Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 41 results for Incident Handling

Handbook | April 2003 - Handbook Handbook for Computer Security Incident Response Teams ... By Moira West Brown, Don Stikvoort, Klaus-Peter Kossakowski, Georgia Killcrece, Robin Ruefle, Mark Zajicek

In this 2003 handbook, the authors describe different organizational models for implementing incident handling capabilities.

Handbook | December 2003 - Handbook Organizational Models for Computer Security Incident ... By Georgia Killcrece, Klaus-Peter Kossakowski, Robin Ruefle, Mark Zajicek

This 2003 report describes different organizational models for implementing incident handling capabilities, including each model's advantages and disadvantages and the kinds of incident management services that best fit with it.

Podcast | November 2018 - Podcast A Technical Strategy for Cybersecurity By Roberta (Bobbie) Stempfley

Roberta “Bobbie” Stempfley, who was appointed director of the SEI’s CERT Division in June 2017, discusses a technical strategy for cybersecurity.

Brochure | June 2018 - Brochure DDoS Quick Reference Guide for NatCSIRTs

This quick reference guide helps NatCSIRTs deal with DDoS attacks.

Collection | January 2017 - Collection Resources for Creating a CSIRT

These resources help you to get started when creating a new CSIRT.

Podcast | September 2018 - Podcast How to Be a Network Traffic Analyst By Timothy J. Shimeall, Timur D. Snoke

Tim Shimeall and Timur Snoke, researchers in the SEI’s CERT Division, examine the role of the network traffic analyst in capturing and evaluating ever-increasing volumes of network data.

Podcast | August 2018 - Podcast Workplace Violence and Insider Threat By Tracy Cassidy, Carrie Gardner

Tracy Cassidy and Carrie Gardner, researchers with the CERT National Insider Threat Center, discuss research on using technology to detect an employee’s intent to cause physical harm.

Form | March 2018 - Form CSIH Recommendation Form

This form is to be used for recommendations during the Computer Security Incident Handler(CSIH) application review phase.

Form | March 2018 - Form Certification Renewal Payment Form

This form is to be used along with a payment for renewing certification for a Certified Computer Security Incident Handler (CSIH) or Certified PSP Developer.

Podcast | June 2018 - Podcast Best Practices in Cyber Intelligence By Jared Ettinger

Jared Ettinger describes preliminary findings and best practices in cyber intelligence identified through a study sponsored by the U.S. Office of the Director of National Intelligence.