<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Insider Threat</title><link href="http://sei.cmu.edu/feeds/topic/insider-threat/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/insider-threat/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/insider-threat/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2025-02-03T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Insider Threat</subtitle><entry><title>Introducing the Insider Incident Data Exchange Standard (IIDES)</title><link href="https://www.sei.cmu.edu/blog/introducing-the-insider-incident-data-exchange-standard-iides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-02-03T00:00:00-05:00</published><updated>2025-02-03T00:00:00-05:00</updated><author><name>Austin Whisnant</name></author><id>https://www.sei.cmu.edu/blog/introducing-the-insider-incident-data-exchange-standard-iides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Capturing and sharing information about insider incidents is a challenge. This post introduces the Insider Incident Data Exchange Standard (IIDES) schema for insider incident data collection.</summary><category term="Insider Threat"/><category term="Cyber Risk and Resilience Management"/></entry><entry><title>A Roadmap for Incorporating Positive Deterrence in Insider Risk Management</title><link href="https://www.sei.cmu.edu/blog/a-roadmap-for-incorporating-positive-deterrence-in-insider-risk-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-09-23T00:00:00-04:00</published><updated>2024-09-23T00:00:00-04:00</updated><author><name>Andrew Moore</name></author><id>https://www.sei.cmu.edu/blog/a-roadmap-for-incorporating-positive-deterrence-in-insider-risk-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Positive deterrence reduces insider risk through workforce practices that promote the mutual interests of employees and their organization.</summary></entry><entry><title>10 Lessons in Security Operations and Incident Management</title><link href="https://www.sei.cmu.edu/blog/10-lessons-in-security-operations-and-incident-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-03-04T00:00:00-05:00</published><updated>2024-03-04T00:00:00-05:00</updated><author><name>Robin Ruefle</name></author><id>https://www.sei.cmu.edu/blog/10-lessons-in-security-operations-and-incident-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post outlines 10 lessons learned from more than three decades of building incident response and security teams throughout the globe.</summary></entry><entry><title>CERT Releases 2 Tools to Assess Insider Risk</title><link href="https://www.sei.cmu.edu/blog/cert-releases-2-tools-to-assess-insider-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-02-26T00:00:00-05:00</published><updated>2024-02-26T00:00:00-05:00</updated><author><name>Roger Black</name></author><id>https://www.sei.cmu.edu/blog/cert-releases-2-tools-to-assess-insider-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The average insider risk incident costs organizations more than $600,000. To help organizations assess their insider risk programs, the SEI CERT Division has released two tools available for download.</summary></entry><entry><title>The 13 Key Elements of an Insider Threat Program</title><link href="https://www.sei.cmu.edu/blog/the-13-key-elements-of-an-insider-threat-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-10-23T00:00:00-04:00</published><updated>2023-10-23T00:00:00-04:00</updated><author><name>Dan Costa, Randall Trzeciak</name></author><id>https://www.sei.cmu.edu/blog/the-13-key-elements-of-an-insider-threat-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">COVID-19 changed the nature of the workplace. In this evolving climate, organizations need to be increasingly vigilant against insider incidents. In this post, we present the 13 key elements of an insider threat program.</summary></entry><entry><title>How to Mitigate Insider Threats by Learning from Past Incidents</title><link href="https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-10-31T00:00:00-04:00</published><updated>2022-10-31T00:00:00-04:00</updated><author><name>Dan Costa</name></author><id>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to Mitigating Insider Threats, "Learn from Past Insider Threat Incidents."</summary><category term="Mission Assurance"/><category term="Cyber Risk and Resilience Management"/></entry><entry><title>Potential Implications of the California Consumer Privacy Act (CCPA) for Insider Risk Programs</title><link href="https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-05-31T00:00:00-04:00</published><updated>2021-05-31T00:00:00-04:00</updated><author><name>Emily Kessel, Sarah Miller, Carrie Gardner</name></author><id>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post reviews the general framework of the California Consumer Privacy Act (CCPA), describes specific implications for insider risk management, and provides recommendations to prepare insider risk programs to mitigate concerns before the CCPA takes effect.</summary><category term="Risk"/><category term="Enterprise Risk and Resilience Management"/><category term="Insider Threat"/><category term="Best Practices"/></entry><entry><title>Benford's Law: Potential Applications for Insider Threat Detection</title><link href="https://www.sei.cmu.edu/blog/benfords-law-potential-applications-insider-threat-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-12-17T00:00:00-05:00</published><updated>2020-12-17T00:00:00-05:00</updated><author><name>Emily Kessel</name></author><id>https://www.sei.cmu.edu/blog/benfords-law-potential-applications-insider-threat-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn how a mathematical law may help detect insider activity without the effort of traditional anomaly detection in this informative SEI Blog post</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Insider Threat Incidents: Assets Targeted by Malicious Insiders</title><link href="https://www.sei.cmu.edu/blog/insider-threat-incidents-assets-targeted-by-malicious-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-29T00:00:00-04:00</published><updated>2020-09-29T00:00:00-04:00</updated><author><name>Sarah Miller</name></author><id>https://www.sei.cmu.edu/blog/insider-threat-incidents-assets-targeted-by-malicious-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post details CERT's new taxonomy for targeted assets in insider threat incidents and highlights their latest findings.</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Highlights from the 7th Annual National Insider Threat Center (NITC) Symposium, Day One</title><link href="https://www.sei.cmu.edu/blog/highlights-from-the-7th-annual-national-insider-threat-center-nitc-symposium-day-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-23T00:00:00-04:00</published><updated>2020-09-23T00:00:00-04:00</updated><author><name>Dan Costa, Sarah Miller</name></author><id>https://www.sei.cmu.edu/blog/highlights-from-the-7th-annual-national-insider-threat-center-nitc-symposium-day-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post recaps the first day of the National Insider Threat Symposium, covering proactive approaches to reducing insider incidents.