insights.jpg

Capturing Front and Back Stage Elements in the Personnel Vetting Process

Personnel Vetting Process: Creating the Stakeholder Persona Profile

Understanding Stakeholders in the Personal Vetting Process

Have you seen our Blog Series on the Personnel Security Process?

Applying Journey Mapping to the Personnel Security Vetting Process

Challenges and Improvements in the Personnel Security Requests Process

Key Players in the End-to-End Security Clearance Process

What Does the Personnel Security Process Entail?

Obsessive Attention to Detail: Not Just for Superbowl Winners

Guest Blog Post: What Did We Learn about Cybersecurity in 2018?

Big Sky Associates Announces Bill Fischer as Director and Majority Owner

So Many Projects, So Little Time: 5 Tips for Choosing Wisely

How to Build a Kickass Operations Plan in 5 Easy Steps (And Why You Need One)

3 Tips for Getting Your Process Map Right 

Your Security Program in 2018: Less Vader, More Chewbacca

Relying on The Same Old Security Credentials Doesn’t Work in Today’s Cyber Environment

Oops! Security Breach: What that Means for You

#CyberAware Month: Cyber Security Professionals

Hello October! National Cyber Security Awareness Month

Who’s Your Project Champion?

Deep Dive: Developing An Insider Threat Program

Major Pitfalls That Will Sink Your Personnel Security Program

Fixing the Process in Your Security Challenges

Who's Your Trusted Sidekick? Choosing a Superhero Federal Contracting Partner

The HUBZone Program Today

HUBZone Truths

Spoiler Alert - Here's Why You Need a HUBZone Partner

Fear Factor – Can You Face Your Cyber Security Fears?

Don't Rush the Process: Revisiting Strategic Objectives

Deep Dive into Process Improvement in the IC

5 Steps to Achieving Your Intel Team's Full Performance Potential

Security Investigations: What Can You Do Right Now to Improve?

Creating an Environment of Engaged Employees

Security Investigations: A Vision for the Future

What I Love Lucy has to do with the Security Clearance Process (Hint: Conveyor Belts)

Are Security Clearances Useless?

Success and Sustainability -- How to Ensure Lasting Results with Security Process Improvement

If You’ve Got 99 Problems (Then Prioritizing Is One of Them)

Houston We Have a Problem (But We Don't Know What It Is): How to Visualize Your Process

Wipe the Dirt off Your Data

6 Tips to Combat Cyber Threat

Ready, Set, Go: Project Execution 101

Grab the Low-Hanging Fruit: Selecting the Right Projects at the Right Time

Go With the Flow: A Deployment Strategy Guide for Federal Defense and Intelligence Agencies

Federal Agencies: If You're Not Improving, You're Getting Worse!

8 Common Mistakes that Open the Door to Insider Threat Risk [PART 2]

This One Change Will Take Your Government Contractor Support (and Results) to the Next Level

How We Created a Security Clearance Processing Center of Excellence

8 Steps to a Leaner Personnel Security Clearance Adjudication Process

The Secret to Understanding (and Controlling) the True Cost of a Security Clearance

How Do You Triage Your High Risk / High Value Employees?

Use This New Lean Maturity Model to Assess and Standardize Your Clearance Process

Don't Wait to Adjudicate: How Federal Execs Can Improve Security Clearance Processing Time

Getting to the left of IRTPA: The KPIs that predict IRTPA metrics

Investigations Come in Predictable Waves: Are You Prepared for the Next One?

DSS In Transition. Wants to Move to a Threat-Based Security Model

Why You Need an Agile Security Program - and 5 Steps to Get There

8 Common Mistakes that Open the Door to Insider Threat Risk [PART 1]

The Top 4 Mistakes Security Executives Make (And How to Fix Them)

Why Your New Insider Threat Program Should Create Less Work - Not More

DSS Published an Insider Threat Plan. What Does That Mean For You?

Another Snowden or Just a Hoarder?

