search menu icon-carat-right cmu-wordmark

The Key to Successful Monitoring for Detection of Insider Attacks

In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.

Software Engineering Institute


This presentation on successful monitoring for detection of insider attacks was delivered by Dawn Cappelli, Randall Trzeciak, and Robert Floodeen of the Software Engineering Institute's CERT Program at the RSA Conference 2010.