By Dan Jodarski
Our security clearance processes strongly influence the state of national security. Strong processes require that clearance operations produce quality determinations (efficacy) in a timely manner (efficiency). Without an effective process, malicious individuals may access and misuse classified information. Without an efficient process, qualified personnel are unable to contribute to increasingly critical defense and intelligence missions. The clearance process of the future must meet both requirements to adequately address the challenge of enabling a trusted workforce while still protecting the privacy, civil liberties, and whistleblower protections of all personnel.
By April Resnick
In the last decade the words “big data” have revolutionized the way organizations, in all industries, make decisions. With huge amounts of data available, both corporations and federal agencies have actively focused on exploiting data in order to be better equipped.
As a result, data has become a key driver in decision-making processes. Therefore, now more than ever organizations must ensure the integrity and quality of their data. Remembering that “good” data leads to good decision-making and bad or “dirty” data leads to bad decision-making. (Dirty data consists of inaccurate, incomplete or erroneous data).
By Dan Jodarski
Adjudicative processes generally don't win prizes for efficiency. From the OPM breach to ever-rising case backlogs, the outlook for personell security seems bleak. But it doesn't have to be.
Leaders in personnel security have the power to improve the adjudicative process. Read on for 8 simple steps to establish an efficiently running operation:
By Diem Vo
In my recent work with federal defense and security clients at Big Sky, I realized the need for a standard maturity model to use as a baseline for understanding the current state of a personnel security process and to set goals for improving it.
Our experts have deep subject matter expertise in both operations improvement and federal personnel security processes -- so drawing on the collective knowledge, experience and wisdom of the team, I'm happy to share with you what we came up with:
By Violet Lynch
Security programs are notoriously difficult to evaluate for effectiveness. Unless you’ve just had a major breach or experienced a significant threat, it can be nearly impossible to identify weak spots and vulnerabilities. Many executives are left wondering: are our policies and procedures actually working, or have we just been lucky enough not to experience a breach?