<img src="https://ws.zoominfo.com/pixel/KRrgUcTGWvWgFi4b3mCo" width="1" height="1" style="display: none;">

insider threat Featured

What I learned about insider threat from Doug Thomas of Lockheed Martin

September 16, 2020 at 9:04 AM

What I learned about insider threat from Doug Thomas of Lockheed Martin

Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance...

Action Requests

At ThreatSwitch we often talk about "outside-in" security compliance. A large part of the...

Alerts

Quantitatively managing risk is challenging partially because you need real-time data that...

Scheduled Reports

Reports: we build them all the time. Getting the right data in the right hands is critical for a...

We're SOC Certified

Security is baked into our DNA at ThreatSwitch, and we're excited to announce that we are now...

COVID-19 Reporting: Support Your Employees and Reduce Disruption

All of our customers are affected by COVID-19, and all of our customers employ employees...

Custom Roles

As an industrial security manager, you have a big program to manage: contracts, visits, foreign...

Multi-Employee VARs

You asked. We listened. ThreatSwitch's Visit Access Request module has made it quick and easy...

Improved Continuous Evaluation

Security managers know better than most that the execution of NISP is constantly changing. In...

Foreign Travel Custom Forms

With foreign travel, government regulations have remained nebulous. Moreover, as with so many...

Containers and Secure Areas

One of our major initiatives in 2020 is to improve asset management security and processes....

Introducing Advanced Reports and Analytics

When a conversation happens over and over with different customers, it is a good indication of...

Employee Insights

We believe that engaging employees in the industrial security program is an essential part of a...

Organize people with tags

Do you have a list of KMPs you would like to keep organized? What about a group of employees who...

Top 10 Reasons Why Employees are Not Applying Policies

ThreatSwitch works with some of the most successful and influential industrial security...

Improve your workflows with assigned reviewers

An ongoing challenge for organizations with multiple security managers running their industrial...

Partner Perspective: Why We Need Policies

ThreatSwitch works with some of the most successful and influential industrial security...

Enterprise Security is Different.

In my career, I have had the privilege of working for and with some of the world's biggest...

You've been upgraded to first-class foreign travel

With our latest release, ThreatSwitch has improved the process of gathering information from...

Employee-Initiated VARs

Visitor Access Requests are a regular headache for security managers. It is a cumbersome process...

How ThreatSwitch might have stopped Iran spy, Monica Elfriede Witt

I was saddened to read about yet another case of an employee at a defense contractor spying for...

Faster task completion with the Employee Inbox

When employee users log into ThreatSwitch it is critical that they are able to quickly identify...

New Filters and Contract Fields

"New Filters" may not sound like the most exciting thing to be added to ThreatSwitch lately...

eSignature is here

Few things are as frustrating to security managers as administrating the back-and-forth of...

Top 5 Compliance Challenges for Federal Contractors in 2019

It’s a tough time to be a compliance executive at a federal contractor. Whether you’re a Chief...

Introducing the ThreatSwitch Inbox

When our team thinks about the goals of ThreatSwitch, it is to make the tough job of a security...

Continuous Evaluation

As the government moves towards increasingly using Continuous Evaluation to expedite the...

Intelligent exporting

Wrestling with Excel is so exhausting. Sometimes you would love to have the exact data that you're...

Contract Organization

Contracts are an essential part of organizing security compliance. Now in ThreatSwitch you have...

Cleaner Look, Stronger Security

We've implemented a couple of design changes to make ThreatSwitch easier-than-ever to use....

Contracts + People = Happier Management

Managing contracts based on your personnel is an integral component of your NISPOM compliance....

Only see what you need with filtered views

Suffering from information overload? We've introduced smart filtering in our table views to...

DISS Goes Live THIS WEEK (June 7)

Big news from NCMS . . . user provisioning for DISS will begin this week with users who are KMPs...

Badge Documents, Better Downloads, Improved Reporting

Another busy week from down here in the ThreatSwitch boiler room: We've added several new...

Introducing Badges

As it turns out, we do need badges.  Fortunately, we're here to help:  The latest version of...

New features for Accesses, User Profiles, Visit Requests, and whole lot of bug fixes!

Another day, another update!  The development team has been hard at work to deliver a fresh...

A VAR-y Awesome Update to ThreatSwitch

You asked, we delivered. You can now track Visitor Access Requests (VARs) in ThreatSwitch. In...

Attach Documents to Contracts! Mark Users as Inactive!

We've heard your requests for more flexibility around contract documents, managing users who are...

MAJOR ThreatSwitch Upgrade. Roles and Facilities Just Leveled Up.

I know, I know. We JUST released exports and facility assignments to kick off the new year, and...

ThreatSwitch Update! Exports, Facility Assignment, and Minor Improvements

With a new year comes new improvements here at ThreatSwitch. We have a few brand new features...

Latest ThreatSwitch Upgrades

 

December is here, which means extra time off and presents. Just for you, we've updated...

Giant Bug Bomb

 

We just deployed a HUGE set of tweaks, fixes and improvements just in time for Halloweeen!

...

NEW TRAINING FEATURES and a few Bug Fixes

 

September is here and with it are significant upgrades to ThreatSwitch. This month, you'll see...

Defense Contractors: How SEAD 3 puts you in the reporting business

If you're a federal contractor, your reporting requirements just changed -- dramatically.  The...

Check out the ThreatSwitch Help Center

If you've been using ThreatSwitch for a while now you might think you know your way around....

07/31/2017 ThreatSwitch Upgrades: JPAS Sync, Adding Users, Performance Upgrades, Bug Fixes

We couldn't let July end without a few more summer improvements to ThreatSwitch.  This week,...

07/11/2017 ThreatSwitch Upgrades: Travel, JPAS Sync, Bug Fixes

It's that time again! Every couple of weeks we make ThreatSwitch better. This week, the upgrades...

06/26/2017 ThreatSwitch Code Release

As we strive to do every couple of weeks, we have released a few improvements and fixes to...

DSS In Transition: What it Means for You

SUMMARY:

The Defense Security Service (DSS) is planning a completely new way of thinking about...

06/02/2017 ThreatSwitch code Release

As we strive to do every couple of weeks, we have released a few improvements and fixes to...

04/14/2017 ThreatSwitch Code Release

What's New

  • FSOs can now add Pre-Travel Reports and Post-Travel Reports within the Incidents Module...

03/28/2017 ThreatSwitch Code Release

What's New

  • ThreatSwitch will now send an email report to FSOs on the last day of each month with a...

03/10/2017 ThreatSwitch Code Release

What's New

  • FSOs uploading users by the Personnel Report from JPAS can now include user emails by...

Security Notes: Unsafe Conference Calls, Airport Insiders, High Demand for Travel Briefings

  1. Your conference calls are vulnerable.

    Security researchers have uncovered a flaw in conference...

02/13/2017 ThreatSwitch Code Release

What's New

  • ThreatSwitch users can now login with OneLogin
  • Comments can no longer be saved without...

01/26/2017 ThreatSwitch Code Release

What's New

  • Added an Insider Threat Program Plan (ITTP) template located under the profile menu
  • ...

ThreatSwitch Founder and CEO John Dillard on Launching a Cybersecurity Startup

John Dillard and ThreatSwitch were featured in a recent interview by StartCharlotte:

12/02/2016 ThreatSwitch Code Release

What's New

  • FSOs can now import new users from a JPAS Personnel by Eligibility CSV file within in...

11/18/2016 ThreatSwitch Code Release

What's New

  • The Training Radial on the FSO dashboard is now fully functional, reflecting the...

11/17/2016 ThreatSwitch Code Release

What's New

  • FSOs can now assign and track training to themselves
  • An activity list of assigned and...

Mach37: Innovation & productivity

September Wave Update

ThreatSwitch Users,

ThreatSwitch's John Dillard Featured in Business Collective (YEC)

If you're in the market for an inspiring article - look no further. You have got to check out John...

ThreatSwitch's platform GovCloud receives FedRAMP High Authorization

The following information was retrieved via Amazon Press Releases:

Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?

By now, you are familiar with the concept of insider threat and the ways in which the methodology...

Insider Threat Prevention: Reducing Inadvertent Threats

Dealing with insider threats is a complicated, time-consuming task. With so many potential threats...

4 Steps to Better Insider Threat Detection Without a Budget Increase

There is an ever-growing need to improve your agency’s insider threat detection, recognition and...

4 Principles to Better Manage Your Insider Threat Program

For many leaders of government agencies, measuring the success of their insider threat program is a...

Why End-to-End Insider Threat Detection is Your Only Option

Program approval is hardly the only challenge government agencies are facing: Many are...

How to Use Value Stream Mapping to Address Insider Threats

At national defense and security agencies, few executives think of applying process improvement...

It's Time to Put Your Insider Threat Program to the Test

An insider threat is one of the greatest dangers you can face at your federal agency.

How Insider Threat Assessments Help Agencies Evaluate and Transform Their Programs

For federal agencies and the entities that work with them, oversight and expectations around...

How Insider Threats Create Problems for Commercial Organizations

Insider Threat policy requirements for Government organizations are well known (see, for example,...

