Thought Leadership

White Papers

INSA Paper Examines Impediments to Security Reciprocity, Offers 14 Policy and Process Improvements

INSA Paper Examines Impediments to Security Reciprocity, Offers 14 Policy and Process Improvements

Delays caused by inefficiencies in security clearance reciprocity result in the estimated loss of 1,000 contractor-labor years at a cost of approximately $2B to the IC & upwards of $8B to the Federal Government. The latest white paper by INSA's Security Policy Reform Council offers steps to improve policy & processes.

Race to 5G Puts U.S. Economic and National Security at Risk, According to New INSA White Paper

Race to 5G Puts U.S. Economic and National Security at Risk, According to New INSA White Paper

In the global race to 5G, it is imperative that U.S. policymakers, wireless carriers, and technology leaders work together to ensure U.S. economic and national security, according to INSA Cyber Council's new white paper.

New INSA Report Examines Use of Publicly Available Electronic Information for Security Determinations, Insider Threat

New INSA Report Examines Use of Publicly Available Electronic Information for Security Determinations, Insider Threat

INSA's Insider Threat Subcommittee has released this report that provides recommendations on how the Director of National Intelligence can work with the Defense Department in order to effectively leverage publicly available electronic information for security clearances and to mitigate insider threats.

Managing a Cyber Attack on Critical Infrastructure: Challenges of Federal, State, Local, and Private Sector Collaboration

Managing a Cyber Attack on Critical Infrastructure: Challenges of Federal, State, Local, and Private Sector Collaboration

This after-action report from an INSA tabletop exercise examines the effectiveness of mechanisms to respond to and recover from a cyber attack on multiple critical infrastructure sectors. Discover the report's findings and recommendations by clicking the button below.

An Assessment of Data Analytics Techniques for Insider Threat Programs

An Assessment of Data Analytics Techniques for Insider Threat Programs

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats – trusted employees who seek to steal an organization’s data or intellectual property or to harm an organization or its staff. Determining which data analytics methods and software tools are bes ...

 

Op-Eds

Charlie Allen Op-ed Addresses "Culture of Leaking"

Charlie Allen Op-ed Addresses "Culture of Leaking"

"The American public has grown increasingly accustomed to the revelation of national security secrets, and leakers are lauded as heroes exposing government abuses," writes INSA senior intelligence adviser Charlie Allen. "In doing so, society marginalizes the detrimental impact to national security."

In FedScoop, Charlie Allen Warns of Counterintelligence Risks from OPM Breach

In FedScoop, Charlie Allen Warns of Counterintelligence Risks from OPM Breach

"The data breach of the Office of Personnel Management could affect more than 20 million Americans. Yet the true magnitude of this breach lies in the seemingly infinite ways it has compromised our national security," says Security Policy Reform Council Chair Charlie Allen in a July 2015 op-ed for FedScoop.

 

Close
Close

Please enter your username or email address. You will receive a link to create a new password via email.

Close

Close