Www.ispcert.com DEFENSIVE SECURITY BRIEFING. www.ispcert.com Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.

Slides:



Advertisements
Similar presentations
VOLUNTARY PRINCIPLES ON SECURITY & HUMAN RIGHTS. What are the Voluntary Principles? Tripartite, multi-stakeholder initiative Initiated in 2000 by UK Foreign.
Advertisements

2.02 Questions and Answers.
Student Off-Campus Activities Health and Safety The objective is to enable students to undertake off campus activities safely. 02/06/20141.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Espionage Indicators Briefing 1 U.S. Department of Commerce
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
Export Controls CBP is Turning up the Heat and the “ICE” is Not Melting April 2008 NCURA Western Regional Conference Adilia F. Koch.
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
COUNTERINTELLIGENCE TRENDS
Monash Abroad Travel Scholarship – Will be processed in early November, please make sure you complete the Monash Abroad online application (application.
INTERNET and CODE OF CONDUCT
UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING. UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government.
© 2011 iJET International, Inc. All Rights Reserved | iJET® PROPRIETARY AND CONFIDENTIAL INFORMATION Worldcue ® TRAVELER An Introduction Log in at:
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Final Rule – Secondary School Students – Published October 27, 2010 Effective Date: 30 days from publication Implementation: 2011/12 academic cycle o 1698.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Information Security Training for Management Complying with the HIPAA Security Law.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Counterintelligence Briefings for Foreign Travelers September 26, 2012
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Defense Security Service New Rating Process Current as of 10/19/2011.
PERFORMING ON CLASSIFIED CONTRACTS.
September 2010 Budget Managers Meeting Internal Audit Presentation Dave Cutri, Director of Internal Audit
MARKING CLASSIFIED MATERIAL
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
End Use and User of Ammunition AT05 Slide 1. Types of End Use Documents  End User Certificate (EUC)  Delivery Verification Certificate (DVC) AT05 Slide.
THE SECURITY CLASSIFICATION SYSTEM.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
INTRODUCTION TO THE STUDENT AND EXCHANGE VISITOR INFORMATION SYSTEM (SEVIS)
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Website and expenses information. New website At the following link:- Go to – Click “Co-operative.
The Global Ambassador Workshop Cross Cultural sensitivity.
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
SAFEGUARDING CLASSIFIED INFORMATION.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Technical Counterintelligence Technical Surveillance Counter Measures Services.
CMGT 400 Entire Course CMGT 400 Week 1 DQ 1  CMGT 400 Week 1 Individual Assignment Risky Situation  CMGT 400 Week 1 Team Assignment Kudler Fine Foods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
U.S. Immigration Center.  Green card also refers to an immigration process of becoming a permanent resident.  The green card serves as proof that its.
For more course tutorials visit
CMGT 400 GUIDE Real Success CMGT 400 Entire Course FOR MORE CLASSES VISIT CMGT 400 Week 1 Individual Assignment Risky Situation CMGT.
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Why is this called “the ostrich effect”?
Information Security Seminar
New Faculty Orientation
CMGT 400 Education for Service-- tutorialrank.com
RECORDS AND INFORMATION
Montclair CITI – New User Instructions
Shame on you if you aren’t making required security reports
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Completing the documentation
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
Handling Information Securely
Confidentiality Training 2014
Presentation transcript:

DEFENSIVE SECURITY BRIEFING

Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS

 Notify FSO of travel plans  Ensure proper travel documentation  Protect export controlled technology and classified information  Visit the State Department website for up to date travel information EMPLOYEE RESPONSIBILITIES

 Maintain professional bearing  Remain in contact with host  Travel with others when possible  Display wealth as little as possible  Learn customs and courtesies of host country EMPLOYEE RESPONSIBILITIES

 Protect Privileged Information (Classified, Proprietary, For Official Use Only and Sensitive Information) While Traveling  This information includes:  Carryon baggage  Laptop computers  Conversations EMPLOYEE RESPONSIBILITY

 Foreign Threat  Economic Classified information  Intelligence  Conduct Risk Analysis  Who is targeting  What do they want  How do they get it THREAT AWARENESS AND DEFENSE

 Visit to order your year of access to NISPOM Training Slideswww.ispcert.com END OF SAMPLE TRAINING

Click on the correct answers TEST

1.Which of the following are factors that may make you a target of espionage: A.Ethnic backgroundEthnic background B.Annual incomeAnnual income C.Rental carRental car 2.Where might a foreign service glean privileged information A.Magazines you readMagazines you read B.TV shows you watchTV shows you watch C.Products you buyProducts you buy D.Conversations you haveConversations you have 3.While traveling, you have control over all situations A.TrueTrue B.FalseFalse 4.All are examples of collection methods EXCEPT: A.ElicitationElicitation B.SurveillanceSurveillance C.Currency exchangeCurrency exchange D.EavesdroppingEavesdropping TEST-SELECT THE CORRECT ANSWER

5.Which of the following are the most correct countermeasures of a solicitation effort A.Agree to provide then contact the authoritiesAgree to provide then contact the authorities B.Say “no” and then contact the authoritiesSay “no” and then contact the authorities C.Continue the conversation so as not to offend the hostContinue the conversation so as not to offend the host D.Make attempts to change the subjectMake attempts to change the subject 6.Most foreign contacts are well meaning and legitimate A.TrueTrue B.FalseFalse TEST-SELECT THE CORRECT ANSWER

Go Back!

Go Back!

Go Back!

Go Back!

CERTIFICATE I HAVE RECEIVED TRAINING AND UNDERSTAND THE CONTENTS OF: DEFENSIVE SECURITY BRIEFING ANY QUESTIONS THAT I HAVE RAISED WERE ADDRESSED BY THE FSO: NAME: DATE: FSO Verification: