<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Enterprise Risk and Resilience Management</title><link href="http://www.sei.cmu.edu/feeds/topic/enterprise-risk-and-resilience-management/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/enterprise-risk-and-resilience-management/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/enterprise-risk-and-resilience-management/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2024-01-24T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Enterprise Risk and Resilience Management</subtitle><entry><title>The Top 10 Skills CISOs Need in 2024</title><link href="https://www.sei.cmu.edu/blog/the-top-10-skills-cisos-need-in-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-01-24T00:00:00-05:00</published><updated>2024-01-24T00:00:00-05:00</updated><author><name>Gregory Touhill</name></author><id>https://www.sei.cmu.edu/blog/the-top-10-skills-cisos-need-in-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post outlines the top 10 skills that CISOs need in 2024 and beyond.</summary></entry><entry><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link href="https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-05-08T00:00:00-04:00</published><updated>2023-05-08T00:00:00-04:00</updated><author><name>Daniel Kambic</name></author><id>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</summary><category term="Cyber Risk and Resilience Management"/><category term="Operational Resilience"/><category term="Resilience Management Model (RMM)"/><category term="Cybersecurity"/><category term="Cybersecurity Controls"/><category term="Enterprise Risk and Resilience Management"/><category term="Best Practices in Network Security"/><category term="Critical Infrastructure Protection"/></entry><entry><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link href="https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-02-06T00:00:00-05:00</published><updated>2023-02-06T00:00:00-05:00</updated><author><name>Emily Shawgo</name></author><id>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</summary><category term="Cyber Risk and Resilience Management"/><category term="Operational Resilience"/><category term="Resilience Management Model (RMM)"/><category term="Cybersecurity"/><category term="Enterprise Risk and Resilience Management"/><category term="Risk"/><category term="Critical Infrastructure Protection"/></entry><entry><title>IT, OT, and ZT: Implementing Zero Trust in Industrial Control Systems</title><link href="https://www.sei.cmu.edu/blog/it-ot-and-zt-implementing-zero-trust-in-industrial-control-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-07-18T00:00:00-04:00</published><updated>2022-07-18T00:00:00-04:00</updated><author><name>Brian Benestelli, Daniel Kambic</name></author><id>https://www.sei.cmu.edu/blog/it-ot-and-zt-implementing-zero-trust-in-industrial-control-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post introduces fundamental ZT and ICS concepts, barriers to implementing ZT principles in ICS environments, and potential methods to leverage ZT concepts in this domain.</summary><category term="Risk"/></entry><entry><title>System End-of-Life Planning: Designing Systems for Maximum Resiliency Over Time</title><link href="https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-09-27T00:00:00-04:00</published><updated>2021-09-27T00:00:00-04:00</updated><author><name>Grant Deffenbaugh, Lyndsi Hughes</name></author><id>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Deployment plans for computing environments must account for hardware replacements and decommissions even though such activities may not occur until years later.</summary><category term="Enterprise Risk and Resilience Management"/><category term="Best Practices"/><category term="Systems Engineering"/></entry><entry><title>Translating the Risk Management Framework for Nonfederal Organizations</title><link href="https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-08-23T00:00:00-04:00</published><updated>2021-08-23T00:00:00-04:00</updated><author><name>Emily Shawgo, Brian Benestelli</name></author><id>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.</summary><category term="Cyber Risk and Resilience Management"/><category term="Cybersecurity"/><category term="Cybersecurity Controls"/><category term="Enterprise Risk and Resilience Management"/><category term="Risk"/></entry><entry><title>How to Use the CMMC Assessment Guides</title><link href="https://www.sei.cmu.edu/blog/how-to-use-the-cmmc-assessment-guides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-03-03T00:00:00-05:00</published><updated>2021-03-03T00:00:00-05:00</updated><author><name>Douglas Gardner</name></author><id>https://www.sei.cmu.edu/blog/how-to-use-the-cmmc-assessment-guides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post is intended for DoD contractors looking for additional clarification as they prepare for a CMMC assessment. It will walk you through the assessment guides, provide basic CMMC concepts and definitions, and introduce alternate descriptions of some practices.