<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Enterprise Risk and Resilience Management</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Enterprise Risk and Resilience Management</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/enterprise-risk-and-resilience-management/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 May 2023 00:00:00 -0400</lastBuildDate><item><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Best Practices in Network Security</category><category>Critical Infrastructure Protection</category></item><item><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo</dc:creator><pubDate>Mon, 06 Feb 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Critical Infrastructure Protection</category></item><item><title>System End-of-Life Planning: Designing Systems for Maximum Resiliency Over Time</title><link>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Deployment plans for computing environments must account for hardware replacements and decommissions even though such activities may not occur until years later.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grant Deffenbaugh, Lyndsi Hughes</dc:creator><pubDate>Mon, 27 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Enterprise Risk and Resilience Management</category><category>Best Practices</category><category>Systems Engineering</category></item><item><title>Translating the Risk Management Framework for Nonfederal Organizations</title><link>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo, Brian Benestelli</dc:creator><pubDate>Mon, 23 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category></item><item><title>Potential Implications of the California Consumer Privacy Act (CCPA) for Insider Risk Programs</title><link>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post reviews the general framework of the California Consumer Privacy Act (CCPA), describes specific implications for insider risk management, and provides recommendations to prepare insider risk programs to mitigate concerns before the CCPA takes effect.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Kessel, Sarah Miller, Carrie Gardner</dc:creator><pubDate>Mon, 31 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category><category>Insider Threat</category><category>Best Practices</category></item><item><title>Balancing Cyber Confidence and Privacy Concerns</title><link>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the privacy protocols that make it hard to protect enterprise networks, and their impact on network traffic monitoring in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Reed, Dustin Updyke</dc:creator><pubDate>Mon, 21 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Enterprise Risk and Resilience Management</category><category>Cyber Risk and Resilience Management</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Malware Analysis, Acquisition Strategies, Network Situational Awareness, &amp; Cyber Risk - The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/malware-analysis-acquisition-strategies-network-situational-awareness-cyber-risk-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post presents the SEI's latest research on malware analysis, acquisition strategies, network situational awareness, and cyber risk management.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 01 Dec 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/malware-analysis-acquisition-strategies-network-situational-awareness-cyber-risk-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Resilience Management Model (RMM)</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Emerging Technologies</category></item><item><title>A Taxonomy for Managing Operational Cybersecurity Risk</title><link>https://www.sei.cmu.edu/blog/a-taxonomy-for-managing-operational-cybersecurity-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses large-scale cyberattacks on payment card systems and a recent effort to create a taxonomy for operational cybersecurity risks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Cebula</dc:creator><pubDate>Mon, 04 Aug 2014 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-taxonomy-for-managing-operational-cybersecurity-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category><category>OCTAVE</category></item><item><title>Understanding How Network Security Professionals Perceive Risk</title><link>https://www.sei.cmu.edu/blog/understanding-how-network-security-professionals-perceive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore the perception of risk among network security professionals and factors that influence SEI's research on risk formulation in this SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Cebula</dc:creator><pubDate>Mon, 24 Jun 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/understanding-how-network-security-professionals-perceive-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category></item></channel></rss>