search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Carly L. Huth
Carly Huth
Carly Huth is an SEI alumni employee.
All
Tech Publications
Videos
Incident Management Capability Assessment
December 19, 2018
•
Technical Report
By
Audrey J. Dorofee
,
Robin Ruefle
,
Mark Zajicek
,
David McIntire
,
Samuel J. Perl
,
Christopher J. Alberts
,
Carly L. Huth
,
Pennie Walters
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014
•
Technical Report
By
Lori Flynn
,
Carly L. Huth
,
Palma Buttles-Valdez
,
Michael C. Theis
,
George Silowash
,
Tracy Cassidy
,
Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program)
,
Randall F. Trzeciak
Components and Considerations in Building an Insider Threat Program
November 7, 2013
•
Webcast
By
Carly L. Huth
,
Robin Ruefle
Best Practices Against Insider Threats in All Nations
August 27, 2013
•
Technical Note
By
Lori Flynn
,
Carly L. Huth
,
Randall F. Trzeciak
,
Palma Buttles-Valdez
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 1, 2013
•
Technical Report
By
Bjorn Andersson
,
Stephany Bellomo
,
Lisa Brownsword
,
Yuanfang Cai (Drexel University)
,
Sagar Chaki
,
William R. Claycomb
,
Julie B. Cohen
,
Peter H. Feiler
,
Robert Ferguson
,
Lori Flynn
,
David P. Gluch
,
Dennis Goldenson
,
Arie Gurfinkel
,
Jeff Havrilla
,
Chuck Hines
,
John J. Hudak
,
Carly L. Huth
,
Wesley Jin
,
Rick Kazman
,
Mary Ann Lapham
,
James McCurley
,
John McGregor
,
David McIntire
,
Robert Nord
,
Ipek Ozkaya
,
Brittany Phillips
,
Robert W. Stoddard
,
David Zubrow
More from Carly Huth
Incident Management Capability Assessment
December 19, 2018
•
Technical Report
By
Audrey J. Dorofee
,
Robin Ruefle
,
Mark Zajicek
,
David McIntire
,
Samuel J. Perl
,
Christopher J. Alberts
,
Carly L. Huth
,
Pennie Walters
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
April 16, 2014
•
Technical Report
By
Lori Flynn
,
Carly L. Huth
,
Palma Buttles-Valdez
,
Michael C. Theis
,
George Silowash
,
Tracy Cassidy
,
Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program)
,
Randall F. Trzeciak
Best Practices Against Insider Threats in All Nations
August 27, 2013
•
Technical Note
By
Lori Flynn
,
Carly L. Huth
,
Randall F. Trzeciak
,
Palma Buttles-Valdez
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 1, 2013
•
Technical Report
By
Bjorn Andersson
,
Stephany Bellomo
,
Lisa Brownsword
,
Yuanfang Cai (Drexel University)
,
Sagar Chaki
,
William R. Claycomb
,
Julie B. Cohen
,
Peter H. Feiler
,
Robert Ferguson
,
Lori Flynn
,
David P. Gluch
,
Dennis Goldenson
,
Arie Gurfinkel
,
Jeff Havrilla
,
Chuck Hines
,
John J. Hudak
,
Carly L. Huth
,
Wesley Jin
,
Rick Kazman
,
Mary Ann Lapham
,
James McCurley
,
John McGregor
,
David McIntire
,
Robert Nord
,
Ipek Ozkaya
,
Brittany Phillips
,
Robert W. Stoddard
,
David Zubrow
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
December 1, 2012
•
White Paper
By
William R. Claycomb
,
Carly L. Huth
,
Lori Flynn
,
David McIntire
,
Todd Lewellen
More from Carly Huth
Components and Considerations in Building an Insider Threat Program
November 7, 2013
•
Webcast
By
Carly L. Huth
,
Robin Ruefle
More from Carly Huth