success.

July 2004 - Technical Report The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management

Topics: Cyber Risk and Resilience Management

Authors: Richard A. Caralli, James F. Stevens, Bradford J. Willke, William R. Wilson

In this report, the authors describe the critical success factor method and present theories and experience in applying it to enterprise security management.