ThreatSwitch’s platform GovCloud receives FedRAMP High Authorization

The following information was retrieved via Amazon Press Releases: Most stringent FedRAMP authorization recognizes AWS GovCloud (US) as a secure environment to run highly sensitive government workloads SEATTLE–(BUSINESS WIRE)–Jun. 23, 2016– Amazon Web Services, Inc. (AWS), an Amazon.com company (NASDAQ: AMZN), today announced that the AWS GovCloud (US) Region has received a Provisional Authority to Read more about ThreatSwitch’s platform GovCloud receives FedRAMP High Authorization[…]

Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?

By now, you are familiar with the concept of insider threat and the ways in which the methodology outlined in Conforming Change 2 can help identify and mitigate malicious attacks against your company’s assets. It goes without saying that blatant disregard for security protocol and obvious signs of employee disgruntlement should be documented and investigated Read more about Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?[…]

Insider Threat Prevention: Reducing Inadvertent Threats

Dealing with insider threats is a complicated, time-consuming task. With so many potential threats to protect against, you might not know where to begin. Do you start with data, privacy or physical security? How much of your budget should you allocate to each? Before you can answer these questions, you need to know what you’re Read more about Insider Threat Prevention: Reducing Inadvertent Threats[…]

4 Steps to Better Insider Threat Detection Without a Budget Increase

There is an ever-growing need to improve your agency’s insider threat detection, recognition and mitigation abilities. New legislation also stresses better organizational security for federal agencies. For example, the National Defense Authorization Act of 2014, signed by the President, requires better analyses and reports on security clearances – including costs, quality, and timelines for security Read more about 4 Steps to Better Insider Threat Detection Without a Budget Increase[…]

4 Principles to Better Manage Your Insider Threat Program

For many leaders of government agencies, measuring the success of their insider threat program is a difficult task. After all, insider threat incidents are counterfactual – if you don’t have any incidents, does that mean your threat assessments are accurate? Or, are you just lucky that no internal security threats have occurred? At first glance, Read more about 4 Principles to Better Manage Your Insider Threat Program[…]

Why End-to-End Insider Threat Detection is Your Only Option

Program approval is hardly the only challenge government agencies are facing: Many are struggling with funding their insider threat programs, and even if funding is secured and approval is obtained, all potential programs still struggle to actually deter insider threats. So, how do you ensure that your insider threat program is not only approved and Read more about Why End-to-End Insider Threat Detection is Your Only Option[…]

How to Use Value Stream Mapping to Address Insider Threats

At national defense and security agencies, few executives think of applying process improvement methodologies to their internal security operations – and especially not to their insider threat initiatives. This is a major missed opportunity. Why? Because methodologies such as value stream mapping are extremely effective at shoring up your agency’s insider threat detection efforts. Insider Threats Read more about How to Use Value Stream Mapping to Address Insider Threats[…]

It’s Time to Put Your Insider Threat Program to the Test

An insider threat is one of the greatest dangers you can face at your federal agency. Yet, knowing whether your insider threat program is mature enough to mitigate and manage so many evolving threats is difficult to determine, especially if you don’t have any data to compare your own program against. Nothing could be more critical Read more about It’s Time to Put Your Insider Threat Program to the Test[…]

How Insider Threat Assessments Help Agencies Evaluate and Transform Their Programs

For federal agencies and the entities that work with them, oversight and expectations around insider threat programs are changing quickly and these organizations need a measurable way to understand internal gaps, and make effective and efficient improvements without sacrificing security. In 2014, Congress passed and President Obama signed the National Defense Authorization (NDA) Act, introducing Read more about How Insider Threat Assessments Help Agencies Evaluate and Transform Their Programs[…]