Daniel L. Costa
Software Engineering Institute
Publications by Daniel L. Costa
-
Applying Text Analytics to Insider Threat Detection
September 15, 2021 • Video
Daniel L. CostaCarrie Gardner
In this talk, we discuss how text analytics can be used to enhance an organization's insider risk management practices, highlight the state of the practice, identify current limitations, and present strategies for incorporating text analytic capability.
watch -
Balanced Approaches to Insider Risk Management
September 08, 2021 • Webinar
Randall F. TrzeciakDaniel L. Costa
In this webcast, Randy Trzeciak and Dan Costa provide an overview of the ongoing research in this area, and answer questions about how the threat landscape continues to evolve, and what organizations can and should do to address insider threats.
watch -
Amplifying Your Privacy Program: Strategies for Success
March 30, 2021 • Webinar
Daniel L. CostaCarrie Gardner
In this webcast, Dan Costa and Carrie Gardner highlight best practices for privacy program planning and implementation.
watch -
Insider Threats: Your Questions. Our Answers.
September 23, 2019 • Webinar
Matthew J. ButkovicRandall F. TrzeciakDaniel L. Costa
In this webcast, as a part of National Insider Threat Awareness Month, our experts provided an overview of the ongoing research in this area, and answered questions about how the threat landscape continues to evolve.
watch -
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States (Study Report and Implementation Guides)
May 21, 2019 • Collection
Jared EttingerApril GalyardtRitwik Gupta
This report details the findings of a study the SEI conducted at the request of the United States Office of the Director of National Intelligence. In the report, we present current best practices and common challenges in cyber intelligence.
view -
Common Sense Guide to Mitigating Insider Threats, Sixth Edition
February 27, 2019 • Technical Report
Michael C. TheisRandall F. TrzeciakDaniel L. Costa
The guide presents recommendations for mitigating insider threat based on the CERT Division's continued research and analysis of more than 1,500 insider threat cases.
read -
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 03, 2018 • White Paper
Derrick SpoonerGeorge SilowashDaniel L. Costa
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
read -
Model-Driven Insider Threat Control Selection and Deployment
December 06, 2017 • Presentation
Randall F. TrzeciakDaniel L. Costa
This presentation discusses how organizations can identify, prioritize, and select appropriate security controls.
read -
Common Sense Guide to Mitigating Insider Threats, Fifth Edition
December 21, 2016 • Technical Report
Matthew L. CollinsMichael C. TheisRandall F. Trzeciak
Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
read -
Low Cost Technical Solutions to Jump Start an Insider Threat Program
December 12, 2016 • Technical Note
George SilowashDerrick SpoonerDaniel L. Costa
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
read -
An Insider Threat Indicator Ontology
May 10, 2016 • Technical Report
Daniel L. CostaMichael J. AlbrethsenMatthew L. Collins
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
read -
An Ontology for Insider Threat Indicators
November 24, 2014 • Conference Paper
Daniel L. CostaMatthew L. CollinsSamuel J. Perl
In this paper, the authors describe their ongoing development of an insider threat indicator ontology.
read -
Insider Threats in the Software Development Life Cycle
November 05, 2014 • Presentation
Daniel L. CostaRandall F. Trzeciak
This TSP Symposium 2014 presentation uncovers patterns from cases in which insiders exploited vulnerabilities in software development processes to harm their organizations.
read -
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
October 03, 2013 • Technical Note
Todd LewellenGeorge SilowashDaniel L. Costa
In this report, the authors describe how an insider threat control can monitor an organization's web request traffic for text-based data exfiltration.
read -
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
March 01, 2013 • Technical Note
George SilowashTodd LewellenJoshua W. Burns
In this report, the authors present methods for detecting and preventing data exfiltration using a Linux-based proxy server in a Microsoft Windows environment.
read