Software Engineering Institute


In the SEI, we help organizations use their data as well as their sources to obtain a clearer picture of possible threats within their workforce as well as in the availability chains and contractors they use. Our goal would be to advance the condition of insider threat research through the introduction of abilities for stopping, discovering, and answering evolving cyber and physical threats.

We concentrate on building repeatable, verified, and context-aware processes and preventative controls according to careful research and empirical evidence. We develop techniques that improve recognition through tools that rapidly identify patterns and anomalies that automate conjecture of risk and prevention controls which rapidly and precisely identify indicators of numerous insider attack types.

The SEI is leading this effort because of our unique mixture of expertise and experience. Since 2001, we’ve partnered with government agencies—such because the Dod, the Department of Homeland Security, Secret Service, and lots of federal agencies—as along with with private industry, academia, and also the vendor community. We’re also leaders in modeling and simulation, software engineering, cybersecurity, and knowledge science, so we participate in collaborative research relationships having a cadre of multidisciplinary experts within the social and behavior sciences. Consequently, we’re the only real source for any data-driven, risk-based, socio-technical method of insider threats.

There exists a database well over 3,000 insider occurrences that people use to characterize the character from the evolving insider threat problem, develop indicators of insider risk, and prototype and transition technical and administrative controls for insider threat minimization. Within our insider threat lab, we measure the potency of new tools, indicators, and analytic techniques. We’ve developed assessments to assist organizations identify their vulnerabilities to insider threats, and many courses on creating and operating an insider threat program.

Our solutions happen to be adopted as well as practices by numerous government and industry organizations, many government departments now utilize our condition-of-the-art threat recognition strategies. We help organizations safeguard themselves so we prove measures what works.

We will help you take advantage of our experience. Our assessments, evaluations, courses, workshops, and certificates assist you to find out about insider threats, how good your insider threat program is working, and the way to establish a highly effective insider threat program.

Software Engineering Institute building repeatable, verified


Software Engineering Institute | Carnegie Mellon University Live Stream