Firewatch
Threat Solutions


Protect your organization from the inside out. Firewatch Threat Solutions provides trusted Insider Threat analysis and program support to U.S. government agencies and contractors. We leverage decades of federal security experience to deter, detect, and mitigate insider risks before they become incidents.



About Us

Intelligence Enabled,
Insider Risk Focused

Firewatch Threat Solutions is a mission-driven cybersecurity firm dedicated to safeguarding organizations from the growing risks of insider threats and cyber vulnerabilities. We specialize in insider threat detection, prevention, and mitigation. Our team consists of seasoned professionals with a range of certifications including CISSP, CEH, CCTIP-A & -F among others. We have extensive backgrounds in cybersecurity operations, risk assessment, and intelligence analysis; all to ensure that our clients receive the highest level of expertise, reliability, and strategic insight.Founded by Army veterans, our company is built on the same principles of vigilance, discipline, and unwavering attention to detail that define military and civil service. The name "Firewatch" comes from the overnight guard duty assignment in the Army, where soldiers patrol the barracks to prevent security incidents. Just as a firewatch requires constant awareness and proactive protection, our approach to cybersecurity ensures that threats are identified and mitigated before they can cause harm.We leverage this expertise to provide tailored solutions that address the unique threat landscapes of our clients, ensuring federal compliance along the way. Firewatch Threat Solutions is a small business specializing in Insider Threat Program support and analysis for government clients. Our mission is to help federal agencies and contractors safeguard sensitive information and personnel by identifying and neutralizing insider risks before harm occurs.


Core Services

User Activity Monitoring (UAM)

User Activity Monitoring allows for reliable detection of threats to your organization. Mandated by Executive Order 13587 for government organizations, our analyst can take their expertise to ensure your organization is fully compliant

User and Entity Behavioral Analytics (UEBA)

Save thousands of analyst hours by integrating Machine Learning algorithms to normalize user activity and triaging the most anomalous activity for priority review,
Saving both your data and budget.

Threat Intelligence

Integrating the most recent intelligence to ensure your detection and prevention incorporates the latest threats for your peace of mind

Program Development

Firewatch staff have a weallth of experience in bringing agency InT & InR programs from pre-program establishment to Full Operating Capacity (FOC) as defined by NITTF

Risk Assessments & Analytics

Do you have exploitable gaps in your Information Systems? We can provide assessments in support of policy and ruleset ("Trigger") development based upon open-source resources and best practices through our engineering team to ensure you are monitoring effectively while minimizing noise and false-positives.

Training & Workforce Awareness

We leverage real-world examples and translate the deluge of requirements and regulations into digestible statistics and actionable steps for your employees to ensure "left of boom" reporting


Firewatch Guide to Compliance

We ensure our solutions are up-to-date with all applicable regulatory standards, and informed by the industry's best practices. Firewatch is the most effective and efficient source for integrating these resources into your organization. This includes, but is not limited to:


Procurement ready & eager to suppport!

SDVOB PENDING
UEI: CBPQNEMTYE33
DUNS: 118481435
CAGE: 10B29

Have a RFI or RFP? Contact us:

Firewatch Guide to Compliance
Public Best Practice Guides

CDSE Insider Threat Job Aids
NITTF Insider Threat Guide, 2017
NITTF Insider Threat Guide to accompany Minimum Standards, 2024
NITTF Maturity Framework, 2018
CERT Common Sense Guide to Mitigating Insider Threats, 7th Edition
CISA Insider Threat Mitigation Guide, 2020
NCSC Government Best Practice Guide, 2024
GAO Insider Threat Study on Information Sharing
DCSA Assessment Guide
DSS Assessment Manual

Firewatch Guide to Compliance
Public Education Resources & Certifications

Insider Threat Awareness, CDSE
Insider Threat Curricula and Toolkit, CDSE
Insider Threat Video for Senior Leaders, CDSE
Certified Counter-Insider Threat Professional (CCITP) Program, OUSD I&S Certifications for Fundamentals and Analysis
Insider Threat Analyst Course, Carnegie Mellon Software Engineering Institute (CM-SEI)
Insider Threat Program Manager (ITPM) Certificate, CM-SEI
CERT Insider Risk Management Measures of Effectiveness Certificate, CM-SEI

