search menu icon-carat-right cmu-wordmark

Licensed Partner Organizations

  • ABI Consultants, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Acme Process Group

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Leigh Riley
  • Axio Global, Inc.

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • CERT.br

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Creating and Managing CSIRT
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Cristine Hoepers
    • Klaus Steding-Jessen
    • Miriam von Zuben
  • CGI Federal

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Mark Ellis
  • CMKL University

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Suppakrit Chatchayanusorn
    • Chalitda Madhyamapurush
    • Thanawat Manavid
  • CommsNet Group Pty Ltd

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Cyber 365 Limited

    CERT Information Security Products
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
    Partner Sponsored Professionals
    • Christopher Ward
  • Distray LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • DQS Certification India Private Limited

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • European Software Institute - Center Eastern Europe

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Forcepoint

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Michael Miller
    • Danielle Pacitti
  • Ghana Community Network Services Ltd.

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Lunarline, Inc.

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Mantis Security Corporation

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Jeff Afflerbach
  • ObserveIT

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Kathy Church
  • Quortum

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Joey Alonso
  • Revolutionary Security LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Nazia Khan
  • SANCORP CONSULTING, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Frank Sanchez
  • Securonix

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Software Quality Center LLC

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Sollers Inc

    CERT Information Security Products
    • Secure Coding
    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Soteritech, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Doug Sampson
  • Tanager, Inc.

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Andrew Distler