MathCraft Newsletter Issue Q2 2019 – Associate Member of NCMS
Beware the Enemy Within
A media focus on hackers, advanced persistent threats (APTs) and foreign intruders gives the impression that organizations are most endangered by outside actors. In reality, 75% of security breaches occur because of insiders. Most of the time, they aren’t malicious: training users to follow simple protocols can stop a significant number of incidents.
How the security clearance backlog hurts cybersecurity – clearance delays cause unacceptable delays throughout the government Read More
ODNI, OPM unveil new personnel vetting framework to guide revamped background investigations – Federal agencies express optimism over the latest clearance framework Read More
How Long Does It Take to Process a Security Clearance? Q1 2019 Update – processing time for top secret clearance holds steady at 468 days, but new initiatives have reduced the backlog by 25% Read More
Do people with malicious intent present the biggest threat to personal data? – organizations overwhelmingly attribute insider threats to malicious intent and underestimate the risk of mere user error Read More
How will the clearance overhaul change things?
After a year of development, the Office of the Director of National Intelligence (ODNI) has made it clear that Trusted Workforce 2.0 will soon be deployed, changing the clearance process from top to bottom. In conjunction with recent Continuous Evaluation (CE) requirements, the new system stands to expedite clearances while also placing stricter requirements on clearance holders and agencies.
Among other changes, the clearance process will now be divided among five “vetting scenarios” depending on mission needs and an applicant’s past history. Additionally, investigative tiers have been reduced to three: public trust, secret and top secret.
What does this mean for FSOs? – One thing hasn’t changed, and that’s the importance of accurate and thorough reporting. Personnel seeking clearance should be guided early on to provide honest and up-to-date information; discrepancies will continue to impede the speed of an investigation.
Expedite Background Checks with SF-86 Review
The Office of Personnel Management (OPM) provides Standard Form 86 (SF-86) as a preliminary data-gathering tool for potential cleared individuals. The SF-86 is straightforward, but also demanding; simple errors can lengthen review time and cast needless suspicion on an applicant’s intent.
Review information required by OPM and provide a copy of SF-86 to employees ahead of filing to ensure accuracy and speed of processing.
For more information, check the following resources:
The National Industrial Security Program Operating Manual (NISPOM) update of May 2016 required cleared contractors to maintain an Insider Threat Program (ITP).
MathCraft’s Access Commander™ constitutes an all-in-one solution for personnel management, from tracking clearances to authorization, staff profiles, security incidents and more. Its Incidents/Insider Threats module enables full compliance with NISPOM and helps your organization to be more vigilant against an organization’s greatest danger.
MathCraft Security Technologies, Inc. is the leading provider of innovative software and technologies for Industrial Security professionals. Our tools are compliant with 32 CFR Part 117, NISPOM Rule and are available on-premises or in the cloud. Contact us today to see how our products can transform your security operations!
NCMS Endorsement/Disclaimer: References to commercial products, processes, or services do not necessarily constitute an endorsement by NCMS Inc. The opinions and views expressed on this email and on any linked web sites do not necessarily reflect those of NCMS.