FSO Spotlight – April 2019 – MathCraft’s Newsletter for Security Professionals

[vc_row css=”.vc_custom_1523390021267{background-color: #5e5e5e !important;}”][vc_column][vc_column_text]

FSO Spotlight: MathCraft’s Newsletter for Security Professionals

&nbsp[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”1699″ img_size=”medium”][/vc_column][vc_column width=”1/2″][vc_column_text]

April 4, 2019

Vol. 2, Issue 3



Beware the Enemy Within

A media focus on hackers, advanced persistent threats (APTs) and foreign intruders gives the impression that organizations are most endangered by outside actors. In reality, 75% of security breaches occur because of insiders. Most of the time, they aren’t malicious: training users to follow simple protocol can stop a significant number of incidents.[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523390555511{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]


The Security Clearance Process Is About to Get Its Biggest Overhaul in 50 Years – Trusted Workforce 2.0 framework promises to reduce the overwhelming investigation backlog Read More

How the security clearance backlog hurts cybersecurity – clearance delays cause unacceptable delays throughout the government Read More

ODNI, OPM unveil new personnel vetting framework to guide revamped background investigations – Federal agencies express optimism over the latest clearance framework Read More

How Long Does It Take to Process a Security Clearance? Q1 2019 Update – processing time for top secret clearance holds steady at 468 days, but new initiatives have reduced the backlog by 25% Read More

Do people with malicious intent present the biggest threat to personal data? – organizations overwhelmingly attribute insider threats to malicious intent and underestimate the risk of mere user error Read More

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523391633270{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row css=”.vc_custom_1523391852653{background-color: #f2f2f2 !important;}”][vc_column][vc_column_text]

fso software


How will the clearance overhaul change things?

After a year of development, the Office of the Director of National Intelligence (ODNI) has made it clear that Trusted Workforce 2.0 will soon be deployed, changing the clearance process from top to bottom. In conjunction with recent Continuous Evaluation (CE) requirements, the new system stands to expedite clearances while also placing stricter requirements on clearance holders and agencies.

Among other changes, the clearance process will now be divided among five “vetting scenarios” depending on mission needs and an applicant’s past history. Additionally, investigative tiers have been reduced to three: public trust, secret and top secret.

What does this mean for FSOs? – One thing hasn’t changed, and that’s the importance of accurate and thorough reporting. Personnel seeking clearance should be guided early on to provide honest and up-to-date information; discrepancies will continue to impede the speed of an investigation.

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523391901365{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]


Expedite Background Checks with SF-86 Review

The Office of Personnel Management (OPM) provides Standard Form 86 (SF-86) as a preliminary data-gathering tool for potential cleared individuals. The SF-86 is straightforward, but also demanding; simple errors can lengthen review time and cast needless suspicion on an applicant’s intent.

Review information required by OPM and provide a copy of SF-86 to employees ahead of filing to ensure accuracy and speed of processing.

For more information, check the following resources:

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523391901365{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]


FSO Software, Security information management software in the cloud

The National Industrial Security Program Operating Manual (NISPOM) update of May 2016 required cleared contractors to maintain an Insider Threat Program (ITP).

MathCraft’s Access Commander™ constitutes an all-in-one solution for personnel management, from tracking clearances to authorization, staff profiles, security incidents and more. Its Incidents/Insider Threats module enables full compliance with NISPOM and helps your organization to be more vigilant against an organization’s greatest danger.

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523392295371{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]MathCraft Security Technologies, Inc. is the leading provider of innovative software and technologies for Industrial Security professionals. Our tools are compliant with NISPOM Change 2, and they are available on-premises or in the cloud. Contact us today to see how our products can transform your security operations!

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523392295371{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]fso software[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1523392295371{background-color: #5e5e5e !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

MathCraft Security Technologies, Inc.,

44121 Harry Byrd Highway, Suite 200,

Ashburn, VA 20147


Schedule A Demo

    [anr_nocaptcha g-recaptcha-response]
    Loading posts...