top of page

Content Access

Provide your name and email to access expert insights about federal initiatives regarding the expansion of Trusted Workforce 2.0 to larger employee & contractor populations, and how this expansion is affecting critical continuous evaluation protocols within organizations of all sizes.

White Paper Excerpts

"...If an employee with a security clearance defaults on a loan, gets a D.U.I, or is flagged for suspicious tax filing, their organization should know immediately. Not all individuals are required by internal policy to inform their employer of justice involvement, and many employers cannot see that information until the employee is convicted. Weeks or even months could pass before an employer becomes aware, during which time the employee could jeopardize workplace safety and organizational national security.  This risk becomes exasperated when the employee is required but chooses not to self-report. 

Organizations need to detect abnormal behaviors to recognize early indications of a struggling employee so resources can be deployed to assist the person in need. Continuous vetting is critical to build and maintain a trusted workforce.”

"Insider risk is one of the most underestimated sources of cyberattacksAccording to Cybersecurity Ventures, cyberattacks across all industries are on the rise, with costs related to cybercrime estimated to reach $10.5 trillion per year by 2025. Insider threats are one of the main reasons for data record breaches, which are growing at almost 200% per year.


Michael C. Casey, director of the National Counterintelligence and Security Center, said at the CNBC CEO Council Summit on June 4, 2024, that he is “stunned by the number of companies that have no concept of their insider threat.”

"Hostile governments are doing everything they can to convince company insiders to give up American secrets, from industry, to military, to government. While American companies routinely spend billions to stop foreign hackers with increased cyber tools, comparatively little has been done to address the growing risk of organizational personnel, contractors, and other aspects of the human side of supply chain, especially remote workers. It is time for organizations to better appreciate and address the challenge of insider threats head on.”

bottom of page