<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Mission Assurance</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Mission Assurance</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/mission-assurance/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 31 Oct 2022 00:00:00 -0400</lastBuildDate><item><title>How to Mitigate Insider Threats by Learning from Past Incidents</title><link>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to Mitigating Insider Threats, "Learn from Past Insider Threat Incidents."</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Mon, 31 Oct 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Cyber Risk and Resilience Management</category></item><item><title>Benford's Law: Potential Applications for Insider Threat Detection</title><link>https://www.sei.cmu.edu/blog/benfords-law-potential-applications-insider-threat-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn how a mathematical law may help detect insider activity without the effort of traditional anomaly detection in this informative SEI Blog post</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Kessel</dc:creator><pubDate>Thu, 17 Dec 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/benfords-law-potential-applications-insider-threat-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Insider Threat Incidents: Assets Targeted by Malicious Insiders</title><link>https://www.sei.cmu.edu/blog/insider-threat-incidents-assets-targeted-by-malicious-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post details CERT's new taxonomy for targeted assets in insider threat incidents and highlights their latest findings.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sarah Miller</dc:creator><pubDate>Tue, 29 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threat-incidents-assets-targeted-by-malicious-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Highlights from the 7th Annual National Insider Threat Center (NITC) Symposium, Day One</title><link>https://www.sei.cmu.edu/blog/highlights-from-the-7th-annual-national-insider-threat-center-nitc-symposium-day-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post recaps the first day of the National Insider Threat Symposium, covering proactive approaches to reducing insider incidents.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa, Sarah Miller</dc:creator><pubDate>Wed, 23 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/highlights-from-the-7th-annual-national-insider-threat-center-nitc-symposium-day-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Insider Threat Incidents: Communication Channels</title><link>https://www.sei.cmu.edu/blog/insider-threat-incidents-communication-channels/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn how to identify risk behaviors and detect insider threats with communication channel monitoring in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sarah Miller, Alex Pickering</dc:creator><pubDate>Thu, 17 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threat-incidents-communication-channels/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Insider Threat Incidents: Most Commonly Affected Devices</title><link>https://www.sei.cmu.edu/blog/insider-threat-incidents-most-commonly-affected-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the most common devices affected by insider threat incidents and their impact on insider risk management and incident response in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sarah Miller, Alex Pickering</dc:creator><pubDate>Thu, 10 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threat-incidents-most-commonly-affected-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Organizational Resilience to Insider Threats</title><link>https://www.sei.cmu.edu/blog/organizational-resilience-to-insider-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the activities of the CERT National Insider Threat Center and offers strategies for operational resilience.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Thu, 03 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/organizational-resilience-to-insider-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Functional Requirements for Insider Threat Tool Testing</title><link>https://www.sei.cmu.edu/blog/functional-requirements-for-insider-threat-tool-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bob Ditmore, Derrick Spooner</dc:creator><pubDate>Thu, 19 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/functional-requirements-for-insider-threat-tool-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Mission Assurance</category></item><item><title>Maturing Your Insider Threat Program into an Insider Risk Management Program</title><link>https://www.sei.cmu.edu/blog/maturing-your-insider-threat-program-into-an-insider-risk-management-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Having trouble clearly stating the scope of your insider threat program? Struggling with measuring the program's effectiveness? Failing to provide actionable intelligence to the program stakeholders?...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Mon, 27 Jan 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/maturing-your-insider-threat-program-into-an-insider-risk-management-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Technology Trends in Data Exfiltration</title><link>https://www.sei.cmu.edu/blog/technology-trends-in-data-exfiltration/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>One of our goals at the CERT National Insider Threat Center (NITC) is to monitor the shifting landscape of insider threat to identify tools and techniques....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alex Pickering</dc:creator><pubDate>Thu, 09 Jan 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/technology-trends-in-data-exfiltration/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Measuring Resilience in Artificial Intelligence and Machine Learning Systems</title><link>https://www.sei.cmu.edu/blog/measuring-resilience-in-artificial-intelligence-and-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Artificial intelligence (AI) and machine learning (ML) systems are quickly becoming integrated into a wide array of business and military operational environments....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Petrilli, Shing-hon Lau</dc:creator><pubDate>Thu, 12 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/measuring-resilience-in-artificial-intelligence-and-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Mission Assurance</category><category>Insider Threat</category><category>Artificial Intelligence</category></item><item><title>Mapping Cyber Hygiene to the NIST Cybersecurity Framework</title><link>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Trevors</dc:creator><pubDate>Wed, 30 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Best Practices</category><category>Best Practices in Network Security</category></item><item><title>Insider Threat Incident Analysis: Court Outcome Observations</title><link>https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-court-outcome-observations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the United States, legal cases may be tried in criminal court or civil court. According to data in the CERT National Insider Threat Center (NITC) incident corpus, the type of court makes a big difference....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nick Miller</dc:creator><pubDate>Wed, 02 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-court-outcome-observations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>September Is National Insider Threat Awareness Month</title><link>https://www.sei.cmu.edu/blog/september-is-national-insider-threat-awareness-month/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>September 2019 has been declared National Insider Threat Awareness Month by the National Insider Threat Task Force, the National Counterintelligence and Security Center....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/september-is-national-insider-threat-awareness-month/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Mission Assurance</category></item><item><title>Patterns and Trends in Insider Threats Across Industry Sectors (Part 9 of 9: Insider Threats Across Industry Sectors)</title><link>https://www.sei.cmu.edu/blog/patterns-and-trends-in-insider-threats-across-industry-sectors-part-9-of-9-insider-threats-across-industry-sectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In previous posts of our series analyzing and summarizing insider incidents across multiple sectors, we presented up-to-date statistics from the CERT National Insider Threat Center (NITC)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Thu, 22 Aug 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/patterns-and-trends-in-insider-threats-across-industry-sectors-part-9-of-9-insider-threats-across-industry-sectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Mission Thread Analysis Using End-to-End Data Flows - Part 2</title><link>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The first blog post in this series provided an overview of the E2E Mission Thread Data Flow Analysis (EMDA) method, an approach that analyzes the flow of data as they traverse end-to-end mission threads through the architecture components....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Firesmith</dc:creator><pubDate>Mon, 19 Aug 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category></item><item><title>Mission Thread Analysis Using End-to-End Data Flows  - Part 1</title><link>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Although the vast majority of military missions require the successful collaboration of multiple cyber-physical systems within an overall system of systems (SoS), almost all system and software architects work on programs developing....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Firesmith</dc:creator><pubDate>Mon, 05 Aug 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category></item><item><title>Cybersecurity Governance, Part 1: 5 Fundamental Challenges</title><link>https://www.sei.cmu.edu/blog/cybersecurity-governance-part-1-5-fundamental-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Seth Swinton, Stephanie Hedges</dc:creator><pubDate>Thu, 25 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cybersecurity-governance-part-1-5-fundamental-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Keeping an Eye Out for Positive Risk</title><link>https://www.sei.cmu.edu/blog/keeping-an-eye-out-for-positive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We commonly think about risks having negative consequences. With each month bringing new cybersecurity threats, breaches, and vulnerabilities, sound risk management practices are necessary....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mary Beth Chrissis</dc:creator><pubDate>Mon, 01 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/keeping-an-eye-out-for-positive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category></item></channel></rss>