</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>10 Steps for Managing Risk: OCTAVE FORTE</title><link href="https://www.sei.cmu.edu/blog/10-steps-managing-risk-octave-forte/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-12-07T00:00:00-05:00</published><updated>2020-12-07T00:00:00-05:00</updated><author><name>Brett Tucker</name></author><id>https://www.sei.cmu.edu/blog/10-steps-managing-risk-octave-forte/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post, adapted from a recently published technical note, outlines OCTAVE FORTE's 10-step framework to guide nascent organizations as they build an ERM program and mature organizations as they fortify existing ERM programs, making them more reliable, measurable, consistent, and repeatable.</summary><category term="Risk"/></entry><entry><title>Balancing Cyber Confidence and Privacy Concerns</title><link href="https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-09-21T00:00:00-04:00</published><updated>2020-09-21T00:00:00-04:00</updated><author><name>William Reed, Dustin Updyke</name></author><id>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn about the privacy protocols that make it hard to protect enterprise networks, and their impact on network traffic monitoring in this SEI Blog post.</summary><category term="Enterprise Risk and Resilience Management"/><category term="Cyber Risk and Resilience Management"/></entry><entry><title>Follow the CUI: 4 Steps to Starting Your CMMC Assessment</title><link href="https://www.sei.cmu.edu/blog/follow-the-cui-4-steps-to-starting-your-cmmc-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-08-24T00:00:00-04:00</published><updated>2020-08-24T00:00:00-04:00</updated><author><name>Matthew Trevors</name></author><id>https://www.sei.cmu.edu/blog/follow-the-cui-4-steps-to-starting-your-cmmc-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">One of the primary drivers of the DoD's Cybersecurity Maturity Model Certification (CMMC) is the congressional mandate to reduce the risk of accidental disclosure of controlled unclassified information (CUI).</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>Beyond NIST SP 800-171: 20 Additional Practices in CMMC</title><link href="https://www.sei.cmu.edu/blog/beyond-nist-sp-800-171-20-additional-practices-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-06-22T00:00:00-04:00</published><updated>2020-06-22T00:00:00-04:00</updated><author><name>Andrew Hoover, Katie Stewart</name></author><id>https://www.sei.cmu.edu/blog/beyond-nist-sp-800-171-20-additional-practices-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">These 20 practices are intended to make DoD contractors more security conscious.</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity</title><link href="https://www.sei.cmu.edu/blog/cybersecurity-maturity-model-certification-cmmc-part-2-process-maturitys-role-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-06-01T00:00:00-04:00</published><updated>2020-06-01T00:00:00-04:00</updated><author><name>Andrew Hoover, Katie Stewart</name></author><id>https://www.sei.cmu.edu/blog/cybersecurity-maturity-model-certification-cmmc-part-2-process-maturitys-role-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Mature cybersecurity processes will improve an organization's ability to prevent and respond to a cyberattack</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>The Latest Work from the SEI: DevSecOps, Artificial Intelligence, and Cybersecurity Maturity Model Certification</title><link href="https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-devsecops-artificial-intelligence-and-cybersecurity-maturity-model-certification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-05-25T00:00:00-04:00</published><updated>2020-05-25T00:00:00-04:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-devsecops-artificial-intelligence-and-cybersecurity-maturity-model-certification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, conference papers, and webcasts highlighting our work....</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>An Introduction to the Cybersecurity Maturity Model Certification (CMMC)</title><link href="https://www.sei.cmu.edu/blog/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-30T00:00:00-04:00</published><updated>2020-03-30T00:00:00-04:00</updated><author><name>Katie Stewart, Andrew Hoover</name></author><id>https://www.sei.cmu.edu/blog/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">A cyber attack within the DIB supply chain could result in devastating losses of intellectual property and controlled unclassified information.