When Change 2 of the National Industrial Security Program Operating Manual (NISPOM) came out in May of 2016, cleared government contractors were forced to set up internal Insider Threat Programs (ITPs). Change 2 was released in an effort to thwart espionage, unauthorized disclosure of classified information, and violence against the United States. ITP’s must try to detect employees who pose a potential threat, and then mitigate those risks through investigative, administrative, or other means.
The Incident Management module within Access Commander® supports an organization’s ITP by allowing FSOs and other security officers to record incidents, investigations and corrective actions. It also flags possible threats, helping enterprises to comply with NISPOM Change 2 proactively.
With comprehensive incident data at your fingertips, it’s easy to monitor risks and detect patterns of suspicious or disruptive behavior; incidents can be searched based on category, data and severity. With the Incident Management module, stay compliant, and keep threats where they belong: outside your organization.
Start recording incidents and corrective actions on day one.
Find patterns and subdue threats before any losses occur.
Keep your contract fully compliant with NISPOM.