TRAINING PRODUCTS & RESOURCES
|
|
- Lydia Ross
- 7 years ago
- Views:
Transcription
1 c e C e n r t e f o r D e v e l o p m e n t o f S C e n t e r i t y e c u r f o r E x D c e e v e l o p m e n l l e n t o f S e c u r i t y E x c e l l e n c e TRAINING PRODUCTS & RESOURCES Industrial Security
2
3 CDSE Industrial Security elearning Courses and Other Resources CDSE Course Catalog Link: All courses and other resources are available through this portal. We have selected some of the more Industrial Security relevant materials and listed them (by discipline) in this handout. 1. Industrial Security 5. Information Security 9. Special Access Program 2. Counterintelligence 6. Personnel Security 10. Non-Industrial Security Job Aids 3. Cybersecurity 7. Physical Security 11. Non-Industrial Security Videos 4. General Security 8. Sensitive Compartmented Information Industrial Security Training Products & Resources 3
4 1-INDUSTRIAL SECURITY (IS) Industrial Security Catalog Link: IS CURRICULA Basic Industrial Security for the Government Security Specialist (IS050.CU) FSO Orientation for Non-Possessing Facilities (IS020.CU) FSO Program Management for Possessing Facilities (IS030.CU) IS elearning Business Structure in the National Security Program (NISP) (IS051.16) Facility Clearances in the NISP (IS140.16) Facility Security Officer (FSO) Role in the NISP (IS021.06) Industrial Security Facilities Database (ISFD) Facility Clearance Verification and Notifications for Industry v3 (IS113.06) Introduction to Industrial Security (IS011.16) NISP Self-Inspection (IS130.16) Personnel Clearances in the NISP (IS142.16) Safeguarding Classified Information in the NISP (IS109.16) Transmission and Transportation for Industry (IS107.16) Understanding Foreign Ownership, Control or Influence (FOCI) (IS065.16) Visits and Meetings in the NISP (IS105.16) IS INSTRUCTOR-LED COURSES Getting Started Seminar for New FSOs (IS121.01) 4 Center for Development of Security Excellence
5 IS SECURITY SHORTS Industrial Security Shorts Business Structures KMP: To Clear or Not to Clear DD Form Industrial Security for Senior Management You re a New FSO: Now What? IS JOB AIDS Job Aids Facility Security Officer Curricula Brochure DD Form 254 Resources 1. Original DD Form Enhanced DD Form 254 with information pop-ups, dropdowns and an Item 13 continuation page 3. How to complete DD Form 254 performance Support Guide (Course) 4. A Guide for the Preparation of a DD Form Administrative Inquiry (AI) Job Aid for Industry Self-Inspection Handbook for NISP Contractors IS WEBINARS Archived Webinars Industrial Security Training Products & Resources 5
6 2-COUNTERINTELLIGENCE (CI) Counterintelligence Catalog Link: CI elearning Insider Threat (JC-CI ) Integrating CI and Threat Awareness into Your Security Program (CI010.16) Thwarting the Enemy: Providing Counterintelligence & Threat Awareness to the Defense Industrial Base (CI111.16) CI SHORTS Suspicious s 3-CYBERSECURITY (CYBER) Cybersecurity Catalog Link: CYBER elearning CyberAwareness Challenge (DS-IA106.06) Cybersecurity Awareness (CI130.16) Introduction to the NISP Certification and Accreditation Process (IS100.16) Social Networking (DS-SN101.06) 4-GENERAL SECURITY (GS) General Security Catalog Link: GS elearning Developing a Security Education and Training Program (GS104.16) Introduction to Risk Management (GS150.06) OPSEC Awareness for Military Members, DoD Employees & Contractors (GS130.16) 6 Center for Development of Security Excellence
7 GS INSTRUCTOR-LED Course Security Awareness for Educators (GS103.01) 5-INFORMATION SECURITY (INFO) Information Security Catalog Link: INFO elearning Classification Conflicts and Evaluations (IF110.16) Derivative Classification (IF103.16) Introduction to Information Security (IF011.16) Marking Classified Information (IF105.16) Phishing (DS-IA103.06) INFO SHORTS Classified Storage Requirements Disposal & Destruction Downgrading & Declassification 6-PERSONNEL SECURITY (PS) Personnel Security Catalog Link: PS elearning Introduction to Personnel Security (PS113.16) JPAS/JCAVS Virtual Training for Security Professionals (PS123.16) OPM e-qip Web Based Training Industrial Security Training Products & Resources 7
