Presentation is loading. Please wait.

Presentation is loading. Please wait.

0800 - 0815 Welcome Greg Hoffman, MDA 0815 - 0900 OPSEC 5 Step Process Morris Burbank, Garrison 0900 - 0930 OPSEC and the Insider Threat Paul Quintel,

Similar presentations


Presentation on theme: "0800 - 0815 Welcome Greg Hoffman, MDA 0815 - 0900 OPSEC 5 Step Process Morris Burbank, Garrison 0900 - 0930 OPSEC and the Insider Threat Paul Quintel,"— Presentation transcript:

1 Welcome Greg Hoffman, MDA OPSEC 5 Step Process Morris Burbank, Garrison OPSEC and the Insider Threat Paul Quintel, AMCOM Public Release/Web Reviews Quincy Roby, AMRDEC Break OPSEC and the Internet Dwayne Smith, NEC-R OPSEC and Social Media Ben McGee, ISSA LUNCH Protecting PII Luereen Phillips, AMCOM Trash or Treasure Arnetta Manual, PEOAVN Break Family OPSEC Greg Hoffman, MDA Round Table Discussion All Closing Remarks Greg Hoffman, MDA August 20, 2013 Bob Jones Auditorium Sparkman Center Redstone Arsenal OPSEC RULES! Garrison – Morris Burbank, ACC – Raymond Jones, AMC – James Burns, AMCOM – Paul Quintel, AMRDEC – Quincy Roby, FAHC – Charles Allbritten, LOGSA – Vickie Cooper, MDA – Greg Hoffman, MSFC – Terry Odum, MSIC – SFC Turay, NEC-R – Curtis Elrod, PEOAVN – Arnetta Manuel, PEOMS – Lori Relford, RTC – Blake Stewart, SMDC – Michael Mitchell, TSMO – Terry Vital, USACE – Lori Byrd, USASAC – Ed Reyes, RSA OPSEC OFFICERS SCHEDULE

2 Interagency OPSEC Support Staff (IOSS): https://www.iad.gov/ioss/index.cfm DA OPSEC Support Element https://www.us.army.mil/suite/page/ JIOWC / JOSE https://www.facebook.com/JIOWC.OPSEC.Support OPSEC Professionals Society OPSEC Professionals Association Center for Development of Security Excellence On Guard Online DoD Social Media Hub 10 Ways the Adversary Collects on You and Your Organizations 1. / Internet / Social Media 2.Recycle Bins, Trash Containers 3.Freedom of Information Request 4.Telephone Directories / Organization Tables 5.Job Announcements 6.Overhearing Conversations 7.Open Source Material (Radio, TV, Magazines) 8.Observation of Activities 9.Conferences / Seminars 10.Tours / Visits to your organization Origin of OPSEC OPSEC, as a methodology, originated during the Vietnam conflict when a small group of individuals were assigned the mission of finding out how the enemy was obtaining advance information on certain combat operations in Southeast Asia. This team was established by the Commander-in-Chief, Pacific, and given the code name "PURPLE DRAGON.“ It became apparent to the team that although traditional security and intelligence countermeasures programs existed, reliance solely upon them was insufficient to deny critical information to the enemy--especially information and indicators relating to intentions and capabilities. The group conceived and developed the methodology of analyzing U.S. operations from an adversarial viewpoint to find out how the information was obtained. The team then recommended corrective actions to local commanders. They were successful in what they did, and to name what they had done, they coined the term "operations security.“ 1.Identify Critical Information 2.Analyze Threats 3.Analyze Vulnerabilities 4.Assess Risk 5.Apply Countermeasures OPSEC 5 Step Process 1.First Law of OPSEC - If you don’t know the threat, how do you know what to protect? 2.Second Law of OPSEC- If you don't know what to protect, how do you know you are protecting it? 3.Third Law of OPSEC - If you are not protecting it (the critical and sensitive information), the adversary wins! 3 Laws of OPSEC OPSEC LINKS


Download ppt "0800 - 0815 Welcome Greg Hoffman, MDA 0815 - 0900 OPSEC 5 Step Process Morris Burbank, Garrison 0900 - 0930 OPSEC and the Insider Threat Paul Quintel,"

Similar presentations


Ads by Google