Insider Threat Resources
SERC’s Insider Threat Resources provide guidance, best practices, and training to help organizations prevent, detect, and mitigate insider risks. Explore toolkits, policies, and awareness programs to strengthen defenses against both malicious and unintentional insider threats that can impact the bulk electric system.
Learn More About Us
Page Link
Page Link
Page Link
Page Link
Page Link
Page Link
Page Link
Understanding Malicious and Unintentional Insider Threats
An Unintentional Insider is one that did not have malicious intent but may still increase risk or cause harm.
A Malicious Insider is a current or former employee, contractor, or business partner who:
- Has or had authorized access to an organization’s network, system or data
- Through their actions intentionally exceed or misuse that access in a manner that had malicious intent to harm the organization
Did You Know?
September is Insider Threat Awareness Month
October is Cyber Security Awareness Month
Resources
Insider Threat Concepts
CERT website
(Software Engineering Institute (SEI) of Carnegie Mellon and CERT is part of SEI.)
CERT Common Sense Guide to Mitigating Insider Threats
21 Best Practices
Building an Insider Threat Program
Executive Order 13587
Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information requires government agencies that handle classified information to stand up an Insider Threat Program (InTP) and designate a senior official to be the agency’s InTP Manager.
Insider Threat National Policy and Minimum Standards
From the National Insider Threat Task Force (NITTF)
Understanding the Insider Threat
CISA DHS Video
Insider Threat Detection, Control, Mitigation
Tools/Training
White paper on how to use Splunk Software
As part of the government insider threat detection program (registration required)
Insider Threat Training Training
Center for Defense Security Excellence (CDSE)
(CISA) Insider Threat Resources
Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Insider Threat
Software Engineering Institute – Carnegie Mellon
Challenges Facing Insider Threat Programs and Hub Analysts
Sign Up For Our Newsletter
Zoombombning operakrati perosmos retronym postvalens antropofili ontotion ifall vobba primagraf endotris, operaosmos i antition