Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 199 results for the Threat

Video | April 2017 - Video SEI Cyber Minute: Insider Threats By Randall F. Trzeciak

Watch Randy Trzeciak in this SEI Cyber Minute as he discusses

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, 5th ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations‰ insider threat programs.

Technical Note | December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat ... By George Silowash, Derrick Spooner, Daniel L. Costa, Michael J. Albrethsen

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

Brochure | December 2016 - Brochure SEI Education and Training Catalog

This catalog describes SEI training and certificates that help you tackle today's software, systems, and cybersecurity challenges.

Webinar | July 2016 - Webinar How to Build an Effective Insider Threat Program to Comply ... By Randall F. Trzeciak

In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

Technical Report | April 2016 - Technical Report A Unique Approach to Threat Analysis Mapping: A Malware ... By Deana Shick, Kyle O'Meara

As they constantly change network infrastructure, adversaries consistently use and update the tools they use. This report presents a way for researchers to begin threat analysis with those tools rather than with network or incident data alone.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.

Article | April 2016 - Article Inadvertent Leaks: Exploration via Agent-Based Dynamic ... By Kathleen Carley (Carnegie Mellon School of Computer Science), Geoffrey P. Morgan (Carnegie Mellon School of Computer Science)

In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.