Firewatch Guide to Compliance
Regulations, References, and Requirements

Insider Threat GovernanceE.O. 13587 Established National Insider Threat Program & NITTF
CNSSD 504 Established requirements for these programs
National Insider Threat Policy & Minimum Standards, Presidential memorandum addressing these standards
DoDD 5205.16 Established Requirements of Insider Threat Programs
ICD 750, Established separate CI and InT Programs for the IC
DODI 5240.26 Established an InT/CI Working Group
DODI 5205.83 Established DITMAC
National Defense Authorization Act for F.Y. 2018 Strengthened Insider Threat Programs and Continuous Vetting Capabilities
National Defense Authorization Act for F.Y. 2017 §951 Established DoD Enhanced Security Program (DESP)
National Defense Authorization Act for F.Y. 2016 §1086 Reformed and Improved Personnel Security, Insider Threat Detection and Prevention, and Physical Security
National Industrial Security Program Operating Manual (NISPOM) 32 CFR Part 117 sets requirements for industry insider threat programs
User Protections & RightsPrivacy Act of 1974, 5 U.S.C. §552a Established SORN and PIA requirements
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Public Law 104–191 set standards for protecting health information
Whistleblower Protection Act of 1989, Public Law 101–12 addressed federal employee whistleblower protections
Whistleblower Protection Enhancement Act of 2012
DODD 7050.06 Military Whistleblower Protection (Military Whistleblower Act of 1988)
Intelligence Community Whistleblower Protection Act of 1998Title VII of Pub. L. 105–272, allows IC employees to report urgent concerns to Congress
DODI 1325.06 Handling Protest, Extremist, and Criminal Gang Activities Among Members of the Armed Forces
DODR 5400.11-R Department of Defense Privacy Program
DODR 6025.18-R DoD Health Information Privacy Regulation
DoD Insider Threat “Prevention, Assistance, and Response” (PAR) Program DITMAC-hosted workplace violence prevention and threat management initiative
Data & Personnel Security ProtectionsITAR – 22 CFR Parts 120-130 Prohibits foreign export of weapons technologies, relevant to UAM
NIST 800.53 Privacy and Security Controls
E.O.13526 Addresses Classified National Security Information
E.O. 13556 Controlled Unclassified Information
E.O. 12829 Established the National Industrial Security Program & requires government contractors establish internal InT Programs
FOIA/DoDD 5400.07, DoD Freedom of Information Act Program
E.O. 12968 Set uniform criteria for granting and maintaining security clearances
E.O. 13467 Reforms Processes Related to Suitability
SEAD-6 Continuous Evaluation
ICD 700 Protection of National Intelligence
ICD 701 Unauthorized Disclosures
FISMA Act of 2014 Public Law 113–283, federal information security management
OMB Circular A-130 Manages Information as a Strategic Resource
NIST Cybersecurity Framework Framework for Improving Critical Infrastructure Cybersecurity
NIST S.P. 800-37 Risk Management Framework
NIST Special Publication 800-61 Computer Security Incident Handling Guide
Reporting RequirementsDITMAC Reporting Thresholds
DODD 5240.06 Addresses Counterintelligence Awareness and Reporting
SEAD 3 Addresses Reporting Requirements for Personnel With Access to Classified Information
SEAD-4 National Security Adjudicative Guidelines
Intelligence Authorization Act for FY 1995 (Section 811) –Established requirements for notification to the FBI

Firewatch Guide to Compliance
Regulations, References, and Requirements

DHS Instruction 262-05-002 PIA for the Information Sharing and Safeguarding: Insider Threat Program
DOE Order 470.5 Establishes DOE Insider Threat Program to include national labs
Department of Justice Order 0901 (2014) DOJ Insider Threat Prevention and Detection Program – Establishes DOJ’s Insider Threat program
Department of Homeland Security Directive 262-05Expands DHS insider threat program beyond classified networks to encompass all employees (cleared or not) with access to DHS information
Department of the Treasury Order 105-20 Established the Treasury's Insider Threat Program and creates an advisory board
Department of State – The Foreign Affairs Manual (12 FAM 500) Section 513.4-4 specifically addresses insider threat program requirements (e.g. training, monitoring, and reporting of anomalies) for State Department personnel. Listed under 12 FAM 513.4-4 Insider Threat Program
Army Regulation 381-12 (2016) Threat Awareness and Reporting Program (TARP) – Acts as an InT Reporting Mechanism requiring soldiers and Army civilians to report insider threat indicators to Army Counterintelligence.
SECNAV Instruction 5510.37 Established the Navy Insider Threat Hub, governance structure, and procedures for monitoring, analysis, and response to insider risks across the Navy and Marine Corps.

Schedule a meeting:

Send a message:


© All rights reserved. This website is for a private consulting company and is not an official government publication.