Request demo
August 2, 2019 at 10:19 AM

Employee Insights

We believe that engaging employees in the industrial security program is an essential part of a healthy and safe reporting environment. But beyond the critical components of insider threat, employees need to be able to quickly know simple things such as the status of an eligibility investigation.

Read More
July 31, 2019 at 9:53 AM

Organize people with tags

Do you have a list of KMPs you would like to keep organized? What about a group of employees who require a follow-up? Or maybe you need a list of people who are part time? The bottom line is security managers need lots of lists of people and need to be able to quickly view and export those personnel.

Read More
June 28, 2019 at 1:39 PM

Top 10 Reasons Why Employees are Not Applying Policies

ThreatSwitch works with some of the most successful and influential industrial security professionals. Our Partner Perspective series sets out to share their top lessons and insights that you can take away to improve your own program.

For this installment, CEO and Co-Founder of It’s Just Results, Gustav Plato, identifies the top 10 reasons why employees are not applying policies and what you can do to create positive change.

Read More
May 10, 2019 at 2:19 PM

Improve your workflows with assigned reviewers

An ongoing challenge for organizations with multiple security managers running their industrial security program is keeping each person informed with their latest tasks and accountable items. ThreatSwitch now helps organize these tasks better by giving you the ability to assign items to individual security managers. Items that can be assigned include reportable information, foreign travel, and outgoing visit requests.

Read More
April 30, 2019 at 3:19 PM

Partner Perspective: Why We Need Policies

ThreatSwitch works with some of the most successful and influential industrial security professionals. Our Partner Perspective series sets out to share their top lessons and insights that you can take away to improve your own program.

For our inaugural Partner Perspective installment, CEO and Co-Founder of It’s Just Results, Gustav Plato, breaks down the critical need for, and creation of, security policies.

Read More
April 15, 2019 at 11:05 PM

Enterprise Security is Different.

In my career, I have had the privilege of working for and with some of the world's biggest organizations. My employers have included CIA, the US Navy, Deloitte, KPMG, and what is now General Dynamics IT. My current and former clients and customers include a great number of the Fortune 500 and most of the Defense and Intelligence Community. As an Executive in -- and vendor to -- those companies, I have learned a bit about how they deal with security and why it's so tough.

Read More
March 29, 2019 at 7:15 PM

You've been upgraded to first-class foreign travel

With our latest release, ThreatSwitch has improved the process of gathering information from employees regarding Foreign Travel. These updates allow for employees to easily submit all important pre & post-travel information to their Security Managers. Meanwhile, Security Managers can easily process these reports and take the appropriate actions and next steps.

Read More
February 21, 2019 at 9:15 AM

Employee-Initiated VARs

Visitor Access Requests are a regular headache for security managers. It is a cumbersome process to collect all the required information from employees (often over email 😭) then file that to JPAS or to a recipient directly.

As always, ThreatSwitch is here to help.

Read More
February 15, 2019 at 9:37 AM

How ThreatSwitch might have stopped Iran spy, Monica Elfriede Witt

I was saddened to read about yet another case of an employee at a defense contractor spying for a foreign power. This time it was Monica Elfriede Witt, who wasn’t just some low level clearance-holder like Manning; she had access to some of our most sensitive national security information in her counterintelligence and Special Access Program roles. This is truly a devastating setback.

Read More
January 18, 2019 at 2:31 PM

Faster task completion with the Employee Inbox

When employee users log into ThreatSwitch it is critical that they are able to quickly identify action items such as incomplete trainings and form requests. With the new Employee Inbox, users automatically see their most pressing tasks, in a simple inbox-style to-do list.

Read More
May 14, 2020 at 2:18 PM

Alerts

Quantitatively managing risk is challenging partially because you need real-time data that accurately depicts your mitigation posture. Then you need to know when something has gone beyond an acceptable risk threshold. For example, if you see a sudden spike in reported cyber incidents, how do you track that? For FSOs, does an individual's spike of visit or travel activity fire off an alarm?

Read More
May 5, 2020 at 9:20 AM

Scheduled Reports

Reports: we build them all the time. Getting the right data in the right hands is critical for a security team. Good data mitigates risk and highlights security operational successes and problems. With ThreatSwitch, we've made it easy to create those reports and gather any imaginable data on your security program. Now we've made it easier than ever to share that information, and optionally on a recurring basis.
Read More
April 8, 2020 at 9:47 AM

COVID-19 Reporting: Support Your Employees and Reduce Disruption

All of our customers are affected by COVID-19, and all of our customers employ employees critical to the security and safety of our country. 

It's critical for our customers to know who might be affected by the virus, who may have disruptions in their work patterns, and what their current status is. This allows each company to:

1. Support those employees who need help and

2. Manage COVID-19's disruptions to national security and positions of public trust. 

To that end, we just pushed an update to our reportable information module that allows employees to report their COVID-19 status, consistent with our customers' internal policies and the employees' consent. 

Read More
March 26, 2020 at 9:11 AM

Custom Roles

As an industrial security manager, you have a big program to manage: contracts, visits, foreign travel, insider threat, asset control, training, personnel organization, clearance tracking, and the list goes on.

Fortunately at many organizations there are other teams that own the entire or parts of these key areas. There might be an analyst who prepares staffing availability reports for big contracts, or an Insider Threat Working Group to track reportable information. Wouldn't it be nice if they stopped emailing you and you could give them access to only their relevant security data?

Read More
March 10, 2020 at 10:59 AM

Multi-Employee VARs

You asked. We listened. ThreatSwitch's Visit Access Request module has made it quick and easy for employees to communicate directly with security managers regarding upcoming customer visits. Up until now, we've focused on simplifying this process for a single employee. Now, VARs in ThreatSwitch are more powerful than ever by allowing employees to submit requests on behalf of groups of users.

Read More
February 24, 2020 at 10:58 AM

Improved Continuous Evaluation

Security managers know better than most that the execution of NISP is constantly changing. In order to best reflect the changes the government is making to continuous evaluation, ThreatSwitch has been updated to make tracking CE easier than ever.

Read More
February 4, 2020 at 10:56 AM

Foreign Travel Custom Forms

With foreign travel, government regulations have remained nebulous. Moreover, as with so many things in industrial security, requirements change dramatically from agency to agency. What may be a vanilla foreign travel questionnaire for the DoD can be a complicated mess in the intelligence community.

Read More
January 30, 2020 at 3:19 PM

Containers and Secure Areas

One of our major initiatives in 2020 is to improve asset management security and processes. We've quickly learned this is a major problem for industrial security involving the usual headaches - lots of emailing, fuzzy regulations, and long checklists. With such a big and complicated problem that ranges from origination receipt to audits to destruction, we're starting small. So first things first, where are your assets?

Read More
September 12, 2019 at 1:37 PM

Introducing Advanced Reports and Analytics

When a conversation happens over and over with different customers, it is a good indication of its importance. For our team, that repeated conversation has been about reports, and it has been important to everyone from assistant FSOs to C-suite executives. The bottom line is that easy access to data is the cornerstone of how effective businesses run their security program.

Read More
August 2, 2019 at 10:19 AM

Employee Insights

We believe that engaging employees in the industrial security program is an essential part of a healthy and safe reporting environment. But beyond the critical components of insider threat, employees need to be able to quickly know simple things such as the status of an eligibility investigation.

Read More
April 15, 2019 at 11:05 PM

Enterprise Security is Different.

In my career, I have had the privilege of working for and with some of the world's biggest organizations. My employers have included CIA, the US Navy, Deloitte, KPMG, and what is now General Dynamics IT. My current and former clients and customers include a great number of the Fortune 500 and most of the Defense and Intelligence Community. As an Executive in -- and vendor to -- those companies, I have learned a bit about how they deal with security and why it's so tough.

Read More
February 15, 2019 at 9:37 AM

How ThreatSwitch might have stopped Iran spy, Monica Elfriede Witt

I was saddened to read about yet another case of an employee at a defense contractor spying for a foreign power. This time it was Monica Elfriede Witt, who wasn’t just some low level clearance-holder like Manning; she had access to some of our most sensitive national security information in her counterintelligence and Special Access Program roles. This is truly a devastating setback.

Read More
January 4, 2019 at 2:09 PM

Top 5 Compliance Challenges for Federal Contractors in 2019

It’s a tough time to be a compliance executive at a federal contractor. Whether you’re a Chief Compliance Officer, Chief Legal Officer, Chief Security Officer, or VP or Director accountable for compliance, you are faced with a rapidly changing landscape dominated by privacy and security rules.

Read More
August 9, 2017 at 2:03 PM

Defense Contractors: How SEAD 3 puts you in the reporting business


If you're a federal contractor, your reporting requirements just changed -- dramatically.  The days of perhaps one report to security per employee every year is over. 

Security Agent Executive Directive 3 (SEAD 3) just dropped from our friends at the Office of the Director of National Intelligence (DNI). SEAD 3 became effective June 12, 2017 and requires contractors holding sensitive positions or who have access to any type of classified information to report a variety of life events, including all non-work related foreign travel and substantive foreign contacts to their local security office. 

This is well beyond the NISPOM or security clearance reporting we're used to and the time to get smart on it is now. Keep reading to learn more. 

Read More
June 6, 2017 at 9:16 AM

DSS In Transition: What it Means for You


SUMMARY:

The Defense Security Service (DSS) is planning a completely new way of thinking about industrial security and the NISPOM. Are you ready? The infographic below highlights a few things cleared federal contractors need to do to begin adapting to "DSS in Transition" (DiT).


Read More
January 25, 2017 at 9:44 PM

01/26/2017 ThreatSwitch Code Release

What's New

  • Added an Insider Threat Program Plan (ITTP) template located under the profile menu
  • Added username (user display name) and dropdown arrow to the profile menu
  • Changed the subject field title to "Who are you reporting on?"on the create new incident screen
  • Changed "Watchers" field title to "Reporter" on the create new incident screen
  • Replaced dropdown from "Watchers" (reporter) field to current user as default reporter
  • Users are now instantly redirected to the login screen upon logout
  • Removed all the "Import CSV" buttons from screens which cannot use a CSV to import
  • Various other UX/UI Fixes
  • Various other bug fixes
Read More
January 9, 2017 at 3:27 PM

ThreatSwitch Founder and CEO John Dillard on Launching a Cybersecurity Startup

John Dillard and ThreatSwitch were featured in a recent interview by StartCharlotte:

Read More
November 2, 2016 at 7:53 PM

Mach37: Innovation & productivity

Read More
July 28, 2016 at 4:03 PM

ThreatSwitch's John Dillard Featured in Business Collective (YEC)

If you're in the market for an inspiring article - look no further. You have got to check out John Dillard's interview with Bussiness Collective (YEC). It will open your eyes and motivate you to make yourself and your company the best it can be!

Read More
July 26, 2016 at 10:58 AM

ThreatSwitch's platform GovCloud receives FedRAMP High Authorization

The following information was retrieved via Amazon Press Releases:

Read More