8 7-PHYSICAL SECURITY (PY) Physical Security Catalog Link: PY elearning Introduction to Physical Security Concepts (PY011.06) Locks & Key Systems (PY104.16) Physical Security Measures (PY103.16) Storage Containers & Facilities (PY105.16) PY SHORTS DoD Locks Approved to Safeguard Classified and Sensitive Materials 8-SENSITIVE COMPARTMENTED INFORMATION (SCI) Sensitive Compartmented Information Catalog Link: SCI elearning SCI Security Refresher (SCI100.16) 9-SPECIAL ACCESS PROGRAMS (SAP) SAP Security Catalog Link: SAP elearning SAP Overview (SA001.16) SAP SHORTS SAP Security Incidents SAP Types & Categories 8 Center for Development of Security Excellence
9 10-CDSE NON-INDUSTRIAL SECURITY JOB AIDS Procedural Guide for Conducting Classified Conferences NOFORN/REL TO A Quick Reference Guide to Two Dissemination Controls Brochure S&G 2740 Operating Instructions Marking Classified Information Glossary of Security Terms, Definitions, and Acronyms Derivative Classification Training Quick Reference Guide (QRG) for the Newly Updated SF-86 Operating the X-08 Lock How to Receive and Maintain Your Security Clearance Security Posters 11-CDSE NON-INDUSTRIAL SECURITY VIDEOS Security Videos Changing The Combination of S&G 2740 Locks Video Operating S&G Locks Video Packaging Classified Documents Video How to Take Successful Electronic Fingerprints Video Need-to-Know Training Video Operating x-07 and X-09 Locks Video Changing the Combination of X-07 and X-09 Locks Video Industrial Security Training Products & Resources 9
10
11
12 Center for Development of Security Excellence Learn. Perform. Protect. Contact Us:
Table of Contents CDSE. Together, we will address evolving threats to national security so that we can keep our nation and the warfighter safe.
Table of Contents COUNTERINTELLIGENCE GENERAL SECURITY INDUSTRIAL SECURITY INFORMATION SECURITY INTERNATIONAL SECURITY Together, we will address evolving threats to national security so that we can keep
More informationSecurity and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
More information2015 Cybersecurity Awareness
2015 Cybersecurity Awareness CDSE Cybersecurity Thomas N. LeBaron, CISSP Cybersecurity Curriculum Manager Mr. LeBaron has been the Cybersecurity Curriculum Manager for CDSE since October 2012 Mr. LeBaron
More informationSelf-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
More informationCOURSES AND. Courses & Products LEARN. PERFORM. PROTECT. CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE REVISED AS OF MARCH 2015 PRODUCTS
DEFENSE SECURITY SERVICE CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE LEARN. PERFORM. PROTECT. COURSES AND REVISED AS OF MARCH 2015 PRODUCTS Courses & Products Revised as of April 2014 A M E R I C A U
More informationPractice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
More informationMission, Vision and FY10 Initiatives
Mission, Vision and FY10 Initiatives Mission: Provide the Department of Defense with a security center of excellence for the professionalization of the security community and be the premier provider of
More informationWebinar Questions and Answers
Webinar Questions and Answers New Facility Clearance (FCL) Sponsorship for Government Contracting Activities (GCAs) and Prime Contractors (PCs) Webinar guests submitted several questions before and during
More informationDSS Monthly Newsletter
(Sent on behalf of ISR) Dear FSO, DSS Monthly Newsletter December 2012 This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any
More informationNational Information Assurance Corporation A SBA Certified 8(a) SDB & a CVE Verified Service-Disabled Veteran-Owned Small Business
National Information Assurance Corporation A SBA Certified 8(a) SDB & a CVE Verified Service-Disabled Veteran-Owned Small Business Insight into the National Industrial Security Program (NISP) 26th Annual
More informationJoint Personnel Adjudication System (JPAS) Account Request Procedures
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Request Procedures Document Version 4.2 7/23/2015 Table of Contents 1 New JPAS Account Checklist...
More informationCommanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER December 9, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
More informationDefense Security Service Industrial Security Field Operations. FCL Orientation Handbook
Industrial Security Field Operations February 18, 2015 Table of Contents WELCOME MESSAGE FROM DSS DIRECTOR... 3 1.0 FCL ROADMAP... 5 2.0 FCL PROCESS REQUIREMENTS WORKSHEET... 6 3.0 BUSINESS STRUCTURE AND
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
More informationJoint Personnel Adjudication System (JPAS) Account Management Policy
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.8 9/15/2014 Table of Contents 1 PURPOSE... 4 2 BACKGROUND...
More informationSuggested Contractor File Folder Headings
Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.
More informationJOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse.
Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A Center for Development of Security Excellence (CDSE)
More informationIndustrial Security Facilities Database (ISFD) Job Aid. December 2014
Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit
More informationConsultant Annual DoD Security Refresher
Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning
More informationOutside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
More informationFor information on the other levels, visit the appropriate security training short.
Student Guide Personnel Security: JPAS Levels 2 and 3 Objective Estimated Completion Time The purpose of this short is to refresh your understanding of JPAS User Levels 2 and 3. 10 Minutes Screen 1 The
More information03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
More informationJoint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015 Table of Contents 1 PURPOSE... 3 2 BACKGROUND...
More informationDefense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
More informationIntroduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
More information2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
More information1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements
More informationThis directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.
Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the
More informationHow To Do A Vulnerability Assessment
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
More informationThe Security Clearance and Investigation Process
The Security Clearance and Investigation Process OPM s Mission OPM s Mission is to Recruit, Retain and Honor a World-Class Workforce to Serve the American People OPM s Federal Investigative Services (FIS)
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 1 June 18, 2015 USD(I) SUBJECT: DoD Special Access Program (SAP) Security Manual: General Procedures References: See Enclosure 1 1. PURPOSE. a. Manual.
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationNATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING
NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified
More informationOFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND EMERGENCY MANAGEMENT OAK RIDGE OFFICE OFFICE OF SCIENCE U.S. DEPARTMENT OF ENERGY
OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND EMERGENCY MANAGEMENT OAK RIDGE OFFICE OFFICE OF SCIENCE U.S. DEPARTMENT OF ENERGY 3.0 OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
More informationGatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
More informationDepartment of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
More informationInformation Security Program Management Procedures and Guidelines
Directive: LPR 1620.1C Effective Date: June 20, 2014 Expiration Date: May 31, 2019 Langley Research Center Information Security Program Management Procedures and Guidelines National Aeronautics and Space
More informationThere are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.
Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they
More informationCounterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
More informationDefense Security Service (DSS)
Fiscal Year 2011 Budget Estimates Defense Security Service (DSS) February 2010 DSS 461 (This page intentionally left blank.) DSS 462 I. Description of Operations Financed (cont.) DEFENSE SECURITY SERVICE
More informationChapter 17 Headquarters Security Officer Program
Chapter 17 Headquarters Security Officer Program This chapter implements the requirements of HQ Order 472.1, Headquarters Security Officer Program. The goal of the Headquarters Security Officer or HSO
More informationDepartment of the Navy. Information Security Program
THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special assistant for Naval Investigative Matters and Security
More informationObtaining a Facility Security Clearance A Pinkerton Government Services White Paper
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:
More informationISOO Notice 2015-04: Update on Recent Cyber Incidents at OPM
ISOO Notice 2015-04: Update on Recent Cyber Incidents at OPM July 10, 2015 The following notice provides an update on the recent cyber incidents at the U.S. Office of Personnel Management (OPM). The information
More informationJanuary-March 2009, 2d QTR FY09. Upcoming Events. Message from the Installation Security Manager Greetings Newsletter readers,
Newsletter Contents Installation Security 1 Manager s Message Security and Intelligence 2 Division Information Security 3 Security Education 4 Training and Awareness Industrial Security and 5 Foreign Representatives
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 July 14, 2015 DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This instruction: a. In accordance with
