Download presentation
Presentation is loading. Please wait.
Published byPhilippa Washington Modified over 8 years ago
1
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information
2
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Overview Purpose Objective Team composition Methodology Ground rules Discussion
3
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO To determine the likelihood that critical information can be protected from the adversary’s intelligence collection. Bottom line: OPSEC is emphasized, security is improved, threat awareness raised and mission success rate increased. Purpose
4
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Observe potential vulnerabilities affecting operational effectiveness Apply OPSEC 5-step process: Verify critical information, identify threat, identify vulnerabilities, assess risk & apply / evaluate countermeasures Observe UNCLAS indicators, examine exploitable processes & procedures Evaluate ability to thwart adversary open-source intelligence collection Objective
5
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Team composition Team lead: (Name) Assistant Team lead: (Name) Team member: (Name)
6
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Verify CI Obtain threat assessment: N2, J2, G2, S2 / NCIS, DIA, CID, OSI Foreign intelligence service collectors, terrorists, criminals Identify Vulnerabilities / Conduct assessment (Dates) Evaluate command emphasis, awareness, training; conduct interviews Emulate threat: Open source discovery, dumpster dives [observe routines, compartment / office walk through] Assess risk of vulnerability findings Apply / evaluate countermeasures (recommendations) Threat Brief Day 2 interviews Web Risk Assessment Observations / Trash review Evaluation Complete Program Review Day 1 -7 Day Compartment / office walk through Compile results Open source research Methodology
7
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Ground rules No photographs in controlled compartments / offices Interviews conducted in private when possible Adherence to restrictions / limitations levied by Commanding Officer Any other directions from Commanding Officer
8
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Discussion / Questions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.