Security Education and Awareness Security 101 February 28, 2007 JSAC.

Slides:



Advertisements
Similar presentations
How to write an effective job description
Advertisements

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Chapter 3 Project Initiation
NISPOM CHAPTER 3 SECURITY TRAINING AND BRIEFINGS
CST 481/598 x.2.  Broad overview of policy material  What is a “process”  Tiers (not tears) Many thanks to Jeni Li.
Developing the Security Program
U.S. Commercial Service U.S. Department of Commerce The Basics of Exporting.
The Evaluation of the role of Human Resource Department Alex.
Chapter 3 Project Initiation. The stages of a project  Project concept  Project proposal request  Project proposal  Project green light  Project.
Confined Spaces in Construction: Applicable Standards Stan Liang, CIH, CSP, CET KTA-Tator, Inc.
Session 3 – Information Security Policies
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Providing Orientation and Training
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Career number 1. E- Discovery Professional  Electronic Discovery- Technology based Identifies, preserves and manages electronically stored information.
 Value Proposition  Key Features  A Closer Look  Operational Support  Essential Payback Employee Access TM Your Window to Employee and Manager Self-Service.
Approaches for forest certification System versus performance ? Presentation prepared by Pierre Hauselmann for the WWF / WB Alliance Capacity building.
Chapter 7 The Recruiting Process
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Introduction to Public Relations
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Introduction to poster presentation
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Providing Orientation and Training Training is important to.
Overview Supervisors are responsible for making sure their employees know what to do and how to do it. Training is a major expense. Employee training,
SECURITY BRIEFING (ANNUAL REFRESHER)
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Theme: classification & distribution of government control of FEA.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
FISWG 26 September 2012 Helen MacDonald L-3 Communications.
Desktop Publishing BIM.
Adobe Illustrator.  Graphic design can be thought of as a visual language that is used to convey a message to an audience.  A graphic design is a visual.
Effective communications campaigns Creating and using fact sheets for Smart Justice Michelle McDonnell - Senior Policy Advisor.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
NDIA Rocky Mountain Chapter Small Business Committee 11 July Welcome Andra Hargrave Colorado SBDC State Veterans Representative.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Recruitment Process for the Civil Service in Azerbaijan.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
LATVENERGO GROUP COMPLIANCE AND FRAUD RISK MANAGEMENT Kristine Arensone Compliance officer
Managing Employees 11 chapter. Staffing The process of recruiting and hiring employees to fulfill job obligations associated with the delivery of a product.
Chapter 10 Personnel Procedures and Practices. Human Resources Perspectives Lack of attention to the needs of employees can have dire consequences for.
SEC 420 Entire Course (UOP) For more course tutorials visit  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
SEC 420 Entire Course (UOP) SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers Paper 
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
SEC 420 Entire Course For more classes visit SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers.
Master’s Degree Program in Business Compliance Assurance
Cleared Employee Security Training
NISPOM Basics What You Need to Know!
INSIDER THREAT AWARENESS
Unauthorized Disclosure Training
Derivative Classification Overview
Information Systems Management
Shame on you if you aren’t making required security reports
Rutgers Export Compliance Officer
Intelligence Oversight U.S. Army Inspector General School 1
Electronic Surveillance, Post 9/11
Export Control Considerations When Planning Conferences and Meetings
Presentation transcript:

Security Education and Awareness Security 101 February 28, 2007 JSAC

Why Education and Training? NISPOM “ Contractors shall provide all cleared employees with security training and briefings commensurate with their involvement with classified information.” NISPOM “ Contractors shall provide all cleared employees with security training and briefings commensurate with their involvement with classified information.”

“A Security Awareness Program Sets the Stage for Training by Changing Organizational Attitudes to Realize the Importance of Security and the Adverse Consequences of Failure.” National Institute of Standards and Technology

Goals of An Effective Education & Training Program Understanding of and compliance with security rules and regulations. Understanding of and compliance with security rules and regulations. Understanding the magnitude and complexity of the foreign and domestic threats that make these rules and regulations necessary. Understanding the magnitude and complexity of the foreign and domestic threats that make these rules and regulations necessary. Motivation!!! Motivation!!!

Education Versus Training We often use the two terms interchangeably……but: We often use the two terms interchangeably……but:  “Training” teaches people the skills that will enable them to perform their job.  “Education” enables someone to develop the ability and vision to understand complex, multidisciplinary activities.

