Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 161 results for the Insider Threat

Video | April 2017 - Video SEI Cyber Minute: Insider Threats By Randall F. Trzeciak

Watch Randy Trzeciak in this SEI Cyber Minute as he discusses

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Presentation | October 2017 - Presentation Technical Detection of Intended Violence against Self or ... By Tracy Cassidy

Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace

Poster | October 2017 - Poster Technical Detection of Intended Violence Against Self or ... By Tracy Cassidy

Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within the workplace via insider threat detection tools

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.

Article | April 2016 - Article Introduction to the Special Issue on Insider Threat Modeling ... By Andrew P. Moore, Kirk A. Kennedy (Federal Bureau of Investigation), Thomas J. Dover (Federal Bureau of Investigation)

In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.

Brochure | February 2016 - Brochure CERT Insider Threat Center By CERT Insider Threat Center

This booklet describes the CERT Insider Threat Center's purpose, products, and services, including assessments, workshops, courses, and certificate programs.

White Paper | October 2015 - White Paper Effective Insider Threat Programs: Understanding and ... By Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.

Refine