Blog Posts
Functional Requirements for Insider Threat Tool Testing
Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation....
• By Robert M. Ditmore, Derrick Spooner
In Insider Threat


High-Level Technique for Insider Threat Program's Data Source Selection
This blog discusses an approach that the CERT Division's National Insider Threat Center developed to assist insider threat programs develop, validate, implement, and share potential insider threat risk indicators (PRIs)....
• By Robert M. Ditmore, CERT Insider Threat Center
In Insider Threat
Moving Personal Data at Work
Many organizations allow limited personal use of organizational equipment. To move personal data to or from the organization's devices and network, employees typically use email....
• By Robert M. Ditmore
In Insider Threat
Implementing Secure Backup and Recovery Processes (Part 18 of 20: CERT Best Practices to Mitigate Insider Threats Series)
Learn Practice 18 of the Common Sense Guide, the importance of establishing a secure backup and recovery process in your organization, in this SEI Blog series.