Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 7 of 7 results for Insider Threat

Podcast | November 2017 - Podcast Positive Incentives for Reducing Insider Threat By Andrew P. Moore, Daniel Bauer

Andrew Moore and Daniel Bauer highlight results from our recent research that suggests organizations need to take a more holistic approach to mitigating insider threat.

Podcast | December 2017 - Podcast 5 Best Practices for Preventing and Responding to Insider ... By Randall F. Trzeciak

Randy Trzeciak, technical manager of the CERT National Insider Threat Center, discusses five best practices for preventing and responding to insider threat.

Podcast | February 2013 - Podcast Mitigating Insider Threat - New and Improved Practices Fourth ... By George Silowash, Lori Flynn, Julia H. Allen

In this podcast, participants explain how 371 cases of insider attacks led to 4 new and 15 updated best practices for mitigating insider threats.

Podcast | January 2011 - Podcast Indicators and Controls for Mitigating Insider Threat By Michael Hanley, Julia H. Allen

In this podcast, Michael Hanley explains how technical controls can be effective in helping to prevent, detect, and respond to insider crimes.

Podcast | August 2009 - Podcast Mitigating Insider Threat: New and Improved Practices By Dawn Cappelli, Randall F. Trzeciak, Andrew P. Moore, Julia H. Allen

Two hundred and eighty-two cases of actual insider attacks suggest 16 best practices for preventing and detecting insider threat.

Podcast | November 2006 - Podcast Protecting Against Insider Threat By Dawn Cappelli, Julia H. Allen

In this podcast, Dawn Cappelli describes the real and substantial threat of attack from insiders.

Podcast | March 2008 - Podcast Insider Threat and the Software Development Life Cycle By Dawn Cappelli, Julia H. Allen

In this podcast, Dawn Cappelli explains how insider threat vulnerabilities can be introduced during all phases of the software development lifecycle.