<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber Risk and Resilience Management</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Risk and Resilience Management</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/cyber-risk-and-resilience-management/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 03 Feb 2025 00:00:00 -0500</lastBuildDate><item><title>Introducing the Insider Incident Data Exchange Standard (IIDES)</title><link>https://www.sei.cmu.edu/blog/introducing-the-insider-incident-data-exchange-standard-iides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Capturing and sharing information about insider incidents is a challenge. This post introduces the Insider Incident Data Exchange Standard (IIDES) schema for insider incident data collection.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Austin Whisnant</dc:creator><pubDate>Mon, 03 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/introducing-the-insider-incident-data-exchange-standard-iides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cyber Risk and Resilience Management</category></item><item><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Best Practices in Network Security</category><category>Critical Infrastructure Protection</category></item><item><title>The Benefits of Cyber Assessment Training</title><link>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rhonda Brown, Alexander Petrilli</dc:creator><pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Engineering</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo</dc:creator><pubDate>Mon, 06 Feb 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Critical Infrastructure Protection</category></item><item><title>How to Mitigate Insider Threats by Learning from Past Incidents</title><link>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to Mitigating Insider Threats, "Learn from Past Insider Threat Incidents."</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Mon, 31 Oct 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Cyber Risk and Resilience Management</category></item><item><title>Translating the Risk Management Framework for Nonfederal Organizations</title><link>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo, Brian Benestelli</dc:creator><pubDate>Mon, 23 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category></item><item><title>Anti-Tamper for Software Components</title><link>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explains how to identify software components within systems that are in danger of being exploited and that should be protected by anti-tamper practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Scott Hissam</dc:creator><pubDate>Mon, 21 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System Resilience</category><category>Cyber Risk and Resilience Management</category><category>Supply Chains</category></item><item><title>Balancing Cyber Confidence and Privacy Concerns</title><link>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the privacy protocols that make it hard to protect enterprise networks, and their impact on network traffic monitoring in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Reed, Dustin Updyke</dc:creator><pubDate>Mon, 21 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Enterprise Risk and Resilience Management</category><category>Cyber Risk and Resilience Management</category></item><item><title>After the Cyber Resilience Review: A Targeted Improvement Plan for Service Continuity</title><link>https://www.sei.cmu.edu/blog/after-the-cyber-resilience-review-a-targeted-improvement-plan-for-service-continuity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In 2011, the SEI's CERT Division developed and published the Cyber Resilience Review (CRR) on behalf of the Department of Homeland Security....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Vrtis, Jeffrey Pinckard</dc:creator><pubDate>Mon, 03 Jun 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/after-the-cyber-resilience-review-a-targeted-improvement-plan-for-service-continuity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Operational Resilience</category><category>Cyber Risk and Resilience Management</category></item><item><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 01 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Cyber Risk and Resilience Management</category><category>Static Analysis</category><category>Cybersecurity</category><category>Secure Development</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Cybersecurity Engineering, Performance, Risk, and Secure Coding: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/cybersecurity-engineering-performance-risk-and-secure-coding-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights the latest work from the SEI, focusing on cybersecurity engineering, performance risk, and secure coding practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 28 Nov 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cybersecurity-engineering-performance-risk-and-secure-coding-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category></item><item><title>Adding Red to Blue: 10 Tactics Defenders Can Learn from Penetration Testers</title><link>https://www.sei.cmu.edu/blog/adding-red-to-blue-10-tactics-defenders-can-learn-from-penetration-testers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post, in collaboration with The Veris Group, highlights 10 low-disruption, freely available penetration testing tactics that benefit network defenders.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Kennedy</dc:creator><pubDate>Mon, 14 Dec 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/adding-red-to-blue-10-tactics-defenders-can-learn-from-penetration-testers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category></item></channel></rss>