Your Cart is Empty
Add description, images, menus and links to your mega menu
A column with no settings can be used as a spacer
Link to your collections, sales and even external links
Add up to five columns
Add description, images, menus and links to your mega menu
A column with no settings can be used as a spacer
Link to your collections, sales and even external links
Add up to five columns
July 10, 2023 3 min read
One of the biggest challenges facing any organization today – regardless of industry, size or sector – is combatting the growing threats from the inside. A strict requirement for federal contractors - including DoD contractors - is developing and implementing a comprehensive insider threat program.
Per the Center for Development of Security Excellence, the premier provider of security education and training for the DoD and industry under the National Industrial Security Program (NISP), “Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security.”
Reporting Requirements
Per the DoD ISL 2016-02, NISPOM 1-202 requires the contractor to establish and maintain an insider threat program that will gather, integrate, and report relevant and available information indicative of a potential or actual insider threat.
Additionally, per NIST SP 800-53, rev. 5, PM-12, organizations are to “Implement an insider threat program that includes a cross-discipline insider threat incident handling team.” Additionally, “Organizations that handle classified information are required, under Executive Order 13587 [EO 13587] and the National Insider Threat Policy [ODNI NITP], to establish insider threat programs.”
And per Executive Order 13587, organizations are to “...implement an insider threat detection and prevention program consistent with guidance and standards developed by the Insider Threat Task Force established in section 6 of this order…”.
Key Elements of a Successful Insider Threat Program
How to Get Started
Start by downloading our world-class NIST RMF Security and Privacy Policies and Procedures templates at the Arlington Security Portal (ASP), which includes access to our Insider Threat Toolkits for both DoD & cleared contractors and non-DoD contractors. All of our documents are developed in accordance with NIST SP 800-53 control families, along with other supporting publications and guidelines within the broader federal agency apparatus.
How Arlington Can Help
We have years of experience working within the broader federal agency apparatus in helping federal contractors develop high-quality, well-written, policies and procedures and additional NIST RMF information security and privacy materials. Our NIST RMF information security and privacy policies, procedures, programs, and plans have been used by thousands of federal contractors in helping organizations develop customized documentation for their growing security and compliance needs.
About Arlington
We are Arlington, a team of innovative, solution-oriented, highly agile, and well-versed professionals with decades of experience in working with America’s defense industry. From emerging cybersecurity regulations to helping our clients solve complex security & compliance solutions – and so much more – you can trust Arlington, the firm that’s Dedicated to Defense®. Learn more at arlingtonintel.com.