Www.ispcert.com DEFENSIVE SECURITY BRIEFING. www.ispcert.com Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.

Slides:



Advertisements
Similar presentations
VOLUNTARY PRINCIPLES ON SECURITY & HUMAN RIGHTS. What are the Voluntary Principles? Tripartite, multi-stakeholder initiative Initiated in 2000 by UK Foreign.
Advertisements

Licensing of Intangible Transfers of Technology
INTERNATIONAL ELECTROTECHNICAL COMMISSION Name Title.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Things To Remember About Completing I-9 Forms
Carnegie Mellon Export Controls & Universities. Carnegie Mellon Introduction  Federal laws restricting the exports of goods and technology have been.
Export Controls CBP is Turning up the Heat and the “ICE” is Not Melting April 2008 NCURA Western Regional Conference Adilia F. Koch.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
1-129 Form Deemed Export Attestation UTHSC May 16, 2011.
COUNTERINTELLIGENCE TRENDS
Buffalo State College Internal Control Program Presented to: Buffalo State College Line Staff Delivered by: BSC IC Program & Department Managers.
INTERNET and CODE OF CONDUCT
ICP Implementation in Japan / Industry Seminar in Malaysia (Nov. 17, 2011) ICP Implementation in Japan / Industry Seminar in Malaysia (Nov ) ICP.
Network security policy: best practices
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Field Operations U.S. Customs and Border Protection Customs-Trade Partnership Against Terrorism (C-TPAT) Texas Broker and Freight Forwarder Conference.
CUSTOMER RELATIONS IN THE TRAVEL INDUSTRY 6.06 Recognize the importance of safety and security in the travel industry.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Information Security Training for Management Complying with the HIPAA Security Law.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Export Control and Trade Sanctions: An Overview Loraine J. Hudson Director of Research Facilitation and Dissemination April 7, 2015.
HIPAA PRIVACY AND SECURITY AWARENESS.
Intangible Technology Transfer and Catch-All Controls June 18, 2003 Timothy Clinton Export Policy Analyst U.S. Department of Commerce.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
PERFORMING ON CLASSIFIED CONTRACTS.
MARKING CLASSIFIED MATERIAL
Advice for Internal Compliance Programmes Billy Au Principal Trade Officer Head of Strategic Trade Controls Branch Trade and Industry Department The Government.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Information Systems Security Operational Control for Information Security.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
End Use and User of Ammunition AT05 Slide 1. Types of End Use Documents  End User Certificate (EUC)  Delivery Verification Certificate (DVC) AT05 Slide.
DEFENSE SECURITY SERVICE DSS Role in International Security.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Recent Cyber Attacks and Countermeasures September 2006.
MEC EXPORT COMPLIANCE AWARENE$$ Presented by : Paul Divecchio –DiVecchio & Associate Phone: (617) , Fax: (508)
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Assessing and Managing Risks on International Projects It takes a village…
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Technical Counterintelligence Technical Surveillance Counter Measures Services.
GREENBERG TRAURIG, LLP ATTORNEYS AT LAW ©2010. All rights reserved. The New Form I-129: Are You Ready to Certify Compliance with US Export.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Welcome to the ICT Department Unit 3_5 Security Policies.
For more course tutorials visit
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
EPE INTERNAL CODE OF CONDUCT
Export Controls Update
Health Insurance Portability and Accountability Act
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity Awareness
Business cases on standardization
Chemical Purchasing.
Clemson University Red Flags Rule Training
Confidentiality Training 2014
Presentation transcript:

DEFENSIVE SECURITY BRIEFING

Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS This briefing is designed to prepare you the “cleared employee” for overseas travel. You have responsibilities to protect our employees, product, customers and those we do business with while you are traveling

 Notify FSO of travel plans  Ensure proper travel documentation  Protect export controlled technology and classified information  Visit the State Department website for up to date travel information EMPLOYEE RESPONSIBILITIES

