Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.

Slides:



Advertisements
Similar presentations
Managing the Health and Safety of Contractors
Advertisements

Section Six: Foreign Ownership, Control, or Influence (FOCI)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Industrial Security 2010 Worldwide Security Conference.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
UNCLASSIFIED Foreign Ownership, Control, or Influence (FOCI) August 2009.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
NISPOM CHAPTER 3 SECURITY TRAINING AND BRIEFINGS
Information Systems Security Officer
Session 3 – Information Security Policies
1 Creating a Joint Personnel Adjudication System (JPAS) Analysis Report Michael S. Campbell Industrial Security Specialist Defense Security Service San.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Section Two: Classified Safeguarding and Handling Note: All classified markings contained within this presentation are for training purposes only.
Engaging Contractors in the Environmental Management System (EMS) Department of Energy EMS Workshop: Implementation, Lessons Learned, and Best Practices.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
HIPAA PRIVACY AND SECURITY AWARENESS.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Presented by : Miss Vrindah Chaundee
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 CIP Cyber Security – Personnel & Training Steve Garn CIP Compliance Workshop Baltimore, MD August 19-20, 2009 © ReliabilityFirst Corporation.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Department of the Navy Information Security Program
DEFENSE SECURITY SERVICE DSS Role in International Security.
Hazards Identification and Risk Assessment
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
NISPOM Update for Dulles ISAC
ISO/IEC 27001:2013 Annex A.8 Asset management
Privacy Act United States Army (Managerial Training)
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
DOD - Accessing Classified Information Brought to you by your company Security Officer.
Copyright © Houghton Mifflin Company. All rights reserved.8-1 Chapter 8 Developing an Effective Ethics Program.
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
Providing Access to Your Data: Handling sensitive data
Cleared Employee Security Training
NISPOM Basics What You Need to Know!
Introduction to the Federal Defense Acquisition Regulation
INSIDER THREAT AWARENESS
Module P6 Principle 6: Establish and Maintain a Management Process for Intellectual Property, Proprietary Information, and Competition-Sensitive Data Learning.
Unauthorized Disclosure Training
Derivative Classification Overview
Initial Security Indoctrination
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
Intelligence Oversight U.S. Army Inspector General School 1
BADGING PROCEDURES/CAC ACCESS
Protecting customer information
Presentation transcript:

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes only.

Overview Classification System Classified Safeguarding and Handling Protection of Controlled Unclassified Information Employee and Visitor Access Controls Security Inspections and Reviews Foreign Ownership, Control, or Influence (FOCI) Requirements Information Systems Security Communication Security (COMSEC) Reporting Requirements Security Violations and Deviations Threat Awareness and Defensive Measures Quiz Questions Summary Outline

Overview As a cleared Department of Defense (DoD) government contractor, the protection of sensitive government information (both classified and controlled unclassified), is the responsibility of every employee of {Company}, regardless of how it was obtained or what form it takes. Our vigilance is imperative in the protection and control of this information. Under Executive Order (EO) 13526 and DoD Directives anyone with access to these resources has an obligation to protect it. The very nature of our work dictate that we lead the way in sound security practices. Anything less is simply not acceptable.

Overview As a cleared employee, you are required to receive annual security refresher training and various security awareness and training information on a recurring basis to include but not limited to: Security newsletters Memorandums Pamphlets and guides Periodic bulletins Computer-based courses

Overview This briefing will: Meet the annual government security education requirement Explain the importance of protecting government assets and what is being protected Provide a basic understanding of DoD security policies Provide guidelines and tips to prevent future security incidents Ensure all personnel have the same understanding of their security responsibilities and reporting requirements

Overview Guiding Directive NISPOM: National Industrial Security Program Operating Manual The NISPOM is the principle document governing U.S. industry in carrying out contracts within the U.S. Government Industrial Security Program {Company} is responsible for complying with the requirements of the NISPOM in order to bid on or be awarded a contract involving classified U.S. or foreign government information All U.S. classified contracts must be accompanied by a DD Form 254, Contract Security Classification Specification This form becomes part of the contractual documents and identifies what level of classified information is required to accomplish the contract goals

Overview Non-Disclosure Agreement (SF-312) responsibilities All personnel authorized to access Classified information must sign a Non-Disclosure Agreement (NDA) with the U.S. Government upon being granted access to classified information with {Company} The Security Department will inform you of your requirement to review and sign the NDA By signing this agreement you acknowledge that A special trust has been placed in you You are responsible to protect classified information from unauthorized disclosure You have received your security indoctrination for handling classified information and notification of pre-publication review This is a binding lifetime agreement, even when you no longer require a security clearance There are serious consequences for not complying with the terms of this agreement which are punishable under Federal criminal statutes, including imprisonment and fines

Overview Why do we need Security? The protection of classified information is required in order to protect national security DoD Security Regulations, Directives, and Programs are established to counter threats to our national security Threats to classified and unclassified assets can include: Insiders (government employees, contractor employees, and authorized visitors) Criminal and Terrorist Activities Foreign Intelligence Services Foreign Governments {Company} is assessed annually on its security compliance and its ability to properly safeguard classified information A positive rating on this assessment is critical in maintaining our facility clearance and continuing to do business with the U.S. Government