Download presentation
Presentation is loading. Please wait.
Published byColin Nelson Modified over 9 years ago
1
Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the security classification system. Employee reporting obligations and requirements. Security procedures and duties applicable to the employee's job.
2
Sample only Order at www.redbikepublishing.com Report to DISCO Employees who do not want to perform on classified work Refusal to sign SF 312
3
Sample only Order at www.redbikepublishing.com 1-207 Hotlines Hotlines are available. However, recommend that company officers have chance to handle situation Not to take place of investigations May be used to tip off Defense Hotline The Pentagon Washington, DC 20301-1900 (800) 424-9098
4
Sample only Order at www.redbikepublishing.com 1-3 Reporting Events that impact: –FCL –PCL –Protection of classified information –Loss or compromise Contractors cleared employees on reporting channels with: –Federal agencies –FBI –CSA
5
Sample only Order at www.redbikepublishing.com 1-3 Reporting (To FBI) Reports to FBI –Espionage –Sabotage –Terrorism –Subversive activities –Submit copy of written report to CSA
6
Sample only Order at www.redbikepublishing.com How to Report Report to the FBI Follow up with written report Send copy to IS Rep with FBI approval Contact FBI File Office Send Written Report Notify DSS when permitted
7
Sample only Order at www.redbikepublishing.com 1-3 Reporting (To CSA) Reports to CSA –Adverse information –Suspicious contacts –Change in cleared employee status –Naturalization –Not desiring to work on classified contract
8
Sample only Order at www.redbikepublishing.com DISCO Adverse Information Changes in Cleared Employee Status Citizenship by Naturalization Employees Desiring Not to Perform on Classified Work Standard Form (SF) 312
9
Sample only Order at www.redbikepublishing.com 1-3 Reporting (to CSA) Reports to CSA –SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts
10
Sample only Order at www.redbikepublishing.com 1-3 Reporting (to CSA) Reports to CSA –Refusal to sign SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts
11
Sample only Order at www.redbikepublishing.com 1-303 Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report
12
Sample only Order at www.redbikepublishing.com 1-303 Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report Discover circumstances surrounding the reported loss, compromise or suspected compromise.
13
www.ispcert.com Threat Awareness Briefing
14
Sample only Order at www.redbikepublishing.com www.ispcert.com Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS
15
www.ispcert.com Why go through process of Research and Development Let someone else pay for R&D Possible military application WHY OUR TECHNOLOGY?
16
Sample only Order at www.redbikepublishing.com www.ispcert.com Protect Proprietary, For Official Use Only and Sensitive Information This information includes: Vendor prices personnel ratings medical records corporate financial investments and resources trade secret information corporate/government relations corporate security vulnerabilities financial forecasts and budget information EMPLOYEE RESPONSIBILITY
17
Sample only Order at www.redbikepublishing.com www.ispcert.com Company Computer Security Safeguards Use computers for authorized business Establish and protect passwords Visit only authorized websites Use caution when downloading attachments Save all work Use classified systems for classified processing EMPLOYEE RESPONSIBILITY
18
Sample only Order at www.redbikepublishing.com www.ispcert.com The following may indicate that you could be targeted: Your access to active intelligence interest Overseas locations where foreign intelligence operates Located in the U.S. where foreign nationals can gain access to you Ethnic, racial, or religious background that may attract the attention of a foreign intelligence operative EMPLOYEE RESPONSIBILITY
19
Sample only Order at www.redbikepublishing.com www.ispcert.com Foreign Threat Economic – theft of technology and commerce Classified information-solicitation for unauthorized disclosure Intelligence-collection efforts Conduct Risk Analysis Who is targeting What do they want How do they get it THREAT AWARENESS AND DEFENSE
20
Sample only Order at www.redbikepublishing.com www.ispcert.com Collection efforts Elicitation Eavesdropping Surveillance Theft Interception THREAT AWARENESS AND DEFENSE
21
Sample only Order at www.redbikepublishing.com www.ispcert.com Suspicious Activities Requests for information outside of need to know Unauthorized reproduction of materials Unauthorized removal/destruction of materials Unexplained affluence Regular, unexplained foreign travel Maintains long hours in spite of job dissatisfaction Employees are required to report efforts by any individual to obtain illegal or unauthorized access to classified or sensitive information— This include proprietary information INSIDER THREAT Robert Philip Hanssen
22
Sample only Order at www.redbikepublishing.com www.ispcert.com Fax Snail Mail E-mail Telephone Personal Contact May seem innocent enough, but…. Legitimate business requests will come through appropriate channels Personal Contact: Asks about project specifics, whether or not classified or proprietary details Email address originated in a foreign country METHODS OF CONTACT
23
Sample only Order at www.redbikepublishing.com www.ispcert.com Remain non-committal if approached Report all suspicious activities to FSO Practice smart information systems security Escort visitors Pay attention to surroundings Secure building at the end of the day COUNTERMEASURES
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.