Use These Facts to Make the Business Case for Funding an Insider Threat Program

According to EY’s 2015 Global Information Security Survey, the overwhelming majority of businesses today believe their security protocols related to insider threat are not up to standard. So why is it that insider threat programs rarely get the funding needed? While building an insider threat program is on the agenda for most companies, it normally Read more about Use These Facts to Make the Business Case for Funding an Insider Threat Program[…]

Conforming Change 2 – Discount in our Kickstarter Promotion

Conforming Change 2 is here, as you know if you’re an FSO. We’re excited to announce the launch of a 21-day kickstarter campaign that gives you the opportunity to sign up in advance for ThreatSwitch in the July customer on-boarding wave for a BIG discount. For example, companies with 50-300 employees can get three months Read more about Conforming Change 2 – Discount in our Kickstarter Promotion[…]

How Does NISPOM Conforming Change 2 Define Insider Threat?

By Greg Cullison NISPOM Conforming Change 2 was released on May 18, 2016. Inside the document is an updated definition of Insider Threat. Definitions are important because they can lead us to understand the bounds of a compliant Insider Threat program. What does the government say? This post is part of a series of articles Read more about How Does NISPOM Conforming Change 2 Define Insider Threat?[…]