search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Derrick Spooner
Derrick Spooner
Software Engineering Institute
All
Tech Publications
Blog Posts
Functional Requirements for Insider Threat Tool Testing
March 19, 2020
• By
Robert M. Ditmore
,
Derrick Spooner
Windows Event Logging for Insider Threat Detection
May 23, 2019
• By
Derrick Spooner
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 3, 2018
•
White Paper
By
Derrick Spooner
,
George Silowash
,
Daniel L. Costa
,
Michael J. Albrethsen
Navigating the Insider Threat Tool Landscape
June 13, 2018
• By
Derrick Spooner
Privileged Account Management (Part 11 of 20: CERT Best Practices to Mitigate Insider Threats Series)
June 21, 2017
• By
Derrick Spooner
More from Derrick Spooner
Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program
July 3, 2018
•
White Paper
By
Derrick Spooner
,
George Silowash
,
Daniel L. Costa
,
Michael J. Albrethsen
Low Cost Technical Solutions to Jump Start an Insider Threat Program
December 12, 2016
•
Technical Note
By
George Silowash
,
Derrick Spooner
,
Daniel L. Costa
,
Michael J. Albrethsen
An Insider Threat Indicator Ontology
May 10, 2016
•
Technical Report
By
Daniel L. Costa
,
Michael J. Albrethsen
,
Matthew L. Collins
,
Samuel J. Perl
,
George Silowash
,
Derrick Spooner
Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)
May 20, 2013
•
Technical Note
By
Matthew L. Collins
,
Derrick Spooner
,
Dawn Cappelli
,
Andrew P. Moore
,
Randall F. Trzeciak
Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised
October 1, 2012
•
White Paper
By
Todd Lewellen
,
Andrew P. Moore
,
Dawn Cappelli
,
Randall F. Trzeciak
,
Derrick Spooner
,
Robert Weiland (Carnegie Mellon University)
More from Derrick Spooner
Functional Requirements for Insider Threat Tool Testing
March 19, 2020
• By
Robert M. Ditmore
,
Derrick Spooner
Windows Event Logging for Insider Threat Detection
May 23, 2019
• By
Derrick Spooner
Navigating the Insider Threat Tool Landscape
June 13, 2018
• By
Derrick Spooner
Privileged Account Management (Part 11 of 20: CERT Best Practices to Mitigate Insider Threats Series)
June 21, 2017
• By
Derrick Spooner
Password and Account Management (Part 10 of 20: CERT Best Practices to Mitigate Insider Threats Series)
June 14, 2017
• By
Derrick Spooner
More from Derrick Spooner
Send a Message