11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.

Slides:



Advertisements
Similar presentations
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Advertisements

Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
SMALL BUSINESS PLAN GUIDE
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
The Department of Defense Intelligence Oversight Program
Espionage Indicators Briefing 1 U.S. Department of Commerce
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Boyertown Area School District Acceptable Use Policy.
Security Awareness: Applying Practical Security in Your World
Developing a Records & Information Retention & Disposition Program:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
INTERNET and CODE OF CONDUCT
Network security policy: best practices
GLOBAL REGULATORY STRATEGY CONSIDERATIONS SCIENTIFIC SARAH POWELL EXECUTIVE DIRECTOR, REGULATORY STRATEGIES SEPTEMBER 14-17, 2008 BOSTON, MA.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Ethics and professional Conducts for Civil engineers
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Managing a “Data Spill”
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
Provided by OSPA ( Operations Security (OPSEC)
Small Business Programs Tatia Evelyn-Bellamy Director Small Business Division Small Business Center February 2016.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Managing a Security Container
Cleared Employee Security Training
Initial Security Indoctrination
The Organized FSO Getting Control of the Paperwork and the Chaos
Information Security and Travel-related Security
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Overall Classification of this Briefing is UNCLASSIFIED
Presentation transcript:

11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG

22 OBJECTIVES Security - Key Role in New Hire Orientations Targeted Audience FSO New Hire Briefing Brief Company Overview Site Overview Security Policies Physical Security OPSEC & Social Networking Counterintelligence/Cyber Security Awareness Cleared Employee Takeaways

33 SECURITY – ARE YOU INVOLVED? Collaboration across functions Human Resources IT Business Development Program Management Trade Engineering Understand the business/products Attend PDRs, design reviews, contracts meetings, supply chain meetings, etc.

44 ALL Employees Cleared and uncleared Key source of information Eyes and ears out in the plant Open Door Policy Create the right atmosphere Open minded and solution driven Every employee is responsible for protecting both unclassified and classified information, company proprietary, etc. TARGET AUDIENCE

55 COMPANY OVERVIEW Provide a Company Overview Headquarters / Locations (include map) Company History Mergers & Acquisitions Division/Group/Sector Names Number of employees worldwide Target markets/customer base

66 SITE OVERVIEW Provide Site Specifics Leadership Chart Facility Information Clearance Level Employee Base (temps, etc.) Products Information Customer Base DoD Commercial Manufacturing Capabilities

77 Provide overview of policies Badge Policy Visitor Policy Technology Control Plan Electronic Communication Plan/IT Addendum Information Security Acceptable Use Policy IT Devices SECURITY POLICIES

88 Document Destruction Policy UNCLASSIFIED paper products Where are the policies located SharePoint / Electronic Library Hard Copy Security Office SECURITY POLICIES CONT.

99 Ensure you provide detailed information about physical security Building entry/exit points Access control Guards Lobby Inspections Prohibited Items PHYSICAL SECURITY

10 OPSEC AND SOCIAL NETWORKING SITES Brief overview on how Facebook, Twitter, etc. may provide adversaries with critical information needed to harm or disrupt your mission Discuss OPSEC and how it may impact their professional and personal life Examples Personal Information Keep sensitive, work related information off profile When uploading photos it is best to remove the metadata containing the date, time and location information stored in the image’s file Passwords Protect your password (Never Share) Ensure your password is unique

11 Discuss how your organization may be a prime target to adversaries Examples People (US Government, Military, Contractors) Sensitive movement of operations/personnel/property Communications/networking Protection of nuclear/chemical/biological materials/weapons/etc. Classified / Unclassified Information System designs / Patents Intellectual property System capabilities/vulnerabilities COUNTERINTELLIGENCE/CYBER

12 Brief on the Threats we face Competitors Foreign Intelligence Officers Hackers Insider Threat COUNTERINTELLIGENCE/CYBER

13 SECURITY AWARENESS Briefing should include: The Foreign Intelligence Threat The gathering of information by intelligence agents, especially in wartime, is an age-old strategy for gaining superiority over enemies. The Methods of Espionage Economic espionage is often conducted by using basic business intelligence-gathering methods. Indicators of Espionage Disgruntlement with one's employer or the U.S. Government Requests to obtain access to classified or unclassified information outside of authorized access

14 SECURITY AWARENESS CONT. Briefing should include: Indicators of Espionage Cont. Cameras or recording devices, without approval, into areas storing controlled material Extensive, unexplained use of copier, facsimile, or computer equipment Attempts to conceal any activity covered by one of these counterintelligence indicators The Damage Translations - loss of trade secrets and loss of technology--in the billions--and in the loss of technological edge over our competitors, and most important it could result in the loss of lives

15 SECURITY AWARENESS CONT. Briefing should include: Suspicious Contact Reporting What constitutes an SCR? Suspicious , from foreign entity, reference DSS briefing materials Why they should notify the FSO? Mandatory reporting requirements assists in protecting our warfighter and our company assets

16 How many SCR’s did your company submit? ?? Top Technology Hits Cameras TWS Proprietary Contact Methods Company Website Direct to employees TRIVIA - DO YOU KNOW?

17 SECURITY AWARENESS CONT. Briefing should include: Foreign Travel Reporting Why report? Safety and security advisories Recommend Face to face briefing Register with state department Follow up after travel

18 Lose a Memory Stick, Lose a Million Bucks PA Consulting lost the memory stick containing the details of 84,000 customers / the company had a contract work.5million terminated One in four users of social networking sites such as Facebook, MySpace and Friends Reunited unwittingly leave themselves open to crime by revealing personal details How long does it take to break your password? It takes a computer to guess a reasonable strong password with 5 lowercase, 2 uppercase and 4 numbers but more common passwords like “test”, “password” or “123” can be cracked in a very short time 11 characters +80,318,101,760,000 Combinations TRIVIA - DO YOU KNOW?

19 FACE OF SECURITY EVERYONE IS RESPONSIBLE FOR SECURITY

20 CLEARED EMPLOYEE BRIEFING Recommend a Face to Face briefing within the first 2 weeks of employment

21 Build your rapport with ALL employees Security Team must be viewed as a business partner, not a road block Ensure your policies are documented and available to all employees Be open to suggestions and new ideas Proactive/Solution driven Understand your business and know the players TAKEAWAY

22