More informationDefense Security Service
Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134
More informationUNCLASSIFIED. UNCLASSIFIED Defense Security Service Page 1 of 5 R-1 Line #178
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Defense Security Service Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
More informationU.S. Nuclear Regulatory Commission
ADAMS ML11066A005 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy
More informationDepartment of Defense MANUAL. DoD Information Security Program: Overview, Classification, and Declassification
Department of Defense MANUAL NUMBER 5200.01, Volume 1 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Overview, Classification, and Declassification References: See Enclosure 1 1. PURPOSE
More informationSecurity-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
More informationNational Security Adjudicator Training Program
DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to
More informationU.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD)
U.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD) MD 12.2 NRC CLASSIFIED INFORMATION SECURITY DT-14-15 Volume 12 Security Approved By: Date Approved: June 25, 2014 Expiration Date: June 25,
More informationDD FORM 254 Preparation Guide
Headquarters, Department of the Army, G-2 DD FORM 254 Preparation Guide FY-10 FOREWORD Within The Department of Defense, Industrial Security is identified as the portion of information security concerned
More informationSafeguards and Security
Safeguards and Security Overview The Safeguards and Security (S&S) program mission is to support Departmental research at Office of Science (SC) laboratories by ensuring appropriate levels of protection
More informationDEFENSE SECURITY SERVICE
DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A STRATEGIC PLAN 2012-2016 Partnership and Service for a Secure Future TABLE OF CONTENTS Who We Are Vision Values
More informationIA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE
IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE Commanders, leaders, and managers are responsible for ensuring that Information Assurance/Cybersecurity is part of all Army operations, missions and
More informationGUIDE SECURITY CLEARANCES & FACILITY CLEARANCES. WWW.FEDATTORNEY.COM or Call (202) 787-1900
GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES Washington, DC Office 1800 K Street NW, Suite 1030 Washington, D.C. 20006 To schedule a consultation, call (202) 787-1900 Arlington, VA Office 1300 Wilson
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security References: See Enclosure 1 1. PURPOSE a. Manual.
More informationSECURITY ORIENTATION
SECURITY ORIENTATION Administration and Resource Management Division Security Programs and Information Management Branch HQMC Security Manager: Kevin J White HQMC Assistant Security Manager: Orlando Roman
More informationDEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS
DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS 21 NOVEMBER 2014 Contents SCOPE CHAPTER 1 INTRODUCTION... 4 1.1 PURPOSE AND BACKGROUND... 4 1.2 POLICY AND REGULATIONS...
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5240.06 May 17, 2011 Incorporating Change 1, May 30, 2013 USD(I) SUBJECT: Counterintelligence Awareness and Reporting (CIAR) References: See Enclosure 1 1. PURPOSE.
More informationData Breach Essentials
BDO KNOWLEDGE WEBINAR SERIES Data Breach Essentials June 2014 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee,
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 16-1404 29 MAY 2015 Operations Support AIR FORCE INFORMATION SECURITY PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:
More informationPOSITION CLASSIFICATION STANDARD FOR SECURITY ADMINISTRATION SERIES, GS-0080
POSITION CLASSIFICATION STANDARD FOR SECURITY ADMINISTRATION SERIES, GS-0080 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 Nature of Security Work... 6 Personnel
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MISSION DIRECTIVE 39 7 MAY 2015 AIR FORCE OFFICE OF SPECIAL INVESTIGATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
More informationArmy Regulation 380 5. Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED
Army Regulation 380 5 Security Department of the Army Information Security Program Headquarters Department of the Army Washington, DC 29 September 2000 UNCLASSIFIED SUMMARY of CHANGE AR 380 5 Department
More informationDepartment of Defense Fiscal Year (FY) 2015 Budget Estimates
Department of Defense Fiscal Year (FY) 2015 Budget Estimates March 2014 Defense Security Service Defense Wide Justification Book Volume 5 of 5 Research, Development, Test & Evaluation, Defense-Wide Defense
More informationYour Personal Information: Protecting it from Exploitation
Your Personal Information: Protecting it from Exploitation Data breaches involving personal information result in a broad range of risks to individuals and organizations. This includes identity theft,
More informationDEPARTMENT OF DEFENSE DeCA DIRECTIVE 35-30 HEADQUARTERS DEFENSE COMMISSARY AGENCY Fort Lee VA 28301-6300 August 1, 1995. Information Management
DEPARTMENT OF DEFENSE DeCA DIRECTIVE 35-30 HEADQUARTERS DEFENSE COMMISSARY AGENCY Fort Lee VA 28301-6300 August 1, 1995 Information Management INFORMATION SYSTEMS SECURITY (INFOSEC) AWARENESS TRAINING
More informationLogging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
More informationSecurity Awareness Program Learning Objectives. By Aron Warren Last Update 6/29/2012
Security Awareness Program Learning Objectives By Aron Warren Last Update 6/29/2012 Module 1: You are a target You are a target Explain how employees are a target from both domestic and foreign threats.
