<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Critical Infrastructure Protection</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Critical Infrastructure Protection</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/critical-infrastructure-protection/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 May 2023 00:00:00 -0400</lastBuildDate><item><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Best Practices in Network Security</category><category>Critical Infrastructure Protection</category></item><item><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo</dc:creator><pubDate>Mon, 06 Feb 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Critical Infrastructure Protection</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>A New Approach to Cyber Incident Response</title><link>https://www.sei.cmu.edu/blog/a-new-approach-to-cyber-incident-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>According to a report issued by the Government Accountability Office (GAO) in February 2013, the number of cybersecurity incidents reported that could impact "federal and military operations; critical infrastructure; and the confidentiality, integrity, and availability of sensitive government, private sector, and personal information" has increased by 782 percent--from 5,503 in 2006 to 48,562 in 2012. In that report, GAO also stated that while there has been incremental progress in coordinating the federal response to cyber incidents, "challenges remain in sharing information among federal agencies and key private sector entities, including critical infrastructure owners....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anne Connell</dc:creator><pubDate>Sun, 23 Feb 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/a-new-approach-to-cyber-incident-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Critical Infrastructure Protection</category></item></channel></rss>