</summary><category term="Cybersecurity Maturity Model Certification (CMMC)"/></entry><entry><title>Programmer Moneyball: Challenging the Myth of Individual Programmer Productivity</title><link href="https://www.sei.cmu.edu/blog/programmer-moneyball-challenging-the-myth-of-individual-programmer-productivity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-01-27T00:00:00-05:00</published><updated>2020-01-27T00:00:00-05:00</updated><author><name>Bill Nichols</name></author><id>https://www.sei.cmu.edu/blog/programmer-moneyball-challenging-the-myth-of-individual-programmer-productivity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">A pervasive belief in the field of software engineering is that some programmers are much, much better than others (the times-10, or x10, programmer), and that the skills...</summary><category term="Measurement and Analysis"/><category term="Software Quality"/></entry><entry><title>After the Cyber Resilience Review: A Targeted Improvement Plan for Service Continuity</title><link href="https://www.sei.cmu.edu/blog/after-the-cyber-resilience-review-a-targeted-improvement-plan-for-service-continuity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-06-03T00:00:00-04:00</published><updated>2019-06-03T00:00:00-04:00</updated><author><name>Robert Vrtis, Jeffrey Pinckard</name></author><id>https://www.sei.cmu.edu/blog/after-the-cyber-resilience-review-a-targeted-improvement-plan-for-service-continuity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In 2011, the SEI's CERT Division developed and published the Cyber Resilience Review (CRR) on behalf of the Department of Homeland Security....</summary><category term="Operational Resilience"/><category term="Cyber Risk and Resilience Management"/></entry><entry><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link href="https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-02-04T00:00:00-05:00</published><updated>2019-02-04T00:00:00-05:00</updated><author><name>Nataliya Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</summary><category term="Vulnerability Analysis"/><category term="Security-Related Requirements"/><category term="OCTAVE"/><category term="Cyber Risk and Resilience Management"/><category term="Network Situational Awareness"/><category term="Enterprise Risk and Resilience Management"/><category term="Cyber Missions"/><category term="Threat Modeling "/><category term="Best Practices in Network Security"/><category term="Risk"/><category term="Cyber-Physical Systems"/><category term="Critical Infrastructure Protection"/></entry><entry><title>Threat Modeling: 12 Available Methods</title><link href="https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-12-03T00:00:00-05:00</published><updated>2018-12-03T00:00:00-05:00</updated><author><name>Nataliya Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</summary><category term="Vulnerability Analysis"/><category term="Security-Related Requirements"/><category term="OCTAVE"/><category term="Cyber Risk and Resilience Management"/><category term="Network Situational Awareness"/><category term="Enterprise Risk and Resilience Management"/><category term="Cyber Missions"/><category term="Threat Modeling "/><category term="Best Practices in Network Security"/><category term="Risk"/><category term="Cyber-Physical Systems"/><category term="Critical Infrastructure Protection"/></entry><entry><title>Adding Red to Blue: 10 Tactics Defenders Can Learn from Penetration Testers</title><link href="https://www.sei.cmu.edu/blog/adding-red-to-blue-10-tactics-defenders-can-learn-from-penetration-testers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2015-12-14T00:00:00-05:00</published><updated>2015-12-14T00:00:00-05:00</updated><author><name>Brent Kennedy</name></author><id>https://www.sei.cmu.edu/blog/adding-red-to-blue-10-tactics-defenders-can-learn-from-penetration-testers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post, in collaboration with The Veris Group, highlights 10 low-disruption, freely available penetration testing tactics that benefit network defenders.</summary><category term="Cyber Risk and Resilience Management"/></entry><entry><title>Applying Threat Intelligence to Operational Resilience and Risk Management Frameworks</title><link href="https://www.sei.cmu.edu/blog/applying-threat-intelligence-to-operational-resilience-and-risk-management-frameworks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2015-10-12T00:00:00-04:00</published><updated>2015-10-12T00:00:00-04:00</updated><author><name>Doug Gray</name></author><id>https://www.sei.cmu.edu/blog/applying-threat-intelligence-to-operational-resilience-and-risk-management-frameworks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn how applying threat intelligence can help organizations improve their operational resilience and risk management frameworks in this SEI Blog post.</summary><category term="Resilience Management Model (RMM)"/></entry></feed>