Cyber Risk and Resilience Management
Blog Posts
Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster
Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.
• By Daniel J. Kambic
In Enterprise Risk and Resilience Management
![Headshot of Dan Kambic.](/media/images/thumb_big_d-kambic_blog_authors.max-180x180.format-webp.webp)
The Benefits of Cyber Assessment Training
This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.
• By Rhonda Brown, Alexander Petrilli
In Cybersecurity Engineering
![Rhonda Brown](/media/images/thumb_big_r-brown_blog_authors_.max-180x180.format-webp.webp)
![Alexander Petrilli](/media/images/thumb_big_a-petrilli_blog_autho.max-180x180.format-webp.webp)
2 Approaches to Risk and Resilience: Asset-Based and Service-Based
There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.
• By Emily Shawgo
In Enterprise Risk and Resilience Management
![Emily Shawgo](/media/images/thumb_big_e-shawgo_blog_authors.max-180x180.format-webp.webp)
How to Mitigate Insider Threats by Learning from Past Incidents
This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to Mitigating Insider Threats, "Learn from Past Insider Threat Incidents."
• By Daniel L. Costa
In Insider Threat
![Daniel Costa](/media/images/thumb_big_d-costa_blog_authors_.max-180x180.format-webp.webp)
Translating the Risk Management Framework for Nonfederal Organizations
This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.
• By Emily Shawgo, Brian Benestelli
In Enterprise Risk and Resilience Management
![Emily Shawgo](/media/images/thumb_big_e-shawgo_blog_authors.max-180x180.format-webp.webp)
![Brian Benestelli](/media/images/thumb_big_b-benestelli_blog_aut.max-180x180.format-webp.webp)
Anti-Tamper for Software Components
This post explains how to identify software components within systems that are in danger of being exploited and that should be protected by anti-tamper practices.
• By Scott Hissam
In Secure Development
![Headshot of Scott Hissam](/media/images/thumb_big_s-hissam_blog_authors.max-180x180.format-webp.webp)
Balancing Cyber Confidence and Privacy Concerns
Learn about the privacy protocols that make it hard to protect enterprise networks, and their impact on network traffic monitoring in this SEI Blog post.
• By Bill Reed, Dustin D. Updyke
In Enterprise Risk and Resilience Management
![William Reed](/media/images/thumb_big_w-reed_blog_authors_5.max-180x180.format-webp.webp)
![Dustin Updyke](/media/images/thumb_big_d-updyke_blog_authors.max-180x180.format-webp.webp)
After the Cyber Resilience Review: A Targeted Improvement Plan for Service Continuity
In 2011, the SEI's CERT Division developed and published the Cyber Resilience Review (CRR) on behalf of the Department of Homeland Security....
• By Robert A. Vrtis, Jeffrey Pinckard
In Enterprise Risk and Resilience Management
![Headshot of Robert Vrtis](/media/images/thumb_big_r-vrtis_blog_authors_.max-180x180.format-webp.webp)
![Jeffrey Pinckard](/media/images/thumb_big_j-pinckard_blog_autho.max-180x180.format-webp.webp)
How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications
The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....
• By David Svoboda
In Secure Development
![David Svoboda](/media/images/thumb_big_d-svoboda_blog_author.max-180x180.format-webp.webp)
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
![Nataliya Shevchenko](/media/images/thumb_big_n-shevchenko_blog_aut.max-180x180.format-webp.webp)