Education and Training What Should Be Included? What Should Be Included? What Is Your Method of Delivery? What Is Your Method of Delivery?

Required Prior to Initial Access to Classified Information Threat Awareness Briefing Threat Awareness Briefing Defensive Security Briefing Defensive Security Briefing Overview of the Security Classification System Overview of the Security Classification System Employee Reporting Requirements Employee Reporting Requirements Security Procedures and Duties applicable to the employee’s job Security Procedures and Duties applicable to the employee’s job

Threat Awareness What is the Threat What is the Threat Methods of Collection Methods of Collection Recent Cases Recent Cases CLASSIFIED or UNCLASSIFIED Threat Analysis from USG Sources CLASSIFIED or UNCLASSIFIED Threat Analysis from USG Sources Critical Technologies Critical Technologies

Defensive Briefing Overseas Travel Foreign Contacts Technology Controls Public Release Requirements CI Awareness Disclosure Restriction

Overview of the Security Classification System Levels of Classification and Criteria Levels of Classification and Criteria Original and Derivative Classification Original and Derivative Classification Classification Guides Classification Guides SAP/SAR and Special Briefing Requirements SAP/SAR and Special Briefing Requirements  NATO, FGI, COMSEC, CNWDI Safeguarding Safeguarding AIS AIS Background Investigations Background Investigations Marking Marking

Employee Reporting Requirements Definition of Adverse Information Definition of Adverse Information Suspicious Contact Reports Suspicious Contact Reports Foreign Travel Reporting Requirements (if any) Foreign Travel Reporting Requirements (if any) Violations Violations

Security Procedures and Duties Applicable to the Employee’s Job Lots of foreign contact or travel ? Lots of foreign contact or travel ? Working with classified hardware ? Working with classified hardware ? Working in a closed area ? Working in a closed area ? Marketing ? Marketing ? AIS ? AIS ? Special Briefings ? Special Briefings ?

Workplace Violence Prevention Liaison With: Liaison With:  Legal  Human Resources  Local Law Enforcement  Medical  Outside Consultants

Know Your Audience Executive Level Executive Level Foreign Travel Foreign Travel General Security Training General Security Training Technical Training Technical Training Export Controls Export Controls Counter-Intelligence Counter-Intelligence

Subject Matter Experts Subject Matter Experts Can Lend Extra Credibility Subject Matter Experts Can Lend Extra Credibility  DSS CI  902 nd MI Group  OSI  NCIS  Legal Departments  Import/Export Empowered Officials

Resources & Methods Company Newsletters Company Newsletters  Great for Special Events or Current Topics  “Security Slot” Website Information Website Information  Space on the Company Website or Build a Security Website Security Bulletins Security Bulletins  Topic of the Month Videos Videos  Homemade are Expensive but Effective if Resources Available Computer Based Education Computer Based Education

Resources & Methods Posters Posters  Some Commercially Available  Idea Contest Desktop Reminders Desktop Reminders  Great For End of Day Checks “Gimmes” “Gimmes” Pamphlets Pamphlets  Must be easy to use or recyclable

Desk Guides and Handbooks

Resources & Methods Seminars and Workshops Seminars and Workshops  NCMS  JSAC  ASIS  National Security Institute – IMPACT  DSS Usually for Specific Audiences Usually for Specific Audiences  Security Professionals  Small Facility FSO’s  Specialists – Import/Export, Legal

Visual Advertising A Great Poster IS: RRRReadable UUUUnreadable = Misspellings, complex, passive sentences, ungrammatical LLLLegible IIIIllegible = Fancy font, fancy font, too much text WWWWell Organized DDDDisorganized = Too much time to find main idea, next idea or data SSSSuccinct NNNNot succinct = Doesn’t direct attention to main message in 11 seconds

Great Posters Are Compact and Visual: Compact: Compact:  Focus on one, clearly stated message with a single “take-home” message Visual: Visual:  Relies on graphics, photos, pictures to convey message rather than lots of text

Poster Art from the Web rs/Security_Awareness_Posters4.ht m rs/Security_Awareness_Posters4.ht m rs/Security_Awareness_Posters4.ht m rs/Security_Awareness_Posters4.ht m sters.html sters.html sters.html sters.html

Associated with a Public Event

Poster Art – Not So Good

Poster Art - Cool

Key to Effective Training ReinforceReinforceReinforce

“The single greatest obstacle to espionage is education.” Stanislav Levchenko, former KGB Officer

Questions ??