icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Derrick Spooner
Derrick Spooner
Software Engineering Institute
All
Tech Publications
Blog Posts
The Processes of Insider Threat Analysis
March 12, 2021
•
White Paper
By
Angela Horneman
,
Robert M. Ditmore
,
Derrick Spooner
Insider Threat Indicator Cost Matrix
February 15, 2021
•
White Paper
By
Robert M. Ditmore
,
Carrie Gardner
,
Derrick Spooner
Functional Requirements for Insider Threat Tool Testing
March 19, 2020
•
Blog Post
By
Robert M. Ditmore
,
Derrick Spooner
Windows Event Logging for Insider Threat Detection
May 23, 2019
•
Blog Post
By
Derrick Spooner
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 3, 2018
•
White Paper
By
Derrick Spooner
,
George Silowash
,
Daniel L. Costa
,
Michael J. Albrethsen
More from Derrick Spooner
The Processes of Insider Threat Analysis
March 12, 2021
•
White Paper
By
Angela Horneman
,
Robert M. Ditmore
,
Derrick Spooner
Insider Threat Indicator Cost Matrix
February 15, 2021
•
White Paper
By
Robert M. Ditmore
,
Carrie Gardner
,
Derrick Spooner
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 3, 2018
•
White Paper
By
Derrick Spooner
,
George Silowash
,
Daniel L. Costa
,
Michael J. Albrethsen
Low Cost Technical Solutions to Jump Start an Insider Threat Program
December 12, 2016
•
Technical Note
By
George Silowash
,
Derrick Spooner
,
Daniel L. Costa
,
Michael J. Albrethsen
An Insider Threat Indicator Ontology
May 10, 2016
•
Technical Report
By
Daniel L. Costa
,
Michael J. Albrethsen
,
Matthew L. Collins
,
Samuel J. Perl
,
George Silowash
,
Derrick Spooner
More from Derrick Spooner
Functional Requirements for Insider Threat Tool Testing
March 19, 2020
•
Blog Post
By
Robert M. Ditmore
,
Derrick Spooner
Windows Event Logging for Insider Threat Detection
May 23, 2019
•
Blog Post
By
Derrick Spooner
Navigating the Insider Threat Tool Landscape
June 13, 2018
•
Blog Post
By
Derrick Spooner
Privileged Account Management (Part 11 of 20: CERT Best Practices to Mitigate Insider Threats Series)
June 21, 2017
•
Blog Post
By
Derrick Spooner
Password and Account Management (Part 10 of 20: CERT Best Practices to Mitigate Insider Threats Series)
June 14, 2017
•
Blog Post
By
Derrick Spooner
More from Derrick Spooner
Send a Message