SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
For Immediate Release
Tuesday, December 13, 2011
Contact: Karen Nussle, 202-449-8656, knussle@insaonline.org

          INSA: Government can save millions by reforming Security Policy
   New INSA white paper makes recommendations to improve efficiencies and save taxpayer money

ARLINGTON, VA – Given the current economic environment and demands to minimize government
spending, improvements in government efficiency, particularly in the area of national security, are
critical. To address these needs, the Intelligence and National Security Alliance (INSA) Security
Clearance Reform Task Force today released a white paper entitled “Next Steps for Security Reform:
Industry Proposals to Enhance Efficiency and Reduce Costs in National Security Contracts.” It
addresses the costly delays related to security clearances and recommends actions which could save
hundreds of millions in taxpayer dollars.

When asked about the driving philosophy behind the development of the Task Force and paper, Charlie
Allen, the Chair of the INSA Security Clearance Task Force and former Undersecretary of Homeland
Security for Intelligence Analysis, commented, “The members all share the same belief that these
inefficiencies can be greatly reduced. By taking action now we can conserve our resources and ensure
our capacity for critical national security activities in the future.”

According to conservative estimates, 10 to 20 percent of contractors, paid for by the government, may
not be on the job because of delays caused by security clearance issues. This results in lost man-hours
and a waste of scarce taxpayer dollars; modest improvements could save hundreds of millions of dollars
each year. The Task Force reached a consensus on six critical overarching ways to promote efficiency
and improve security practices at reduced costs, while allowing government and industry to work
together. They are:

      Track contractor security costs, including high level clearances and secure facility usage, and for
       the timeliness of policy implementation and reinvestigations
      Provide contracting officials with improved security guidelines
      Implement flexible approaches for cleared contractors to access sensitive information in the
       short-term
      Support industry security structures that permit the anticipation of government needs, and
       development of solutions and innovations
      Promote a level playing field across industry for large and small companies
      Apply security policies clearly and consistently across agencies and companies

The Task Force’s specific recommendations stem from the six points outlined above with the goal of
helping government to maximize national security programs and minimize costs to U.S. taxpayers. The
recommendations include:

      Align contracting and security clearance processes to reduce costs for industry and government
      Ensure clearance portability
      Follow suitability and investigative standards

                                                                                                         1
INSA  901 N. Stuart St., Suite 205, Arlington, VA 22203  Phone (703)224-4672  www.insaonline.org
   Spin off a low-side version of Scattered Castles, the Intelligence Community’s (IC) database for
        all security and access information
       Invest in personnel security automation that is reliable and cost efficient
       Encourage conversations across programs and contracts, and temporary storage in secure
        facilities.

Ellen McCarthy, President of INSA, commented, “We have worked over the past several years to ensure
that government continues to have a trusted contractor workforce that can accomplish more but cost
less. We hope to create a space that allows conversations across programs and contracts while aligning
security and contracting processes to ensure an effective and efficient national security clearance
process.”

This white paper seeks to energize the dialogue on security policy and the reforms needed to achieve a
streamlined, cost effective process that enables more efficient collaboration between the government
and industry contractors. Over the coming months, the INSA Security Clearance Reform Task Force
members will work to forge a public-private partnership with the DNI, government agency leaders and
interested Congressional staff to discuss security reform issues. This group will discuss ideas and
solutions for reforming the security clearance process and work to develop concepts for collecting data
on contractor security related costs.

The INSA security policy reform white paper, “Next Steps for Security Reform: Industry Proposals to
Enhance Efficiency and Reduce Costs in National Security Contracts” is being released in conjunction
with today's Government Executive event, “Next Steps for Security Reform.” This discussion will feature
Charlie Allen and John Fitzpatrick, Director of the National Archives’ Information Security Oversight
Office, who will address security clearance reform issues. Timothy Clark, Government Executive’s Editor
at Large, will moderate. For more information on the white paper or the briefing, please visit on the
white paper or the briefing, please visit www.insaonline.org.

                                                   ###
About INSA
The Intelligence and National Security Alliance (INSA) is the premier intelligence and national security
organization that brings together the public, private and academic sectors to collaborate on the most
challenging policy issues and solutions. As a non-profit, non-partisan, public-private organization, INSA’s
ultimate goal is to promote and recognize the highest standards within the national security and
intelligence communities. INSA has over 150 corporate members and several hundred individual
members who are leaders and senior executives throughout government, the private sector and
academia. To learn more about INSA visit www.insaonline.org.

About the Security Clearance Reform Task Force

The Security Clearance Reform Task Force was formed in 2010 by INSA Senior Intelligence Advisor
Charlie Allen in order to support the reform effort and improve efficiency in the clearance process. The
group meets with private sector partners, government workforce planners, security officers and other
notable experts to gain a complete picture of the security clearance process and offer concise,
executable recommendations for meeting the goals laid out in 2004 IRTPA and, more importantly,
sustaining them.

                                                                                                           2
INSA  901 N. Stuart St., Suite 205, Arlington, VA 22203  Phone (703)224-4672  www.insaonline.org

Weitere ähnliche Inhalte

Was ist angesagt?

JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016Jon Neiditz
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsBrunswick Group
 
Lexis Securities Mosaic - Cybersecurity
Lexis Securities Mosaic - CybersecurityLexis Securities Mosaic - Cybersecurity
Lexis Securities Mosaic - CybersecurityLexisNexis
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3"Apolonio \"Apps\"" Garcia
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsBrian Rushton-Phillips
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) Evolver Inc.
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0theonassiokas
 
12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC SummitTripwire
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...Sonia Usih, PMP, MCPM, BSc.
 

Was ist angesagt? (20)

JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
 
Pdf lachow anu
Pdf lachow anuPdf lachow anu
Pdf lachow anu
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
Lexis Securities Mosaic - Cybersecurity
Lexis Securities Mosaic - CybersecurityLexis Securities Mosaic - Cybersecurity
Lexis Securities Mosaic - Cybersecurity
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0
 
12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 

Ähnlich wie Government can save millions by reforming Security Policy

Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docxRunning head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docxglendar3
 
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docxRunning head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docxtodd581
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimonyRob Arnold
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...at MicroFocus Italy ❖✔
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
American Security Policy
American Security PolicyAmerican Security Policy
American Security PolicyCecilia Lucero
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfserve&solve
 
AMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAndrei Stewart
 
ESC02_GualterWilkins_2015
ESC02_GualterWilkins_2015ESC02_GualterWilkins_2015
ESC02_GualterWilkins_2015Todd Wilkins
 
Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learningaccystanley
 

Ähnlich wie Government can save millions by reforming Security Policy (20)

Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docxRunning head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
 
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docxRunning head NATIONAL INFRASTRUCTURE PROTECTION PLAN             .docx
Running head NATIONAL INFRASTRUCTURE PROTECTION PLAN .docx
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimony
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
American Security Policy
American Security PolicyAmerican Security Policy
American Security Policy
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
 
AMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAMSJ-GSI-Summer Feature
AMSJ-GSI-Summer Feature
 
ESC02_GualterWilkins_2015
ESC02_GualterWilkins_2015ESC02_GualterWilkins_2015
ESC02_GualterWilkins_2015
 
Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learning
 
2004-cost-report
2004-cost-report2004-cost-report
2004-cost-report
 

Mehr von Valdes Nzalli

Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseValdes Nzalli
 
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Valdes Nzalli
 
Etude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueEtude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueValdes Nzalli
 
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMInternet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMValdes Nzalli
 
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Valdes Nzalli
 
Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes Nzalli
 
Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes Nzalli
 
Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Valdes Nzalli
 
Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Valdes Nzalli
 
Logiciels libres cameroun m1
Logiciels libres cameroun m1Logiciels libres cameroun m1
Logiciels libres cameroun m1Valdes Nzalli
 
Presentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargPresentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargValdes Nzalli
 

Mehr von Valdes Nzalli (12)

#OpenData DevFest18
#OpenData DevFest18#OpenData DevFest18
#OpenData DevFest18
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
 
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
 
Etude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueEtude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en Afrique
 
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMInternet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
 
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
 
Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012
 
Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012
 
Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5
 
Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011
 
Logiciels libres cameroun m1
Logiciels libres cameroun m1Logiciels libres cameroun m1
Logiciels libres cameroun m1
 
Presentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargPresentation communaute (Cahier de Charg
Presentation communaute (Cahier de Charg
 

Kürzlich hochgeladen

5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life
5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life
5 Moments of Everyday Self-Loathing That Perfectly Describe Your LifeSalty Vixen Stories & More
 
Young adult book quiz by SJU quizzers.ppt
Young adult book quiz by SJU quizzers.pptYoung adult book quiz by SJU quizzers.ppt
Young adult book quiz by SJU quizzers.pptSJU Quizzers
 
Inside Look: Brooke Monk's Exclusive OnlyFans Content Production
Inside Look: Brooke Monk's Exclusive OnlyFans Content ProductionInside Look: Brooke Monk's Exclusive OnlyFans Content Production
Inside Look: Brooke Monk's Exclusive OnlyFans Content Productionget joys
 
Carowinds 2024: Thrills, Spills & Surprises
Carowinds 2024: Thrills, Spills & SurprisesCarowinds 2024: Thrills, Spills & Surprises
Carowinds 2024: Thrills, Spills & Surprisescarawinds99
 
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ..."Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...RAGHURAMYC
 
Holi:: "The Festival of Colors in India"
Holi:: "The Festival of Colors in India"Holi:: "The Festival of Colors in India"
Holi:: "The Festival of Colors in India"IdolsArts
 
Taylor Swift quiz( with answers) by SJU quizzers
Taylor Swift quiz( with answers) by SJU quizzersTaylor Swift quiz( with answers) by SJU quizzers
Taylor Swift quiz( with answers) by SJU quizzersSJU Quizzers
 

Kürzlich hochgeladen (7)

5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life
5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life
5 Moments of Everyday Self-Loathing That Perfectly Describe Your Life
 
Young adult book quiz by SJU quizzers.ppt
Young adult book quiz by SJU quizzers.pptYoung adult book quiz by SJU quizzers.ppt
Young adult book quiz by SJU quizzers.ppt
 
Inside Look: Brooke Monk's Exclusive OnlyFans Content Production
Inside Look: Brooke Monk's Exclusive OnlyFans Content ProductionInside Look: Brooke Monk's Exclusive OnlyFans Content Production
Inside Look: Brooke Monk's Exclusive OnlyFans Content Production
 
Carowinds 2024: Thrills, Spills & Surprises
Carowinds 2024: Thrills, Spills & SurprisesCarowinds 2024: Thrills, Spills & Surprises
Carowinds 2024: Thrills, Spills & Surprises
 
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ..."Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...
"Quest for Knowledge: An Exciting Journey Through 40 Brain-Bending Questions ...
 
Holi:: "The Festival of Colors in India"
Holi:: "The Festival of Colors in India"Holi:: "The Festival of Colors in India"
Holi:: "The Festival of Colors in India"
 
Taylor Swift quiz( with answers) by SJU quizzers
Taylor Swift quiz( with answers) by SJU quizzersTaylor Swift quiz( with answers) by SJU quizzers
Taylor Swift quiz( with answers) by SJU quizzers
 

Government can save millions by reforming Security Policy

  • 1. For Immediate Release Tuesday, December 13, 2011 Contact: Karen Nussle, 202-449-8656, knussle@insaonline.org INSA: Government can save millions by reforming Security Policy New INSA white paper makes recommendations to improve efficiencies and save taxpayer money ARLINGTON, VA – Given the current economic environment and demands to minimize government spending, improvements in government efficiency, particularly in the area of national security, are critical. To address these needs, the Intelligence and National Security Alliance (INSA) Security Clearance Reform Task Force today released a white paper entitled “Next Steps for Security Reform: Industry Proposals to Enhance Efficiency and Reduce Costs in National Security Contracts.” It addresses the costly delays related to security clearances and recommends actions which could save hundreds of millions in taxpayer dollars. When asked about the driving philosophy behind the development of the Task Force and paper, Charlie Allen, the Chair of the INSA Security Clearance Task Force and former Undersecretary of Homeland Security for Intelligence Analysis, commented, “The members all share the same belief that these inefficiencies can be greatly reduced. By taking action now we can conserve our resources and ensure our capacity for critical national security activities in the future.” According to conservative estimates, 10 to 20 percent of contractors, paid for by the government, may not be on the job because of delays caused by security clearance issues. This results in lost man-hours and a waste of scarce taxpayer dollars; modest improvements could save hundreds of millions of dollars each year. The Task Force reached a consensus on six critical overarching ways to promote efficiency and improve security practices at reduced costs, while allowing government and industry to work together. They are:  Track contractor security costs, including high level clearances and secure facility usage, and for the timeliness of policy implementation and reinvestigations  Provide contracting officials with improved security guidelines  Implement flexible approaches for cleared contractors to access sensitive information in the short-term  Support industry security structures that permit the anticipation of government needs, and development of solutions and innovations  Promote a level playing field across industry for large and small companies  Apply security policies clearly and consistently across agencies and companies The Task Force’s specific recommendations stem from the six points outlined above with the goal of helping government to maximize national security programs and minimize costs to U.S. taxpayers. The recommendations include:  Align contracting and security clearance processes to reduce costs for industry and government  Ensure clearance portability  Follow suitability and investigative standards 1 INSA  901 N. Stuart St., Suite 205, Arlington, VA 22203  Phone (703)224-4672  www.insaonline.org
  • 2. Spin off a low-side version of Scattered Castles, the Intelligence Community’s (IC) database for all security and access information  Invest in personnel security automation that is reliable and cost efficient  Encourage conversations across programs and contracts, and temporary storage in secure facilities. Ellen McCarthy, President of INSA, commented, “We have worked over the past several years to ensure that government continues to have a trusted contractor workforce that can accomplish more but cost less. We hope to create a space that allows conversations across programs and contracts while aligning security and contracting processes to ensure an effective and efficient national security clearance process.” This white paper seeks to energize the dialogue on security policy and the reforms needed to achieve a streamlined, cost effective process that enables more efficient collaboration between the government and industry contractors. Over the coming months, the INSA Security Clearance Reform Task Force members will work to forge a public-private partnership with the DNI, government agency leaders and interested Congressional staff to discuss security reform issues. This group will discuss ideas and solutions for reforming the security clearance process and work to develop concepts for collecting data on contractor security related costs. The INSA security policy reform white paper, “Next Steps for Security Reform: Industry Proposals to Enhance Efficiency and Reduce Costs in National Security Contracts” is being released in conjunction with today's Government Executive event, “Next Steps for Security Reform.” This discussion will feature Charlie Allen and John Fitzpatrick, Director of the National Archives’ Information Security Oversight Office, who will address security clearance reform issues. Timothy Clark, Government Executive’s Editor at Large, will moderate. For more information on the white paper or the briefing, please visit on the white paper or the briefing, please visit www.insaonline.org. ### About INSA The Intelligence and National Security Alliance (INSA) is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions. As a non-profit, non-partisan, public-private organization, INSA’s ultimate goal is to promote and recognize the highest standards within the national security and intelligence communities. INSA has over 150 corporate members and several hundred individual members who are leaders and senior executives throughout government, the private sector and academia. To learn more about INSA visit www.insaonline.org. About the Security Clearance Reform Task Force The Security Clearance Reform Task Force was formed in 2010 by INSA Senior Intelligence Advisor Charlie Allen in order to support the reform effort and improve efficiency in the clearance process. The group meets with private sector partners, government workforce planners, security officers and other notable experts to gain a complete picture of the security clearance process and offer concise, executable recommendations for meeting the goals laid out in 2004 IRTPA and, more importantly, sustaining them. 2 INSA  901 N. Stuart St., Suite 205, Arlington, VA 22203  Phone (703)224-4672  www.insaonline.org