3 Internal Security Measures Every Organization Should Consider

We've discussed several different trends underlying insider threats today – and why attacks, when...

Have Ye Seen Tim Wood? Improving Your Flawed Security Process

How is your organization’s process for determining employee security suitability?  Are your efforts...

Cloak and Dugout: Two Organizational Lessons From Baseball's Corporate Espionage Case

This case holds two important lessons for your organization, regardless of your field of...

Creating Strong Frameworks for Your Insider Threat Program

Just as a good building will fall without a strong foundation, any program you can conceive can...

Insider Threat Training: Get it Right or Pay the Price

When it comes to training your employees to identify and report insider threat in the workplace,...

Tips for Stress Testing Your Insider Threat Program

Developing an insider threat program takes time. Typically the insider threat manager and security...

Why Insider Threat is More an Organizational Process Problem, Than a Technology Problem

When security experts talk about insider threats, all too often they treat technology as both part...

Starting an Insider Threat Program with Limited Resources

Security is viewed as a cost center in many organizations. If there is not already an insider...

Breaking Down the Insider Threat Identification

At the heart of any Insider Threat Program is this essential question: How do we identify who is...

Defining Three Different Kinds of Insider Threat Issues

Security threats to organizations can be broadly categorized into external threats and insider...

Why Every CEO Should Be Concerned About Hillary Clinton's Email Server Problem -- And What They Need to Do About It

If you thought the rancor over Hillary Clinton’s email server was just about politics, think again....

Your Top 3 Insider Threat Risk Mitigation Strategies

As in many sectors, security must often carry out its mission with limited personnel and financial...

Creating a Culture of Cybersecurity at Work: Why the Hub is Not Enough

Cybersecurity Awareness Month (CSAM) is a useful reminder to all of us to reinvigorate our efforts...

Cyber Security - It's Not Just for Breakfast Any More

Cyber security. It’s on everyone’s mind. That’s not surprising given the spectacular thefts of...

What Can We Learn From Office Space About the "Human Side" of Insider Threat

One reason the cult classic movie Office Space is beloved by so many is that almost everyone can...

The Accidental Insider, Mitigating Unintentional Data Leaks

We all know the profile of an “insider threat”, the disgruntled employee that wants to get back...

Why Risk Assessment Should Not Overlook Top Decision Makers

Lying in bed at 6:00am, I opened my work email just like I did on nearly every other weekday...

NISPOM Conforming Change 2: Why Extend Requirements To The Private Sector?

Conforming Change 2 has finally been released. This change to the National Industrial Security...

Key Metrics to Track Your Insider Threat Program's Progress

“How am I doing?” Four simple words too often overlooked by insider threat programs. Senior leaders...

The One That Got Away: The Wrong Tools Won't Net The Insider Threat

It’s no secret that insider threat often rears its ugly head in the digital domain. So it makes...

Conforming Change 2 - Discount in our Kickstarter Promotion

Conforming Change 2 is here, as you know if you're an FSO. We're excited to announce the launch...

(Lucky) 7 Insider Threat Statistics Every Organization Should Know

Nobody really knows the precise scope of the insider threat within organizations. Attacks...

Why Are You Handing Underpaid and Disgruntled Workers Keys to The Vault?

While there is lots of buzz about protecting your organization from external threats (foreign...

Insider Threats to Financial Institutions: How to Set Up Protection You Can Bank On

No matter the size, all financial institutions are at risk of harm at the hand of their own...

Is Your Company Ready for NISPOM Conforming Change 2 Compliance (and Beyond)?

Does your company have a classified U.S. Government contract? Do you and your staff currently hold...

These 4 People Can Make (or Break) Your Insider Threat Program [How To Build a Cross-Functional Working Group]

Insider threat can take many forms, from the unwitting perpetrator to the disgruntled employee....

Why Cyber Insider Threat Could Be The Biggest Problem Facing Your Organization

It is so intrinsic to human nature to consider external threats as a higher priority to address and...

Cyber Insider Risk for Corporate Boards: Why Protecting the Company from the Inside is Vital to Corporate Survival

JP Morgan, Target, Home Depot, Anthem, Sony.  The list of companies victimized by spectacular data...

Compliance Is For Suckers: 5 Questions DSS Won't Ask About Your Insider Threat Program (But You Should)

To protect your company from insider threat, you'll need to exceed minimum Conforming Change 2...

Subscribe to Our Blog

Get our expert knowledge delivered straight to your inbox, and keep up-to-date with the latest goings on in your industry.

POPULAR POSTS

Transform the way you execute security

Save time and money for security, employees, and executives by automating your security program with ThreatSwitch.
A 15 minute phone call can save you 60% on training costs