search menu icon-carat-right cmu-wordmark

Insider Threat Blog

Real-World Work Combating Insider Threats

Latest Posts

2017 U.S. State of Cybercrime Highlights

2017 U.S. State of Cybercrime Highlights

• Insider Threat Blog
Sarah Miller

Each year, the CERT Division of the SEI collaborates with CSO Magazine to develop a U.S. State of Cybercrime report1. These reports are based on surveys of more than 500 organizations across the country, ranging in size from fewer than 500 employees to more than 10,000. Each organization self-reports on information security issues that have impacted them in the past calendar year. The 2017 report covers activity that occurred in 2016. In this blog post,...

Read More
Announcing Insider Threat Program Evaluator Training from the CERT National Insider Threat Center

Announcing Insider Threat Program Evaluator Training from the CERT National Insider Threat Center

• Insider Threat Blog
Robin M. Ruefle

The National Insider Threat Center (NITC) at the CERT Division of the SEI is developing an Insider Threat Program Evaluator (ITPE) Training course based on the methods and techniques the NITC currently uses to conduct Insider Threat Program Evaluations. This three-day, instructor-led, classroom-based, certificate training program presents strategies for measuring and evaluating an operational insider threat program within an organization. The first course will be offered in March 2018....

Read More
Governing the Internet of Things (IoT)

Governing the Internet of Things (IoT)

• Insider Threat Blog
Katie C. Stewart

The Internet of Things (IoT) is proliferating exponentially, exposing organizations to an increased risk of IoT-targeted attacks, such as botnets and DDoS attacks. In this blog post, I explore the challenges of dealing with the IoT and some approaches that organizations can use to reduce their risk as they adopt more IoT technologies....

Read More
Mapping the Cyber Resilience Review to the Financial Sector's Cybersecurity Assessment Tool

Mapping the Cyber Resilience Review to the Financial Sector's Cybersecurity Assessment Tool

• Insider Threat Blog
Jeffrey Pinckard

This post is also authored by Michael Rattigan and Robert A. Vrtis. In 2013 the White House directed the nation's critical infrastructure sectors to improve their cybersecurity. The financial sector responded by publishing the Federal Financial Institutions Examination Council's (FFIEC) Cybersecurity Assessment Tool (CAT)--an extensive, thorough method for determining an institution's cyber posture and reporting compliance to regulators, keyed to the National Institute of Science and Technology (NIST) Cybersecurity Framework (CSF). A lightweight, voluntary, no-cost...

Read More
Announcing Insider Threat Analyst Training from the CERT National Insider Threat Center

Announcing Insider Threat Analyst Training from the CERT National Insider Threat Center

• Insider Threat Blog
Daniel Costa

The CERT National Insider Threat Center (NITC) has recently developed an Insider Threat Analyst Training course. This three-day, instructor-led, classroom-based course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. Students learn various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. The course includes instructor lectures and group discussions, as well as hands-on exercises with...

Read More
Announcing the National Insider Threat Center

Announcing the National Insider Threat Center

• Insider Threat Blog
Randy Trzeciak

The CERT® Division of the Software Engineering Institute (SEI) at Carnegie Mellon University is proud to announce the creation of the CERT National Insider Threat Center (NITC). The establishment of this center builds on our 16 years of work in the insider threat domain. The NITC allows the SEI to enhance its insider threat work across the Department of Defense, U.S. government, industry, and academia. The Center's expanded capabilities give security practitioners access to insider...

Read More
Cyber Hygiene: 11 Essential Practices

Cyber Hygiene: 11 Essential Practices

• Insider Threat Blog
Matthew Trevors

This post is also authored by Charles M. Wallen. Tightening an organization's cybersecurity can be very complex, and just purchasing a piece of new hardware or software isn't enough. Instead, you might begin by looking at the most common baseline cyber practices that other organizations use in their cybersecurity programs--their cyber hygiene. This post will introduce fundamental cyber hygiene practices for organizations and help you understand the cyber-risk problem space....

Read More
The 3 Pillars of Enterprise Cyber Risk Management

The 3 Pillars of Enterprise Cyber Risk Management

• Insider Threat Blog
Brett Tucker

Equifax. Target. The Office of Personnel Management. Each new cyber hack victim has a story that makes the need for cyber risk management more urgent. Any organization hoping to maintain operational resilience during disruption should implement risk management. Unfortunately, that comes with many unknowns: Which risk management framework to use? Is risk management expensive? What's the return on investment? This post will help you guide your organization out of this decision paralysis by introducing the...

Read More