Human Resources and Insider Threat

Everything You've Always Wanted to Know About Designing an Insider Threat Program* (*But Weren't Sure Who To Ask)

Successful Project Management = Successful Expectation Management

Best Practices for Cross Functional Working Groups

3 Risk Management Tools Security Leaders Can't Afford to Ignore

RACI to the Top: How to Guarantee Your Team Members Know Their Roles

3 Ways Insider Threat Will Wreck Your Business (And How To Stop It)

9 Steps to Get the Most Out of Your Company's Risk Analysis

Value Stream Mapping: A Must-Have Tool for Insider Threat Prevention [5 BEST PRACTICES]

No Stakeholder Left Behind: How To Get Your Team On Board With Change

5 Details Often Overlooked in Pursuit of Perfect SOPs

Improve Your Processes By Writing Them Down: A Quick and Dirty Guide to Standard Operating Procedures [FREE CHECKLIST]

Can You Place a Value on Organizational Security? (Yes, and Here's How To Calculate It)

Negligence and Carelessness: Punk Rock Band, or Conforming Change 2 Requirement?

6 Tips to Position Your Security Team For Lasting Success

Use These Facts to Make the Business Case for Funding An Insider Threat Program

Insider Threat Training: Get it Right, or Pay the Price

The FSO's Secret Weapon for Conforming Change 2 Compliance [FREE SNAPSHOT ASSESSMENT]

What Can We Learn From Office Space About the "Human Side" of Insider Threat?

The One That Got Away: The Wrong Tools Won't Net The Insider Threat

These 4 People Can Make (or Break) Your Insider Threat Program [How To Build a Cross-Functional Working Group]

Compliance Is For Suckers: 5 Questions DSS Won't Ask About Your Insider Threat Program (But You Should)

How Does NISPOM Conforming Change 2 Define Insider Threat?

Is Your Company Ready for NISPOM Conforming Change 2 Compliance (and Beyond)? [UPDATED]

Insider Threats to Financial Institutions: How To Set Up Protection You Can Bank On

We're Giving Away The Secrets To Running a Next-Level Security Program. [FREE GUIDE]

1 Easy Way to Speed Up Your Security Processes - Right Now

Cyber Security: To the Network and Beyond

Cyber Security - It’s Not Just for Breakfast Any More

To Thine New Process Be True: 5 Steps to Make Your Improvements Stick

The One Simple Principle That Can Save You Millions Of $$$

10 Must-Reads for Every Executive

How To Find The Waste In Your Security Processes [Free Downloadable Checklist]

How to Prevent A Bozo Explosion in Your Service Provider Network

The Weakest Link In Your Security Process Is...

3 Bad Options for Automation in Government

Command and Control (For Contingencies) - How to Take Your Project Management to the Next Level

Working Through Culture

The ABCs of Project Failure

This One Change Will Improve All of Your Business Decisions

7 Strategies for the Government Executive

Why Your Data May Be Deadly

7 Ways to Prepare for the Future of Knowledge Work

Why Are You Handing Underpaid and Disgruntled Workers Keys to The Vault?

How to Use Protective Intelligence to Predict and Prevent VIP Threats

Five Insane Predictions about Knowledge Work

Project Selection: How to Pick a Winner Every Time

Are You Using Garbage KPIs?

A Gentleman's Guide To Good (Data) Sets: It's All About Proportion

Understand Your Operations in 10 Minutes with These 5 Simple Steps

(Lucky) 7 Insider Threat Statistics Every Organization Should Know

Key Metrics to Track Your Insider Threat Program's Progress

There are no “soft” professions like design and OD. Here’s Why.

NISPOM Conforming Change 2: Why Extend Requirements To The Private Sector? [UPDATED]

NISPOM Change 2: Start By Focusing on These 4 Requirements [UPDATED]

NISPOM Conforming Change 2: What Is It and How Does It Affect You? [UPDATED]

Chipotle's Ultimate Insider Threat

You Are Wrong About Millennials, and It’s Going to Wreck Your Business

Value Stream Mapping: Find Out How The Sausage is Made So You Can Make it Better, Cheaper, Faster

Microslicing at Hewlett-Packard: Augmenting the Human Consultant

A Simple Approach to Process Improvement That Works Every Time.

If the Password’s Not Dead: Should We Stop Dreaming About Biometrics?

Technology: The Crucial Enabler

5 Decision-Making Metrics Every Leader Must Track

Yoi! This Platform has Crazy Chutzpah.

