Blogs
If you're interested in the latest industrial security trends and topics, then you'll want to hang out here a while.
Governance, Risk, and Compliance: How Access Commander is Effective for Both Security and Compliance
Facility Security Officers (FSOs) are tasked with essential responsibilities in maintaining data security and integrity while ensuring their organization meets compliance requirements. With the cybersecurity landscape being tenser than ever, government agencies are demanding more from their contractors to deploy security controls, enforce governance policies, and report for audit purposes. Having to oversee cybersecurity, facility…
Read MoreTransitioning from DISS to NBIS: Everything You Need to Know
The National Background Investigation Services (NBIS) is the federal government’s central database system (still in development) for running background checks, vetting personnel, adjudicating cases, and providing ongoing screening for cleared employees. Once fully complete, it’ll act as the single source of truth for background investigations and case management by integrating all data into one system…
Read MoreWhat is Foreign Ownership, Control, or Influence (FOCI) & How Does it Impact Security Compliance?
Foreign Ownership, Control, or Influence (FOCI) is a status or situation in which a contractor with access to classified information has some foreign investment or association with foreign interest. It’s used by the Defense Counterintelligence and Security Agency (DCSA) to manage our national security interests without denying defense contractors, specifically those with foreign interests, access…
Read MoreTop Seven DCSA Training Requirements for FSOs
Because of the magnitude involved in working with classified information about our national security, the Defense Counterintelligence and Security Agency (DCSA), in conjunction with the National Industrial Security Program Operating Manual (NISPOM), has set numerous submission and sponsorship standards to acquire and maintain a Facility Security Clearance (FCL). Arguably, one of the most tedious is the DCSA…
Read MoreSafer Federal Workplace – Why Screening is Getting More Difficult
Whether you’re talking about individual facility security teams or the Federal Protective Service as a whole, there’s no question that their responsibilities for screening federal buildings are becoming exponentially challenging. The constantly evolving landscape of new threats, risks, and patron expectations puts these teams in formidable positions of trying to reactively create a safer federal…
Read MoreWhat is the Zero Trust Security Model
The Zero Trust Security Model, coined just over a decade ago, is a framework organizations can use to construct or enhance their cybersecurity program. It was formulated by considering the modern-day infrastructure challenges that now consist primarily of cloud and hybrid environments — making it difficult to define precisely where a network of servers, applications,…
Read MoreFederal Contractors: How SEAD 3 Helps with New Reporting Guidance
As part of a way to mitigate against evolving insider threats to national security information, the Defense Counterintelligence and Security Agency (DCSA) implemented the Security Executive Agent Directive 3 — commonly referred to as SEAD 3. The directive, which became effective June 12th, 2017, created reporting requirements for defense contractors and employees who have access to classified information.…
Read MoreHow FSOs Can Manage Cybersecurity
While Facility Security Officers (FSOs) aren’t traditionally responsible for managing an organization’s cybersecurity program, their role in protecting national security information and overseeing facility access control systems often puts them in line with the duties of a Chief Information Security Officer (CISO). Managing facility and cybersecurity have become blended today as cyber-attacks become more sophisticated…
Read MoreInfographic: The Story of MathCraft
Winter 1980: With a background in computer science, Imo Etuk leaves a prominent defense contractor to start a consulting business. After seeing the chaos surrounding the management of security clearances, MathCraft – named for the algebraic precision needed to design enterprise architecture – is born. Spring 1992: The MathCraft team is invited to a military…
Read More