MathCraft Newsletter Issue Q2 2019 – Associate Member of NCMS

Beware the Enemy Within

A media focus on hackers, advanced persistent threats (APTs) and foreign intruders gives the impression that organizations are most endangered by outside actors. In reality, 75% of security breaches occur because of insiders. Most of the time, they aren’t malicious: training users to follow simple protocols can stop a significant number of incidents.

On the Wire

The Security Clearance Process Is About to Get Its Biggest Overhaul in 50 Years – Trusted Workforce 2.0 framework promises to reduce the overwhelming investigation backlog  Read More

How the security clearance backlog hurts cybersecurity – clearance delays cause unacceptable delays throughout the government  Read More

ODNI, OPM unveil new personnel vetting framework to guide revamped background investigations – Federal agencies express optimism over the latest clearance framework  Read More

How Long Does It Take to Process a Security Clearance? Q1 2019 Update – processing time for top secret clearance holds steady at 468 days, but new initiatives have reduced the backlog by 25%  Read More

Do people with malicious intent present the biggest threat to personal data? – organizations overwhelmingly attribute insider threats to malicious intent and underestimate the risk of mere user error  Read More

What's Hot

How will the clearance overhaul change things?

After a year of development, the Office of the Director of National Intelligence (ODNI) has made it clear that Trusted Workforce 2.0 will soon be deployed, changing the clearance process from top to bottom. In conjunction with recent Continuous Evaluation (CE) requirements, the new system stands to expedite clearances while also placing stricter requirements on clearance holders and agencies.

Among other changes, the clearance process will now be divided among five “vetting scenarios” depending on mission needs and an applicant’s past history. Additionally, investigative tiers have been reduced to three: public trust, secret and top secret.

What does this mean for FSOs? – One thing hasn’t changed, and that’s the importance of accurate and thorough reporting. Personnel seeking clearance should be guided early on to provide honest and up-to-date information; discrepancies will continue to impede the speed of an investigation.

Tips of the Trade

Expedite Background Checks with SF-86 Review

The Office of Personnel Management (OPM) provides Standard Form 86 (SF-86) as a preliminary data-gathering tool for potential cleared individuals. The SF-86 is straightforward, but also demanding; simple errors can lengthen review time and cast needless suspicion on an applicant’s intent.

Review information required by OPM and provide a copy of SF-86 to employees ahead of filing to ensure accuracy and speed of processing.

For more information, check the following resources:

Need to Know

The National Industrial Security Program Operating Manual (NISPOM) update of May 2016 required cleared contractors to maintain an Insider Threat Program (ITP).

MathCraft’s Access Commander™ constitutes an all-in-one solution for personnel management, from tracking clearances to authorization, staff profiles, security incidents and more. Its Incidents/Insider Threats module enables full compliance with NISPOM and helps your organization to be more vigilant against an organization’s greatest danger.




MathCraft Security Technologies, Inc. is the leading provider of innovative software and technologies for Industrial Security professionals. Our tools are compliant with 32 CFR Part 117, NISPOM Rule and are available on-premises or in the cloud. Contact us today to see how our products can transform your security operations!

NCMS Endorsement/Disclaimer: References to commercial products, processes, or services do not necessarily constitute an endorsement by NCMS Inc. The opinions and views expressed on this email and on any linked web sites do not necessarily reflect those of NCMS.

© 2022 MathCraft Security Technologies, Inc. All Rights Reserved.
44121 Harry Byrd Highway, Suite 200, Ashburn, Virginia 20147
703-729-9022, info@mathcraft.com

Quick Links

MathCraft offers the most comprehensive industrial security software in the industry. Our products are compliant with 32 CFR Part 117, NISPOM Rule, and are available on-premise or in the cloud!

MathCraft Security Technologies, Inc.

44121 Harry Byrd Highway

Suite 200

Ashburn, Virginia 20147

Phone: 703.729.9022

Email: info@mathcraft.com