New Federal Requirements Affect Government Contractors
Randy describes the change and how CERT can help government contractors adapt to Change 2 of DoD 5220.22-M.
The CERT Guide to Insider Threats Named to Cybersecurity Canon
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes will be inducted into the Cybersecurity Canon in 2016.
The Insider Threat Vulnerability Assessor (ITVA) Certificate
The ITVA certificate program enables assessors to help organizations gain a better understanding of their insider threat risk and an enhanced ability to identify and manage associated risks.
Insider Threat Certificates and Training
Our Insider Threat training and certificate programs are available for program managers, vulnerability assessors, and program evaluators.
Insider Threat Program Manager Certificate
Registration is now open for the CERT Insider Threat Program Manager (ITPM) Certificate training and exam.
Common Sense Guide to Mitigating Insider Threats
The 4th edition provides the most current recommendations of the CERT Division, based on research and analysis of an expanded database of more than 700 insider threat cases.
The CERT Guide to Insider Threats
Our book, the CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, is available at book stores and online.
Custom Onsite Workshops
Learn how to develop an effective, comprehensive strategy that helps you to monitor for insider activity.
SEI Book Series in Software Engineering
Our SEI researchers write books covering software engineering topics for this series of books published by Addison-Wesley Professional.
Insider Threat Database
Our work is based on analyses of information in the CERT insider threat database, which documents more than 700 insider threat cases.
Engage with Us
Insider threats involve real people, so our research and solutions depend on engagements with the real world. Work with us to combat insider threats.
CERT Is Hiring
Your top-notch skills and knowledge can help us make a difference in our nation’s cybersecurity. Explore our career opportunities today.
Did you know that cyberattacks from employees and other insiders is a common problem that you should be planning for and preventing? Insiders pose a substantial threat to your organization because they have the knowledge and access to proprietary systems that allow them to bypass security measures through legitimate means. The nature of insider threats is different from other cybersecurity challenges; these threats require a different strategy for preventing and addressing them.
At the CERT Insider Threat Center at Carnegie Mellon’s Software Engineering Institute (SEI), we are devoted to combatting cybersecurity issues. Our research has uncovered information that can help you identify potential and realized insider threats in your organization, institute ways to prevent them, and establish processes to deal with them if they do happen.