</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Insider Threat Incidents: Communication Channels</title><link href="https://www.sei.cmu.edu/blog/insider-threat-incidents-communication-channels/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-17T00:00:00-04:00</published><updated>2020-09-17T00:00:00-04:00</updated><author><name>Sarah Miller, Alex Pickering</name></author><id>https://www.sei.cmu.edu/blog/insider-threat-incidents-communication-channels/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn how to identify risk behaviors and detect insider threats with communication channel monitoring in this informative SEI Blog post.</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Insider Threat Incidents: Most Commonly Affected Devices</title><link href="https://www.sei.cmu.edu/blog/insider-threat-incidents-most-commonly-affected-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-10T00:00:00-04:00</published><updated>2020-09-10T00:00:00-04:00</updated><author><name>Sarah Miller, Alex Pickering</name></author><id>https://www.sei.cmu.edu/blog/insider-threat-incidents-most-commonly-affected-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn about the most common devices affected by insider threat incidents and their impact on insider risk management and incident response in this SEI Blog post.</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Organizational Resilience to Insider Threats</title><link href="https://www.sei.cmu.edu/blog/organizational-resilience-to-insider-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-03T00:00:00-04:00</published><updated>2020-09-03T00:00:00-04:00</updated><author><name>Dan Costa</name></author><id>https://www.sei.cmu.edu/blog/organizational-resilience-to-insider-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post explores the activities of the CERT National Insider Threat Center and offers strategies for operational resilience.</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Functional Requirements for Insider Threat Tool Testing</title><link href="https://www.sei.cmu.edu/blog/functional-requirements-for-insider-threat-tool-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-19T00:00:00-04:00</published><updated>2020-03-19T00:00:00-04:00</updated><author><name>Bob Ditmore, Derrick Spooner</name></author><id>https://www.sei.cmu.edu/blog/functional-requirements-for-insider-threat-tool-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation....</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Maturing Your Insider Threat Program into an Insider Risk Management Program</title><link href="https://www.sei.cmu.edu/blog/maturing-your-insider-threat-program-into-an-insider-risk-management-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-01-27T00:00:00-05:00</published><updated>2020-01-27T00:00:00-05:00</updated><author><name>Dan Costa</name></author><id>https://www.sei.cmu.edu/blog/maturing-your-insider-threat-program-into-an-insider-risk-management-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Having trouble clearly stating the scope of your insider threat program? Struggling with measuring the program's effectiveness? Failing to provide actionable intelligence to the program stakeholders?...</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Anti-Phishing Training: Is It Working? Is It Worth It?</title><link href="https://www.sei.cmu.edu/blog/anti-phishing-training-is-it-working-is-it-worth-it/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-01-23T00:00:00-05:00</published><updated>2020-01-23T00:00:00-05:00</updated><author><name>Mike Petock</name></author><id>https://www.sei.cmu.edu/blog/anti-phishing-training-is-it-working-is-it-worth-it/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Phishing attacks target human, rather than technical, vulnerabilities. Some organizations, companies, government agencies, educational institutions, and individuals put on blinders....</summary><category term="Insider Threat"/><category term="Best Practices in Network Security"/></entry><entry><title>Technology Trends in Data Exfiltration</title><link href="https://www.sei.cmu.edu/blog/technology-trends-in-data-exfiltration/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-01-09T00:00:00-05:00</published><updated>2020-01-09T00:00:00-05:00</updated><author><name>Alex Pickering</name></author><id>https://www.sei.cmu.edu/blog/technology-trends-in-data-exfiltration/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">One of our goals at the CERT National Insider Threat Center (NITC) is to monitor the shifting landscape of insider threat to identify tools and techniques....</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Mapping Cyber Hygiene to the NIST Cybersecurity Framework</title><link href="https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-30T00:00:00-04:00</published><updated>2019-10-30T00:00:00-04:00</updated><author><name>Matthew Trevors</name></author><id>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives....</summary><category term="Mission Assurance"/><category term="Best Practices"/><category term="Best Practices in Network Security"/></entry><entry><title>Insider Threat Incident Analysis: Court Outcome Observations</title><link href="https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-court-outcome-observations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-02T00:00:00-04:00</published><updated>2019-10-02T00:00:00-04:00</updated><author><name>Nick Miller</name></author><id>https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-court-outcome-observations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In the United States, legal cases may be tried in criminal court or civil court. According to data in the CERT National Insider Threat Center (NITC) incident corpus, the type of court makes a big difference....</summary><category term="Mission Assurance"/><category term="Insider Threat"/></entry><entry><title>Improving Insider Threat Detection Methods Through Software Engineering Principles</title><link href="https://www.sei.cmu.edu/blog/improving-insider-threat-detection-methods-through-software-engineering-principles/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-09-20T00:00:00-04:00</published><updated>2019-09-20T00:00:00-04:00</updated><author><name>Dan Costa</name></author><id>https://www.sei.cmu.edu/blog/improving-insider-threat-detection-methods-through-software-engineering-principles/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Tuning detective controls is a key component of implementing and operating an insider threat program, and one we have seen many organizations struggle with....</summary><category term="Insider Threat"/><category term="System Verification and Validation"/></entry></feed>