 Notification to FSO includes travel plans for Canada, Mexico and Caribbean Countries  The state department website informs you of necessary travel documentation. Familiarize yourself with the site and use it to become an informed international traveler  Exports Compliance: Technical data can be transferred by reading a note, viewing a computer screen, conducting seminars and etc. Make sure you are authorized with a license and or TAA before discussing technical data that falls under exports compliance. EMPLOYEE RESPONSIBILITIES

 Maintain professional bearing  Remain in contact with host  Travel with others when possible  Display wealth as little as possible  Learn customs and courtesies of host country EMPLOYEE RESPONSIBILITIES

EMPLOYEE RESPONSIBILITIES  Conduct yourselves as professionals at all times. Pretend you are travelling with the CEO (or title of highest ranking officer) as you represent the company  Stick with your host-They will ensure your safety and refer you to reputable establishments  Travel in a group to make yourself as unattractive target of opportunity

 Protect Privileged Information (Classified, Proprietary, For Official Use Only and Sensitive Information) While Traveling  This information includes:  Carryon baggage  Laptop computers  Conversations EMPLOYEE RESPONSIBILITY

 Company employees should bring a sanitized computer while on travel. You can almost guarantee that you will be separated from your laptop at some point during customs checks. A sanitized computer provides no threat of exports violations or theft of economic or corporate data.  Keep all information that could lead to export violations or the release of proprietary data close at hand.  Company employees cannot transport classified material across international borders. EMPLOYEE RESPONSIBILITY

 Foreign Threat  Economic Classified information  Intelligence  Conduct Risk Analysis  Who is targeting  What do they want  How do they get it THREAT AWARENESS AND DEFENSE

 Economic Threat– theft of technology and commerce. Foreign entities may target classified or company sensitive information to gain a competitive edge. This costs millions of dollars in damage to U.S. business  Intelligence Threat-Collection efforts against the U.S. to increase for government power and competitive edge. THREAT AWARENESS AND DEFENSE

 When conducting analysis of threat ask the following questions:  What do we have?  What is our technology, defense or economic product  What do they want?  The product the foreign entity or government have the most to gain  How can they get it?  Where are we vulnerable  What efforts can we take to prevent unauthorized disclosure?  Training  Recognizing the threat  How to react to the threat  Reporting  How and what to report THREAT AWARENESS AND DEFENSE

 Could you be a target overseas?  Who are you and what will you do?  Science convention  Air shows  Business meetings Conduct Risk Analysis

Click on the correct answers TEST

1.Which of the following are factors that may make you a target of espionage: A.Ethnic backgroundEthnic background B.Annual incomeAnnual income C.Rental carRental car 2.Where might a foreign service glean privileged information A.Magazines you readMagazines you read B.TV shows you watchTV shows you watch C.Products you buyProducts you buy D.Conversations you haveConversations you have 3.While traveling, you have control over all situations A.TrueTrue B.FalseFalse 4.All are examples of collection methods EXCEPT: A.ElicitationElicitation B.SurveillanceSurveillance C.Currency exchangeCurrency exchange D.EavesdroppingEavesdropping TEST-SELECT THE CORRECT ANSWER

5.Which of the following are the most correct countermeasures of a solicitation effort A.Agree to provide then contact the authoritiesAgree to provide then contact the authorities B.Say “no” and then contact the authoritiesSay “no” and then contact the authorities C.Continue the conversation so as not to offend the hostContinue the conversation so as not to offend the host D.Make attempts to change the subjectMake attempts to change the subject 6.Most foreign contacts are well meaning and legitimate A.TrueTrue B.FalseFalse TEST-SELECT THE CORRECT ANSWER

Go Back!

Go Back!

Go Back!

Go Back!

CERTIFICATE I HAVE RECEIVED TRAINING AND UNDERSTAND THE CONTENTS OF: DEFENSIVE SECURITY BRIEFING ANY QUESTIONS THAT I HAVE RAISED WERE ADDRESSED BY THE FSO: NAME: DATE: FSO Verification: