insights.jpg
Jun
07
2017

Security Investigations: A Vision for the Future

By Dan Jodarski

Our security clearance processes strongly influence the state of national security. Strong processes require that clearance operations produce quality determinations (efficacy) in a timely manner (efficiency). Without an effective process, malicious individuals may access and misuse classified information. Without an efficient process, qualified personnel are unable to contribute to increasingly critical defense and intelligence missions. The clearance process of the future must meet both requirements to adequately address the challenge of enabling a trusted workforce while still protecting the privacy, civil liberties, and whistleblower protections of all personnel.

Read More
Apr
26
2017

Wipe the Dirt off Your Data

By April Resnick


In the last decade the words “big data” have revolutionized the way organizations, in all industries, make decisions. With huge amounts of data available, both corporations and federal agencies have actively focused on exploiting data in order to be better equipped.

As a result, data has become a key driver in decision-making processes. Therefore, now more than ever organizations must ensure the integrity and quality of their data. Remembering that “good” data leads to good decision-making and bad or “dirty” data leads to bad decision-making. (Dirty data consists of inaccurate, incomplete or erroneous data).

Read More
Feb
01
2017

8 Steps to a Leaner Personnel Security Clearance Adjudication Process

By Dan Jodarski

Adjudicative processes generally don't win prizes for efficiency. From the OPM breach to ever-rising case backlogs, the outlook for personell security seems bleak. But it doesn't have to be. 

Leaders in personnel security have the power to improve the adjudicative process. Read on for 8 simple steps to establish an efficiently running operation:

Read More
Jan
11
2017

Use This New Lean Maturity Model to Assess and Standardize Your Clearance Process

By Diem Vo

In my recent work with federal defense and security clients at Big Sky, I realized the need for a standard maturity model to use as a baseline for understanding the current state of a personnel security process and to set goals for improving it.

Our experts have deep subject matter expertise in both operations improvement and federal personnel security processes -- so drawing on the collective knowledge, experience and wisdom of the team, I'm happy to share with you what we came up with:

Read More
Nov
16
2016

The Top 4 Mistakes Security Executives Make (And How to Fix Them)

By Violet Lynch

Security programs are notoriously difficult to evaluate for effectiveness. Unless you’ve just had a major breach or experienced a significant threat, it can be nearly impossible to identify weak spots and vulnerabilities. Many executives are left wondering: are our policies and procedures actually working, or have we just been lucky enough not to experience a breach?

Read More