Carly L. Huth
CERT
Publications by Carly L. Huth
-
Incident Management Capability Assessment
December 19, 2018 • Technical Report
Audrey J. DorofeeRobin RuefleMark Zajicek
The capabilities presented in this report provide a benchmark of incident management practices.
read -
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014 • Technical Report
Lori FlynnCarly L. HuthPalma Buttles-Valdez
This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”
read -
Components and Considerations in Building an Insider Threat Program
November 07, 2013 • Webinar
Carly L. HuthRobin Ruefle
In this November 2013 webinar, Carly Huth and Robin Ruefle discuss the key components you should consider when you're developing new insider threat programs.
watch -
Best Practices Against Insider Threats in All Nations
August 27, 2013 • Technical Note
Lori FlynnCarly L. HuthRandall F. Trzeciak
In this report, the authors summarize best practices for mitigating insider threats in international contexts.
read -
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 01, 2013 • Technical Report
Bjorn AnderssonLori FlynnDavid P. Gluch
This report describes line-funded exploratory new starts (LENS) projects that were conducted during fiscal year 2012 (October 2011 through September 2012).
read -
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
December 01, 2012 • White Paper
William R. ClaycombCarly L. HuthLori Flynn
In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.
read -
Best Practices Against Insider Threats in All Nations
October 30, 2012 • Conference Paper
Lori FlynnCarly L. HuthRandall F. Trzeciak
In this paper, the authors summarize best practices for mitigating insider threats in international contexts.
read -
The Impact of Passive DNS Collection on End-User Privacy
March 22, 2012 • White Paper
Jonathan SpringCarly L. Huth
In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.
read