icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Carly L. Huth
Carly L. Huth
Carly Huth is an SEI alumni employee.
All
Tech Publications
Videos
Incident Management Capability Assessment
December 19, 2018
•
Technical Report
By
Audrey J. Dorofee
,
Robin Ruefle
,
Mark Zajicek
,
David McIntire
,
Samuel J. Perl
,
Christopher J. Alberts
,
Carly L. Huth
,
Pennie Walters
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014
•
Technical Report
By
Lori Flynn
,
Carly L. Huth
,
Palma Buttles-Valdez
,
Michael C. Theis
,
George Silowash
,
Tracy Cassidy
,
Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program)
,
Randall F. Trzeciak
Components and Considerations in Building an Insider Threat Program
November 7, 2013
•
Webcast
By
Carly L. Huth
,
Robin Ruefle
Best Practices Against Insider Threats in All Nations
August 27, 2013
•
Technical Note
By
Lori Flynn
,
Carly L. Huth
,
Randall F. Trzeciak
,
Palma Buttles-Valdez
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 1, 2013
•
Technical Report
By
Bjorn Andersson
,
Stephany Bellomo
,
Lisa Brownsword
,
Yuanfang Cai (Drexel University)
,
Sagar Chaki
,
William R. Claycomb
,
Julie B. Cohen
,
Peter H. Feiler
,
Robert Ferguson
,
Lori Flynn
,
David P. Gluch
,
Dennis Goldenson
,
Arie Gurfinkel
,
Jeff Havrilla
,
Chuck Hines
,
John J. Hudak
,
Carly L. Huth
,
Wesley Jin
,
Rick Kazman
,
Mary Ann Lapham
,
James McCurley
,
John McGregor
,
David McIntire
,
Robert Nord
,
Ipek Ozkaya
,
Brittany Phillips
,
Robert W. Stoddard
,
David Zubrow
More from Carly Huth
Incident Management Capability Assessment
December 19, 2018
•
Technical Report
By
Audrey J. Dorofee
,
Robin Ruefle
,
Mark Zajicek
,
David McIntire
,
Samuel J. Perl
,
Christopher J. Alberts
,
Carly L. Huth
,
Pennie Walters
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014
•
Technical Report
By
Lori Flynn
,
Carly L. Huth
,
Palma Buttles-Valdez
,
Michael C. Theis
,
George Silowash
,
Tracy Cassidy
,
Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program)
,
Randall F. Trzeciak
Best Practices Against Insider Threats in All Nations
August 27, 2013
•
Technical Note
By
Lori Flynn
,
Carly L. Huth
,
Randall F. Trzeciak
,
Palma Buttles-Valdez
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 1, 2013
•
Technical Report
By
Bjorn Andersson
,
Stephany Bellomo
,
Lisa Brownsword
,
Yuanfang Cai (Drexel University)
,
Sagar Chaki
,
William R. Claycomb
,
Julie B. Cohen
,
Peter H. Feiler
,
Robert Ferguson
,
Lori Flynn
,
David P. Gluch
,
Dennis Goldenson
,
Arie Gurfinkel
,
Jeff Havrilla
,
Chuck Hines
,
John J. Hudak
,
Carly L. Huth
,
Wesley Jin
,
Rick Kazman
,
Mary Ann Lapham
,
James McCurley
,
John McGregor
,
David McIntire
,
Robert Nord
,
Ipek Ozkaya
,
Brittany Phillips
,
Robert W. Stoddard
,
David Zubrow
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
December 1, 2012
•
White Paper
By
William R. Claycomb
,
Carly L. Huth
,
Lori Flynn
,
David McIntire
,
Todd Lewellen
More from Carly Huth
Components and Considerations in Building an Insider Threat Program
November 7, 2013
•
Webcast
By
Carly L. Huth
,
Robin Ruefle
More from Carly Huth