UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Fleet & Family Support Ombudsman Program & Operations Security
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Introduction to Information Operations Attaché Corps- SEP 09
Welcome Greg Hoffman, MDA OPSEC 5 Step Process Morris Burbank, Garrison OPSEC and the Insider Threat Paul Quintel,
EDS Public Information Tabletop Exercise
The Department of Defense Intelligence Oversight Program
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
TLO 2: Action: Plan operational security. Intermediate-level training.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
By: Ashwin Vignesh Madhu
1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME.
PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME 1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Operational Security PCC. VII-F.1.
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
Profiling exercise of internally displaced persons’ situations in_______ General presentation of the project Official project launch event Date.
A Military Guide to Terrorism in the Twenty-First Century
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
OPSEC & Social Media dd mmm yy Overall Classification of this Briefing is UNCLASSIFIED//FOUO FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
SNS Planning Elements Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Provided by OSPA ( Operations Security (OPSEC)
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
OPERATIONS SECURITY 16 August August 2004.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
IAEA International Atomic Energy Agency IAEA Training Course on Conducting Computer Security Assessments Presented by: Donald D. Dudenhoeffer.
Headquarters U.S. Air Force
Headquarters U.S. Air Force
Criminal Evidence Chapter 3
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
University of Central Florida Office of Research & Commercialization
Operations Security (OPSEC) For New Hires
NSASB FRG Training Code of Conduct & OPSEC.
California Cybersecurity Integration Center (Cal-CSIC)
CMD LOGO Operations Security (OPSEC) Assessment out-brief Presenter
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Threat Systems Management Office (TSMO)
Command Indoctrination Operations Security DD MMM YY
AAHRPP Accreditation Welcome to the University of Georgia’s presentation for accreditation of the human research protection program (HRPP). This presentation.
Protective Security Advisor Program Brief
JEB – Little Creek (Bldg 1126)
Technology Audit Plan ----BCSY University
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Operations Security (OPSEC): A Force Multiplier
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Does my Research need IRB Review?
Presentation transcript:

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Overview  Purpose  Objective  Team composition  Methodology  Ground rules  Discussion

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  To determine the likelihood that critical information can be protected from the adversary’s intelligence collection.  Bottom line: OPSEC is emphasized, security is improved, threat awareness raised and mission success rate increased. Purpose

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  Observe potential vulnerabilities affecting operational effectiveness  Apply OPSEC 5-step process: Verify critical information, identify threat, identify vulnerabilities, assess risk & apply / evaluate countermeasures  Observe UNCLAS indicators, examine exploitable processes & procedures  Evaluate ability to thwart adversary open-source intelligence collection Objective

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Team composition  Team lead: (Name)  Assistant Team lead: (Name)  Team member: (Name)

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  Verify CI  Obtain threat assessment: N2, J2, G2, S2 / NCIS, DIA, CID, OSI  Foreign intelligence service collectors, terrorists, criminals  Identify Vulnerabilities / Conduct assessment (Dates)  Evaluate command emphasis, awareness, training; conduct interviews  Emulate threat: Open source discovery, dumpster dives [observe routines, compartment / office walk through]  Assess risk of vulnerability findings  Apply / evaluate countermeasures (recommendations) Threat Brief Day 2 interviews  Web Risk Assessment  Observations / Trash review  Evaluation Complete  Program Review  Day 1 -7 Day  Compartment / office walk through  Compile results Open source research Methodology

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Ground rules  No photographs in controlled compartments / offices  Interviews conducted in private when possible  Adherence to restrictions / limitations levied by Commanding Officer  Any other directions from Commanding Officer

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Discussion / Questions