search menu icon-carat-right cmu-wordmark

Licensed Partner Organizations

  • ABI Consultants, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Acme Process Group

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Leigh Riley
  • Axenic Ltd

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
    Partner Sponsored Professionals
    • Ahmed ElAshmawy
  • Axio Global, Inc.

    CERT-RMM Products
    • CERT-RMM Appraisal Services
    Partner Sponsored Professionals
    • Pamela Curtis
    • Nader Mehravari
    • Lisa Young
  • CERT.br

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Creating and Managing CSIRT
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Cristine Hoepers
    • Klaus Steding-Jessen
    • Miriam von Zuben
  • CGI Federal

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Rana Abbas
  • CMKL University

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Suppakrit Chatchayanusorn
    • Chalitda Madhyamapurush
    • Thanawat Manavid
  • CommsNet Group Pty Ltd

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Cyber 365 Limited

    CERT Information Security Products
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
  • DQS Certification India Private Limited

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • European Software Institute - Center Eastern Europe

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Forcepoint

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Michael Miller
    • Daniel Velez
  • GTECH Corporation

    Software Measurement Product Suite Products
    • Designing Products and Process Using Six Sigma
    • Implementing Goal-Driven Measurement
    • Improving Process Performance using Six Sigma
  • IBM

    Smart Grid Maturity Model Products
    • Smart Grid Maturity Model
  • Integrated System Diagnostics, Inc.

    Software Measurement Product Suite Products
    • Designing Products and Process Using Six Sigma
    • Implementing Goal-Driven Measurement
    • Improving Process Performance using Six Sigma
  • Lunarline, Inc.

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Mantis Security Corporation

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Jeff Afflerbach
  • Natural Systems Process Improvement, Inc.

    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • ObserveIT

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Kathy Church
  • Quortum

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Joey Alonso
  • Revolutionary Security LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Nazia Khan
  • SANCORP CONSULTING, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Frank Sanchez
  • Securonix

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Sollers Inc

    CERT Information Security Products
    • Secure Coding
    CERT-RMM Products
    • CERT-RMM Appraisal Services
  • Soteritech, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Doug Sampson
  • Tanager, Inc.

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • University of New Hampshire

    Software Architecture Product Suite Products
    • Software Architecture: Principles and Practices