search menu icon-carat-right cmu-wordmark

Licensed Partner Organizations

  • ABI Consultants, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Accenture LLP

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Nazia Khan
  • Acme Process Group

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Leigh Riley
  • CERT.br

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Creating and Managing CSIRT
    • Fundamentals of Incident Handling
    Partner Sponsored Professionals
    • Cristine Hoepers
    • Klaus Steding-Jessen
    • Miriam von Zuben
  • CGI Federal

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Mark Ellis
  • CMKL University

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
  • CommsNet Group Pty Ltd

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Competenza Servicios SC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Cyber 365 Limited

    CERT Information Security Products
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Fundamentals of Incident Handling
    • Managing Computer Security Incident Response Teams
  • DQS Certification India Private Limited

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Forcepoint

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Michael Miller
    • Danielle Pacitti
    • Daniel Velez
  • Ghana Community Network Services Ltd.

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Creating a Computer Security Incident Response Team
    • Managing Computer Security Incident Response Teams
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • ObserveIT

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Kathy Church
  • SANCORP CONSULTING, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Frank Sanchez
  • Software Quality Center LLC

    CERT Information Security Products
    • Advanced Incident Handling for Technical Staff
    • Advanced Topics in Incident Handling
    • Assessing Information Security Risk Using the OCTAVE Approach
    • Fundamentals of Incident Handling
    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
  • Soteritech, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Doug Sampson
  • Tanager, Inc.

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment
    Partner Sponsored Professionals
    • Andrew Distler
  • Vaillance Group, LLC

    Insider Threat Products
    • Insider Threat Program Evaluation
    • Insider Threat Vulnerability Assessment