More informationINTELLIGENCE COMMUNITY STANDARD NUMBER 700-1
ICS 700-1 INTELLIGENCE COMMUNITY STANDARD NUMBER 700-1 GLOSSARY OF SECURITY TERMS, DEFINITIONS, AND ACRONYMS (EFFECTIVE DATE REMAINS: 4 APRIL 2008) NOTICE: RENUMBERING OF INTELLIGENCE COMMUNITY STANDARD
More informationDSS/NCMS Leadership Quarterly Meeting 15 November 2013
1. Kudos: FSO Toolkit and our continued partnership in light of challenges. 2. Government Shutdown Update a. Personnel Security Clearance backlog & PR s. Can you provide us an update? With the recent PR
More informationHiring Information Tracking System (HITS)
for the Hiring Information Tracking System (HITS) May 13, 2010 Contact Point Robert Parsons Director, Office of Human Capital U.S. Immigration and Customs Enforcement (202) 732-7770 Reviewing Official
More informationIT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance
More informationInformation Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
More information2. Completing Specific Sections of the Questionnaire for National Security Positions (SF 86)
Contractor Facility Security Officer (FSO) Review of the Questionnaire for National Security Position (Standard Form 86 (SF-86), Revised July 2008) Last Updated March 2009 1. Key Points This document contains
More informationFOREWORD. NCSC-TG-027 Library No. 5-238,461 Version-I
NCSC-TG-027 Library No. 5-238,461 Version-I FOREWORD The National Computer Security Center is issuing A Guide to Understanding Information System Security Officer Responsibilities for Automated Information
More informationDepartment of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
More informationINFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
More informationNational Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
More informationHow To Evaluate A Dod Cyber Red Team
CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,
More informationBest Practices and Vulnerabilities for
for Privileged Accounts NAVIGATION IN THE MEETING ROOM Poll Enlarge Screen Q & A Closed Captioning below Notes & Announcements File Share Overview Define Privilege Account Identify Common Types of Privileged
More informationThe United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the Northrop
More informationDepartment of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
More informationUNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)
Headquarters, U.S. Marine Corps MCO P5510.18A PCN 10208490600 UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) DISTRIBUTION STATEMENT A: Approved
More informationhttps://www.usajobs.gov/getjob/viewdetails/391530800
Page 1 of 6 Home Search Jobs My Account Resource Center SIGN IN OR CREATE AN ACCOUNT Keyword: Keywords, Job Title, Control #, Agency Location: City, State, ZIP Code, or Country Search Advanced Search >
More informationNWX-DTSW-DEFENSE SECURITY SERV. Moderator: Nancy McKeown March 12, 2015 10:30 am CT
Page 1 NWX-DTSW-DEFENSE SECURITY SERV March 12, 2015 10:30 am CT Our security vulnerabilities and DSS assessment webinar. So without further ado it's my pleasure to introduce two of the greatest presenters
More information2009 Stakeholder Report
2009 Stakeholder Report Defense Security Service The editorial content of this publication was prepared, edited, and approved by the Director, Defense Security Service. The views and opinions expressed
More informationOutside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014 Training Objectives FOCI Control Procedures
More informationINSTRUCTION. Department of Defense. NUMBER 5230.24 August 23, 2012 USD(AT&L) Distribution Statements on Technical Documents
Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues
More informationDepartment of Defense Fiscal Year (FY) 2013 President's Budget Submission
Department of Defense Fiscal Year (FY) 2013 President's Budget Submission February 2012 Defense Security Service Justification Book Research, Development, Test & Evaluation, Defense-Wide THIS PAGE INTENTIONALLY
More informationDepartment of Defense MANUAL. DoD Information Security Program: Protection of Classified Information
Department of Defense MANUAL NUMBER 5200.01, Volume 3 February 24, 2012 Incorporating Change 2, March 19, 2013 USD(I) SUBJECT: DoD Information Security Program: Protection of Classified Information References:
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3305.13 February 13, 2014 USD(I) SUBJECT: DoD Security Education, Training, and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the authority
More information