01/26/2017 ThreatSwitch Code Release

What’s New Added an Insider Threat Program Plan (ITTP) template located under the profile menu Added username (user display name) and dropdown arrow to the profile menu Changed the subject field title to “Who are you reporting on?”on the create new incident screen Changed “Watchers” field title to “Reporter” on the create new incident screen Replaced dropdown Read more about 01/26/2017 ThreatSwitch Code Release[…]

Mach37: Innovation & productivity

Mach37: Innovation & productivity By John Gilroy November 1, 2016 10:10 pm Download audio Today we are going to take a look at a local incubation hub: Mach37.  Representing Mach37 is managing partner, Rick Gordon.  Also in the studio are two individuals that have worked within the Mach 37 program:  Tensor Wrench  CEO Jason Wagner, and Read more about Mach37: Innovation & productivity[…]

Want to know about ThreatSwitch Security? Check out this video.

ThreatSwitch is often asked by customers about where the data is stored. Because we are committed to having the most secure NISPOM application in the world, we’ve built ThreatSwitch on AWS GovCloud. Below is a great new video from the AWS GovCloud team that explains what GovCloud is and why it’s so secure and approved Read more about Want to know about ThreatSwitch Security? Check out this video.[…]

ThreatSwitch’s platform GovCloud receives FedRAMP High Authorization

The following information was retrieved via Amazon Press Releases: Most stringent FedRAMP authorization recognizes AWS GovCloud (US) as a secure environment to run highly sensitive government workloads SEATTLE–(BUSINESS WIRE)–Jun. 23, 2016– Amazon Web Services, Inc. (AWS), an Amazon.com company (NASDAQ: AMZN), today announced that the AWS GovCloud (US) Region has received a Provisional Authority to Read more about ThreatSwitch’s platform GovCloud receives FedRAMP High Authorization[…]

Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?

By now, you are familiar with the concept of insider threat and the ways in which the methodology outlined in Conforming Change 2 can help identify and mitigate malicious attacks against your company’s assets. It goes without saying that blatant disregard for security protocol and obvious signs of employee disgruntlement should be documented and investigated Read more about Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?[…]

Insider Threat Prevention: Reducing Inadvertent Threats

Dealing with insider threats is a complicated, time-consuming task. With so many potential threats to protect against, you might not know where to begin. Do you start with data, privacy or physical security? How much of your budget should you allocate to each? Before you can answer these questions, you need to know what you’re Read more about Insider Threat Prevention: Reducing Inadvertent Threats[…]

4 Steps to Better Insider Threat Detection Without a Budget Increase

There is an ever-growing need to improve your agency’s insider threat detection, recognition and mitigation abilities. New legislation also stresses better organizational security for federal agencies. For example, the National Defense Authorization Act of 2014, signed by the President, requires better analyses and reports on security clearances – including costs, quality, and timelines for security Read more about 4 Steps to Better Insider Threat Detection Without a Budget Increase[…]

4 Principles to Better Manage Your Insider Threat Program

For many leaders of government agencies, measuring the success of their insider threat program is a difficult task. After all, insider threat incidents are counterfactual – if you don’t have any incidents, does that mean your threat assessments are accurate? Or, are you just lucky that no internal security threats have occurred? At first glance, Read more about 4 Principles to Better Manage Your Insider Threat Program[…]