Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Adverse Information Adverse Information:
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Defense Security Service Facility Clearance Branch (FCB)
Defense Security Service. DSS Update DSS Changing With A Changing Security Environment.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Espionage Indicators Briefing 1 U.S. Department of Commerce
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
COUNTERINTELLIGENCE TRENDS
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
INTERNET and CODE OF CONDUCT
Network security policy: best practices
UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING. UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Cleared Employee Reporting Requirements. Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
SECURITY BRIEFING (ANNUAL REFRESHER)
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
NISPOM Update for Dulles ISAC
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Managing a “Data Spill”
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Insider Threat Awareness
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Indiana Access to Public Records Act (APRA) Training
Managing a Security Container
Cleared Employee Security Training
NISPOM Basics What You Need to Know!
INSIDER THREAT AWARENESS
Initial Security Indoctrination
Cybersecurity Awareness
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Red Flags Rule An Introduction County College of Morris
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
ACCESSING CLASSIFIED INFORMATION
Presentation transcript:

Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the security classification system. Employee reporting obligations and requirements. Security procedures and duties applicable to the employee's job.

Sample only Order at Report to DISCO Employees who do not want to perform on classified work Refusal to sign SF 312

Sample only Order at Hotlines Hotlines are available. However, recommend that company officers have chance to handle situation Not to take place of investigations May be used to tip off Defense Hotline The Pentagon Washington, DC (800)

Sample only Order at Reporting Events that impact: –FCL –PCL –Protection of classified information –Loss or compromise Contractors cleared employees on reporting channels with: –Federal agencies –FBI –CSA

Sample only Order at Reporting (To FBI) Reports to FBI –Espionage –Sabotage –Terrorism –Subversive activities –Submit copy of written report to CSA

Sample only Order at How to Report Report to the FBI Follow up with written report Send copy to IS Rep with FBI approval Contact FBI File Office Send Written Report Notify DSS when permitted

Sample only Order at Reporting (To CSA) Reports to CSA –Adverse information –Suspicious contacts –Change in cleared employee status –Naturalization –Not desiring to work on classified contract

Sample only Order at DISCO Adverse Information Changes in Cleared Employee Status Citizenship by Naturalization Employees Desiring Not to Perform on Classified Work Standard Form (SF) 312

Sample only Order at Reporting (to CSA) Reports to CSA –SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts

Sample only Order at Reporting (to CSA) Reports to CSA –Refusal to sign SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts

Sample only Order at Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report

Sample only Order at Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report Discover circumstances surrounding the reported loss, compromise or suspected compromise.

Threat Awareness Briefing

Sample only Order at Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS

 Why go through process of Research and Development  Let someone else pay for R&D  Possible military application WHY OUR TECHNOLOGY?

Sample only Order at Protect Proprietary, For Official Use Only and Sensitive Information  This information includes:  Vendor prices  personnel ratings  medical records  corporate financial investments and resources  trade secret information  corporate/government relations  corporate security vulnerabilities  financial forecasts and budget information EMPLOYEE RESPONSIBILITY

Sample only Order at Company Computer Security Safeguards  Use computers for authorized business  Establish and protect passwords  Visit only authorized websites  Use caution when downloading attachments  Save all work  Use classified systems for classified processing EMPLOYEE RESPONSIBILITY

Sample only Order at  The following may indicate that you could be targeted:  Your access to active intelligence interest  Overseas locations where foreign intelligence operates  Located in the U.S. where foreign nationals can gain access to you  Ethnic, racial, or religious background that may attract the attention of a foreign intelligence operative EMPLOYEE RESPONSIBILITY

Sample only Order at  Foreign Threat  Economic – theft of technology and commerce  Classified information-solicitation for unauthorized disclosure  Intelligence-collection efforts  Conduct Risk Analysis  Who is targeting  What do they want  How do they get it THREAT AWARENESS AND DEFENSE

Sample only Order at  Collection efforts  Elicitation  Eavesdropping  Surveillance  Theft  Interception THREAT AWARENESS AND DEFENSE

Sample only Order at  Suspicious Activities  Requests for information outside of need to know  Unauthorized reproduction of materials  Unauthorized removal/destruction of materials  Unexplained affluence  Regular, unexplained foreign travel  Maintains long hours in spite of job dissatisfaction Employees are required to report efforts by any individual to obtain illegal or unauthorized access to classified or sensitive information— This include proprietary information INSIDER THREAT Robert Philip Hanssen

Sample only Order at  Fax  Snail Mail   Telephone  Personal Contact May seem innocent enough, but….  Legitimate business requests will come through appropriate channels  Personal Contact: Asks about project specifics, whether or not classified or proprietary details  address originated in a foreign country METHODS OF CONTACT

Sample only Order at  Remain non-committal if approached  Report all suspicious activities to FSO  Practice smart information systems security  Escort visitors  Pay attention to surroundings  Secure building at the end of the day COUNTERMEASURES