Governance, Risk, and Compliance: How Access Commander is Effective for Both Security and Compliance

Facility Security Officers (FSOs) are tasked with essential responsibilities in maintaining data security and integrity while ensuring their organization meets compliance requirements. With the cybersecurity landscape being tenser than ever, government agencies are demanding more from their contractors to deploy security controls, enforce governance policies, and report for audit purposes.   Having to oversee cybersecurity, facility…

Read More

The GCC High Preparation Guide

Everything You Need to Know Plus Answers to FAQs Between constant national-security compliance updates, the increase in cybersecurity incidents, and the need for cleared personnel to remotely access network resources such as applications or sensitive data, there had to be a solution available that balances user accessibility with security and compliance.  Those demands prompted the…

Read More

Transitioning from DISS to NBIS: Everything You Need to Know

The National Background Investigation Services (NBIS) is the federal government’s central database system (still in development) for running background checks, vetting personnel, adjudicating cases, and providing ongoing screening for cleared employees. Once fully complete, it’ll act as the single source of truth for background investigations and case management by integrating all data into one system…

Read More

What is Foreign Ownership, Control, or Influence (FOCI) & How Does it Impact Security Compliance?

Foreign Ownership, Control, or Influence (FOCI) is a status or situation in which a contractor with access to classified information has some foreign investment or association with foreign interest. It’s used by the Defense Counterintelligence and Security Agency (DCSA) to manage our national security interests without denying defense contractors, specifically those with foreign interests, access…

Read More

Top Seven DCSA Training Requirements for FSOs

Because of the magnitude involved in working with classified information about our national security, the Defense Counterintelligence and Security Agency (DCSA), in conjunction with the National Industrial Security Program Operating Manual (NISPOM), has set numerous submission and sponsorship standards to acquire and maintain a Facility Security Clearance (FCL). Arguably, one of the most tedious is the DCSA…

Read More

Safer Federal Workplace – Why Screening is Getting More Difficult

Whether you’re talking about individual facility security teams or the Federal Protective Service as a whole, there’s no question that their responsibilities for screening federal buildings are becoming exponentially challenging. The constantly evolving landscape of new threats, risks, and patron expectations puts these teams in formidable positions of trying to reactively create a safer federal…

Read More

What is the Zero Trust Security Model

The Zero Trust Security Model, coined just over a decade ago, is a framework organizations can use to construct or enhance their cybersecurity program. It was formulated by considering the modern-day infrastructure challenges that now consist primarily of cloud and hybrid environments — making it difficult to define precisely where a network of servers, applications,…

Read More

Federal Contractors: How SEAD 3 Helps with New Reporting Guidance

As part of a way to mitigate against evolving insider threats to national security information, the Defense Counterintelligence and Security Agency (DCSA) implemented the Security Executive Agent Directive 3 — commonly referred to as SEAD 3. The directive, which became effective June 12th, 2017, created reporting requirements for defense contractors and employees who have access to classified information.…

Read More

Infographic: The Story of MathCraft

Winter 1980: With a background in computer science, Imo Etuk leaves a prominent defense contractor to start a consulting business. After seeing the chaos surrounding the management of security clearances, MathCraft – named for the algebraic precision needed to design enterprise architecture – is born. Spring 1992: The MathCraft team is invited to a military…

Read More

How Insider Threats are Evolving in 2022

In the midst of a rising cybersecurity crisis, it’s worth keeping one thing in mind: the best way to infiltrate an organization is from the inside. With experts estimating that two out of every three data breaches are caused by insiders, insider threats remain a major concern for cleared organizations, demanding constant vigilance and alertness from facility security…

Read More