CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Fleet & Family Support Ombudsman Program & Operations Security
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
UNIT PHYSICAL SECURITY PLAN
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Introduction to Information Operations Attaché Corps- SEP 09
Reviewed, DIR-T USCGAUX. 2 This workshop provide a fundamental overview of the practices and procedures associated with:
EDS Public Information Tabletop Exercise
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
TLO 2: Action: Plan operational security. Intermediate-level training.
By: Ashwin Vignesh Madhu
April 3-5, 2005Security Professionals Conference Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring.
PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME 1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Operational Security PCC. VII-F.1.
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
OVERVIEW  Who OSI is  What OSI can do for you  What you can do for OSI  What OSI and you can do together.
Purpose of Volunteer Selection The primary purpose of volunteer screening is the protection of the youth enrolled in our programs, our volunteers and our.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Case I. Researchers interested in end-of-life decision-making propose to use an hour-long semi-structured interview to gather data from subjects who are.
OPSEC & Social Media dd mmm yy Overall Classification of this Briefing is UNCLASSIFIED//FOUO FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH.
Operational Security Awareness
Site Visit Opening Meeting. Washington State Quality Award Council2 WSQA MISSION Make Washington State a better place to live, learn, and work by helping.
Provided by OSPA ( Operations Security (OPSEC)
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
For more course tutorials visit CJS 250 Entire Course CJS 250 Week 1 Checkpoint Historical Laws and Security CJS 250 Week 1 Assignment.
OPERATIONS SECURITY 16 August August 2004.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
IAEA International Atomic Energy Agency IAEA Training Course on Conducting Computer Security Assessments Presented by: Donald D. Dudenhoeffer.
Headquarters U.S. Air Force
Headquarters U.S. Air Force
Criminal Evidence Chapter 3
Threat Assessment Team Florida State University
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
University of Central Florida Office of Research & Commercialization
Operations Security (OPSEC) For New Hires
California Cybersecurity Integration Center (Cal-CSIC)
AFOSI and the First Sergeant
CMD LOGO Operations Security (OPSEC) Assessment out-brief Presenter
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
University of Central Florida Office of Research & Commercialization
AAHRPP Accreditation Welcome to the University of Georgia’s presentation for accreditation of the human research protection program (HRPP). This presentation.
USAID/Peru Risk Assessment In-Briefing
JEB – Little Creek (Bldg 1126)
Technology Audit Plan ----BCSY University
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Specification of Countermeasures for CYRAIL
Operations Security (OPSEC)
Overall Classification of this Briefing is UNCLASSIFIED
IS Risk Management Framework Overview
How to conduct Effective Stage-1 Audit
Chapter 1 Key Security Terms.
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter DD MMM YYYY Presenter Contact information

Overview Purpose Objective Team composition Methodology Ground rules Discussion

Purpose To determine the likelihood that critical information can be protected from the adversary’s intelligence collection. Bottom line: OPSEC is emphasized, security is improved, threat awareness raised and mission success rate increased.

Objective Observe potential vulnerabilities affecting operational effectiveness Apply OPSEC 5-step process: Verify critical information, identify threat, identify vulnerabilities, assess risk & apply / evaluate countermeasures Observe UNCLAS indicators, examine exploitable processes & procedures Evaluate ability to thwart adversary open-source intelligence collection

Team composition Team lead: (Name) Assistant Team lead: (Name) Team member: (Name)

Methodology Verify CI Obtain threat assessment: N2, J2, G2, S2 / NCIS, DIA, CID, OSI Foreign intelligence service collectors, terrorists, criminals Identify Vulnerabilities / Conduct assessment (Dates) Evaluate command emphasis, awareness, training; conduct interviews Emulate threat: Open source discovery, dumpster dives [observe routines, compartment / office walk through] Assess risk of vulnerability findings Apply / evaluate countermeasures (recommendations)

Ground rules No photographs in controlled compartments / offices Interviews conducted in private when possible Adherence to restrictions / limitations levied by Commanding Officer Any other directions from Commanding Officer

Discussion / Questions