<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Risk</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Risk</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/risk/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 06 Feb 2023 00:00:00 -0500</lastBuildDate><item><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo</dc:creator><pubDate>Mon, 06 Feb 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Critical Infrastructure Protection</category></item><item><title>IT, OT, and ZT: Implementing Zero Trust in Industrial Control Systems</title><link>https://www.sei.cmu.edu/blog/it-ot-and-zt-implementing-zero-trust-in-industrial-control-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post introduces fundamental ZT and ICS concepts, barriers to implementing ZT principles in ICS environments, and potential methods to leverage ZT concepts in this domain.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Benestelli, Daniel Kambic</dc:creator><pubDate>Mon, 18 Jul 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/it-ot-and-zt-implementing-zero-trust-in-industrial-control-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category></item><item><title>Translating the Risk Management Framework for Nonfederal Organizations</title><link>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo, Brian Benestelli</dc:creator><pubDate>Mon, 23 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category></item><item><title>Potential Implications of the California Consumer Privacy Act (CCPA) for Insider Risk Programs</title><link>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post reviews the general framework of the California Consumer Privacy Act (CCPA), describes specific implications for insider risk management, and provides recommendations to prepare insider risk programs to mitigate concerns before the CCPA takes effect.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Kessel, Sarah Miller, Carrie Gardner</dc:creator><pubDate>Mon, 31 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category><category>Insider Threat</category><category>Best Practices</category></item><item><title>Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment</title><link>https://www.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI blog post provides an overview of zero trust and management of its risk with SEI's cybersecurity engineering assessment framework.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Geoff Sanders</dc:creator><pubDate>Mon, 08 Mar 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Cybersecurity Engineering</category></item><item><title>10 Steps for Managing Risk: OCTAVE FORTE</title><link>https://www.sei.cmu.edu/blog/10-steps-managing-risk-octave-forte/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post, adapted from a recently published technical note, outlines OCTAVE FORTE's 10-step framework to guide nascent organizations as they build an ERM program and mature organizations as they fortify existing ERM programs, making them more reliable, measurable, consistent, and repeatable.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brett Tucker</dc:creator><pubDate>Mon, 07 Dec 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/10-steps-managing-risk-octave-forte/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Malware Analysis, Acquisition Strategies, Network Situational Awareness, &amp; Cyber Risk - The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/malware-analysis-acquisition-strategies-network-situational-awareness-cyber-risk-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post presents the SEI's latest research on malware analysis, acquisition strategies, network situational awareness, and cyber risk management.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 01 Dec 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/malware-analysis-acquisition-strategies-network-situational-awareness-cyber-risk-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Resilience Management Model (RMM)</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Emerging Technologies</category></item><item><title>A Taxonomy for Managing Operational Cybersecurity Risk</title><link>https://www.sei.cmu.edu/blog/a-taxonomy-for-managing-operational-cybersecurity-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses large-scale cyberattacks on payment card systems and a recent effort to create a taxonomy for operational cybersecurity risks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Cebula</dc:creator><pubDate>Mon, 04 Aug 2014 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-taxonomy-for-managing-operational-cybersecurity-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category><category>OCTAVE</category></item><item><title>Understanding How Network Security Professionals Perceive Risk</title><link>https://www.sei.cmu.edu/blog/understanding-how-network-security-professionals-perceive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore the perception of risk among network security professionals and factors that influence SEI's research on risk formulation in this SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Cebula</dc:creator><pubDate>Mon, 24 Jun 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/understanding-how-network-security-professionals-perceive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category></item></channel></rss>