search menu icon-carat-right cmu-wordmark

Licensed Partner Organizations

  • ABI Consultants, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Accenture LLP

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Nazia Khan
  • CERT.br

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Creating and Managing CSIRT
    • Foundations of Incident Management
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Cristine Hoepers
    • Klaus Steding-Jessen
    • Miriam von Zuben
  • CMKL University

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
  • CommsNet Group Pty Ltd

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Cyber 365 Limited

    CERT Information Security Products
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
  • DQS Certification India Private Limited

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Forcepoint

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Andrew Distler
    • Stephen Henkel
    • Michael Miller
    • Daniel Velez
  • Invotecsa Innovaciones Tecnologicas SAS

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • SANCORP CONSULTING, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Frank Sanchez
  • Software Quality Center LLC

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Tanager, Inc.

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment