Mike Miller, Tanager’s Chief Operating Officer (COO) and Vice President of DOD/IC Programs, has been selected to serve on the Board of Directors as Co-Chair for the newly formed National Insider Threat Special Interest Group (NITSIG). The NITSIG is being created to assist U.S. Government agencies and businesses with Insider Threat Risk Mitigation.
Since 2010 Mr. Miller has implemented insider threat IT solutions, performed data analysis and performed program management for insider threat programs within the IC and DOD. Mike has implemented programs from the infinite stage through full implementation, working all facets of the insider threat program. Mike has deployed user activity monitoring (UAM) solutions, developed concept of operations (CONOPS) and standard operating procedures (SOPs, certifications and accreditation and consulted in general counsel issues related to privacy. Mike contributes to Insider Threat working groups (ITWG), advisory services to the National Insider Threat Task Force (NITTF) and other organizations and agencies tasked with implementing Insider Threat Programs. Mike is responsible for successfully expanding Tanager’s insider threat presence into the Intelligence Community (IC), Federal Civilian (FedCiv) agencies and the Department of Defense (DOD).
About the National Insider Threat Special Interest Group
The National Insider Threat Special Interest Group (NITSIG) announced its creation and mission statement today. The NITSIG mission is to provide awareness, training, assistant and support to individuals working for the U.S. Government (USG), DoD, IC Agencies, Defense Industrial Base (DIB) contractors and businesses for the purposes of insider threat risk mitigation.
The NITSIG was created in the wake of the recent data breaches affecting the USG (WikiLeaks, NSA Breach), and the continued damaging and costly insider threat incidents to businesses. Throughout the U.S. Federal Government (including DoD and IC Agencies), the DIB and businesses, there is a growing demand for individuals to manage or support Insider Threat Programs. The NITSIG will provide individuals working for government and businesses with a central source for insider threat awareness training, insider threat program development and insider threat mitigation strategies.
The Goals Of The NITSIG Are To:
- Provide FREE Security, Education, Training and Awareness (SETA) to individuals (NITSIG Members) on: insider threat risks, insider threat detection, insider threat risk mitigation strategies and insider threat program development, implementation and management, based on Executive Order 13587, National Insider Threat Policy, NISPOM Conforming Change 2-Insider Threat (Draft).
- Provide NITSIG Members with access to a broad network of security professionals to collaborate with on insider threat risks, insider threat detection, insider threat risk mitigation strategies and insider threat program development, implementation and management.
- Provide NITSIG Members with access to Insider Threat Subject Matter Experts who have developed, managed or supported Insider Threat Programs, or who provide Insider Threat Program Training.
- Provide NITSIG Members with visibility into companies that have proven technologies and services for insider threat detection, insider threat user activity monitoring tools, insider threat program management services, insider threat program training services, insider threat investigation services, data loss prevention tools, data breach discovery services, etc.
Tanager Inc., a leading woman owned small business in U.S. Government insider threat program execution, offers Managed Threat Mitigation Services providing businesses in the Defense Industrial Base and related markets with a turn-key solution for robust insider threat audit and inquiry. Tanager implements tools and analysis techniques drawn straight from our extensive experience in federal government insider threat programs. Our customers can have confidence that their insider threat protections utilize the same technologies and techniques in use throughout government today, without the high cost of designing, implementing, licensing, and staffing “yet another” new IT or security project from within the organization. For more information, contact our Threat Mitigation team by emailing firstname.lastname@example.org