search menu icon-carat-right cmu-wordmark

Insider Threat Blog

Real-World Work Combating Insider Threats

Latest Posts

Establishing Baseline Behaviors (Part 14 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Establishing Baseline Behaviors (Part 14 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Carrie Gardner

The 14th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 14: Establish a baseline of normal behavior for both networks and employees. In this post, I discuss the importance of considering data volume, velocity, variety, and veracity when establishing a baseline of network or employee behavior....

Read More
Mobile Devices and Other Remote Access (Part 13 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Mobile Devices and Other Remote Access (Part 13 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Michael C. Hansell

The 13th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 13: Monitor and control remote access from all end points, including mobile devices. In this post, I discuss the importance of having policies and procedures in place that dictate how remote access from end points are monitored and controlled....

Read More
Data Management and Event Correlation (Part 12 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Data Management and Event Correlation (Part 12 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Michael J. Albrethsen

The twelfth practice described in the newly released Common Sense Guide to Mitigating Insider Threats is Practice 12: Deploy solutions for monitoring employee actions and correlating information from multiple data sources. In this post, I discuss this newer practice that involves collecting, managing, and analyzing data from multiple sources that offers insights into insider activity that can lead to cybersecurity incidents....

Read More
Privileged Account Management (Part 11 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Privileged Account Management (Part 11 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Derrick Spooner

The eleventh practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 11: Institute stringent access controls and monitoring policies on privileged users. In this post, I discuss the importance of privileged account management and its effect on the security of the organization....

Read More
Security Awareness and Training (Part 9 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Security Awareness and Training (Part 9 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Robin M. Ruefle

The ninth practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 9: Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees. In this post, I discuss the importance of educating employees, managers, and trusted business partners about the role they play in preventing, detecting, and mitigating insider threats, and practices they should follow for protecting organizational critical assets....

Read More
Stress Management and Mistake Minimization (Part 8 of 20: CERT Best Practices to Mitigate Insider Threats Series)

Stress Management and Mistake Minimization (Part 8 of 20: CERT Best Practices to Mitigate Insider Threats Series)

• Insider Threat Blog
Samuel J. Perl

The eighth practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 8: Structure management and tasks to minimize insider stress and mistakes. In this post, I discuss the importance of understanding the psychology of your organization's workforce and how it can help its employees balance work pressures while maintaining an atmosphere that supports productivity and minimizes stress and mistakes....

Read More