Why Risk Assessment Should Not Overlook Top Decision Makers

Making Smart Operational Energy Decisions Part 2: A Decisions Support Framework

Making Smart Operational Energy Decisions Part 1: Pitfalls to Avoid

Why Your Understanding of Data is All Wrong

Why Creating a Culture of Security Awareness is Crucial in Tackling Insider Threat

The Future is Now - Don't Get Left Behind

The Accidental Insider, Mitigating Unintentional Data Leaks

Cyber Insider Risk for Corporate Boards: Why Protecting the Company from the Inside is Vital to Corporate Survival

Why Cyber Insider Threat Could Be The Biggest Problem Facing Your Organization

Creating a Culture of Cybersecurity at Work: Why the Hub is Not Enough

Optimizing the Military's Vehicle Fleet Part 2: FMR B-30 Done Right

Optimizing the Military's Vehicle Fleet Part 1: A Visual Overview of the Data

Microslices are Real, and They Are Spectacular

Your Top 3 Insider Threat Risk Mitigation Strategies

Strategic Resource Allocation - There's an App for That!

Why Every CEO Should Be Concerned About Hillary Clinton's EmailServer Problem -- And What They Need to Do About It

Bob Dylan: Professional Services Futurist

How to Optimize Project Selection with a Spreadsheet and Basic Algebra

Defining Three Different Kinds of Insider Threat Issues

Using Averages in Your Business Data Analysis? You May Be Overlooking Risk.

Mitigating the Insider Threat Indicators

We Hacked Our Own Site. Here's What We Learned About Risk Mitigation.

Breaking Down the Insider Threat Identification Problem

Starting an Insider Threat Program with Limited Resources

Why Insider Threat is More an Organizational Process Problem, Than a Technology Problem

OPM Hack. Everyone Is Focused on the Wrong Thing. Here’s Why.

Tips for Stress Testing Your Insider Threat Program

Creating Strong Frameworks for Your Insider Threat Program

3 Process Improvement Techniques Your Organization Can Employ Now

Cloak and Dugout: Two Organizational Lessons From Baseball’s Corporate Espionage Case

Developing An Operations Plan: 5 Key Elements

Have Ye Seen Tim Wood? Improving Your Flawed Security Process

4 Ways Process Optimization Can Minimize Costs

Understanding the Importance of Project Maintenance

3 Internal Security Measures Every Organization Should Consider

Jawbone’s Trade Secrets Sprint Away

Unlocking the Chinese Puzzle: Insider Espionage and Four Ways to Protect Your Organization

Why Operational Efficiency Needs To Be Your Top Priority

How Insider Threats Create Problems for Commercial Organizations

How Insider Threat Assessments Help Agencies Evaluate and Transform Their Programs

The Basics of Project Execution: Ensuring You Deliver Results

Why Project Monitoring is Critical to Success

5 Keys to Organizational Decision-Making

3 Project Realization Challenges and How to Overcome Them

Project Selection: 5 Things Every Organization Should Consider

What is the HUBZone Program, and How Can It Help You Succeed?

How Prime Contractors Benefit From HUBZone Subcontractors

Elite Data Analysis For Security V: Leverage Machine Learning

Elite Data Analysis For Security IV: Statistical Modeling

Elite Data Analysis For Security III: Emphasizing Data Quality

The #1 Myth Federal Executives Believe About Contracting

Elite Data Analysis For Security II: Data Dashboard Pitfalls

Elite Data Analysis For Security, Part I: Data Collection Tactics

It’s Time To Put Your Insider Threat Program To The Test

5 Decision Analysis Ideas For More Agile Agency Security

Two Resource Allocation Secrets For Improved Agency Security

3 Trends Killing The Legacy Consulting Process At Agencies

Why Your Security Analysis Metrics And KPIs Are Wrong

3 Ways To Use Data Analysis Tools – Without Big Data IT

How To Dominate And Defend Your Federal Agency’s Operations

6 Agency Functions That Deserve Process Improvement Projects

Winning Strategies For Disadvantaged Defense Agency Leaders

The Secret To Superior Security Analysis: Micro-Weight Tools

The Art Of Superior Strategy For Security Agency Operations

9 Risk-Free Ways To Enhance And Enrich Your Risk Analysis

Why Organizational Security Requires Continuous Improvement

How To Use Value Stream Mapping To Address Insider Threats

7 Criteria For Hiring A Professional Services Firm

Hypothesis Testing Do’s And Don’ts For Your Federal Agency

Avoid These 3 Mistakes When Outsourcing Process Improvement

MVPs: Decision-Making Tools That Deploy In Days, Not Decades

5 Tips To Get To The Root Of Your Root-Cause Analysis

Why End-To-End Insider Threat Detection Is Your Only Option