Blog Posts
Functional Requirements for Insider Threat Tool Testing
Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation....
• By Robert M. Ditmore, Derrick Spooner
In Insider Threat
High-Level Technique for Insider Threat Program's Data Source Selection
This blog discusses an approach that the CERT Division's National Insider Threat Center developed to assist insider threat programs develop, validate, implement, and share potential insider threat risk indicators (PRIs)....
• By Robert M. Ditmore, CERT Insider Threat Center
In Insider Threat
Moving Personal Data at Work
Many organizations allow limited personal use of organizational equipment. To move personal data to or from the organization's devices and network, employees typically use email....
• By Robert M. Ditmore
In Insider Threat
Implementing Secure Backup and Recovery Processes (Part 18 of 20: CERT Best Practices to Mitigate Insider Threats Series)
The 18th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 18: Implement secure backup and recovery processes. In this post, …