Tracy Cassidy
Software Engineering Institute
Publications by Tracy Cassidy
-
Common Sense Guide to Mitigating Insider Threats, Sixth Edition
February 27, 2019 • Technical Report
Michael C. TheisRandall F. TrzeciakDaniel L. Costa
The guide presents recommendations for mitigating insider threat based on the CERT Division's continued research and analysis of more than 1,500 insider threat cases.
read -
Workplace Violence and Insider Threat
August 28, 2018 • Podcast
Tracy CassidyCarrie Gardner
Tracy Cassidy and Carrie Gardner, researchers with the CERT National Insider Threat Center, discuss research on using technology to detect an employee's intent to cause physical harm.
learn more -
Technical Detection of Intended Violence against Self or Others
October 30, 2017 • Presentation
Tracy Cassidy
Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace
read -
Technical Detection of Intended Violence Against Self or Others
October 30, 2017 • Poster
Tracy Cassidy
Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within the workplace via insider threat detection tools
read -
Common Sense Guide to Mitigating Insider Threats, Fifth Edition
December 21, 2016 • Technical Report
Matthew L. CollinsMichael C. TheisRandall F. Trzeciak
Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
read -
The Critical Role of Positive Incentives for Reducing Insider Threats
December 15, 2016 • Technical Report
Andrew P. MooreJeff SavindaElizabeth A. Monaco
This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.
read -
Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
July 09, 2014 • Conference Paper
Jeremy R. StrozerMatthew L. CollinsTracy Cassidy
In this paper, the authors provide documented research to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware).
read -
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014 • Technical Report
Lori FlynnCarly L. HuthPalma Buttles-Valdez
This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”
read