Webinar Questions and Answers
|
|
|
- Cynthia Short
- 9 years ago
- Views:
Transcription
1 Insider Threat for DoD Security Professionals Webinar guests submitted several questions before and during the 23 April 2015, Insider Threat for DoD Security Professionals session. The following responses are provided by Mr. Hopkins and the Center for Development of Security Excellence (CDSE): Question: What will motivate other agencies to participate in information sharing? Answer: Please note that my response is focused on actions taken by a component; that said, components will conform to the requirement to establish an insider threat program, and the effectiveness of that program will be contingent on the degree of information shared to facilitate the collection and analysis of information relevant to insider threat behavior or activity. Also note that policies at the DoD and component level are to be reviewed and revised to mandate appropriate information sharing. This is not a negotiable task; everyone has to do it. Question: Will thresholds for triggering insider threat concerns/attention be developed across the Interagency or agency-by-agency? Answer: Unable to answer this question at this time; still being worked. I believe that each department & agency will develop their own triggering thresholds but that s to be determined. Question: How to identify a Sensitive Information breach effectively? Answer: Please refer this question to your information security expert. Question: Will the presentation and slides be available on the DSS site as I'm not able to log in to see them? Answer: The presentation slides, webinar recording, and Q&A will be posted on the CDSE Counterintelligence Webinar Archive page. Question: What if your command does not have the resources-mental health/chaplain? Answer: I am not able to respond to situations that exist at the command or activity-level. The DoD policy I addressed is focused on the requirements for DoD components. The components will be establishing policy and procedures for sub-elements/commands/etc. Question: What do you mean by TMU/hub? Answer: DoD Components must establish an integrated capability (or activity or team) to monitor and audit information for insider threat detection and mitigation. This entity will gather, integrate, review, assess, and respond to information derived from CI, security, cybersecurity, civilian and military personnel management, workplace violence, law enforcement, network monitoring, and other sources to identify, mitigate, and counter insider threats. April
2 Question: Does DoD intend to establish a System of Record for Insider Threat? Answer: Refer to DSS POC for complete answer. Question: How do the components do the self-assessments? Answer: The forthcoming DoD Insider Threat Implementation Plan will provide guidance to DoD Components on what entails a self-assessment. Question: Will employment opportunities be opening up for management of this program at different levels? Answer: This matter rests solely with the Component Head, not a staff office, in OSD. Question: Is there a good model to follow in the development of such a program? Answer: There are several Components that have excellent insider threat programs in operation. We will attempt to highlight them on the DoD Security Policy and Oversight Division (SPOD) webpage. To reach this site you must have access to Intelink on NIPRnet (and you must use a CAC/PIV for access). Once on Intelink, enter this URL to get to the SPOD webpage: Once you are on the webpage, look for the Insider Threat TAB at the top of the page (far right); click on it, and you will be directed to the Insider Threat page, which we are populating with program information and guidance. Question: The Insider Threat Program Personnel are required to have a lot of knowledge on different topics, with support from (potentially unavailable) SMEs (not everyone is in a national intelligence agency). The training and knowledge requirements were extremely vague, and the schoolhouses that currently provide that knowledge is limited to national intelligence agencies (e.g. CISAC, JCITA CIAC, etc.). Where can we look for policy on standardized training and professional development for Insider Threat personnel? Answer: The baseline training topics that need to be brought to the general workforce, and the staff who will work within the insider threat program, will be addressed in the DoD Insider Threat Implementation Plan. This information will guide the development of required instruction within the Components. Question: What is the lowest echelon in which an insider threat program must be established? As far as the Army goes, does annual Threat Awareness and Reporting Program training requirement suffice? Answer: I am not able to answer an Army-unique question, and ask that you contact the HQDA Insider Threat POC, in G-3/5/7. Question: Is there any more funding to offset the additional manpower that it will take to fulfill these new actions? April
3 Answer: At the present time, no funding has been earmarked for additional manpower. The manpower to administer and oversee the component s insider threat program must be re-directed from current organizational assets. Question: With all of the information given, I am assuming that it will take until least Q4 to have an insider threat program established and possibly Q1 of 2016 for implementation? Answer: Your assessment or projection must be unique to your situation; as many DoD Components currently have an insider threat program; and others are making progress that will achieve full operations capability before the end of CY Question: I know this might sound silly... But would the insider threat program inherently fall to the Special Security Office (i.e. SCI world)? Or can this program be managed by a collateral only office? Answer: Management of the Component insider threat program will likely not be performed from the SSO community or the SCI community. We anticipate that the program would be best run from the activity s security section. That said, the actual placement for an insider threat program is left to the discretion of the Component Head or Senior Official. Question: How does the new DoD Insider Threat Policy apply to host nation regarding overseas DoD Installations? Will this drive bilateral agreements and international law changes to facilitate implementation of this new policy? Answer: This DoD policy has no requirements or impact on a Host Nation. That said, U.S. activities supported by a host nation need to heed the directions they get from the DoD Component in their chain of command concerning an insider threat program. Question: How will this be used in the future with retention in the Military? Recruiting? Answer: As far as I can tell, this program will have no impact on recruiting or retention parameters. Question: Please provide the cost estimator to webcast participants when sending attendance confirmation. Thank you. Answer: The program cost estimator will be available to all on the DoD insider threat webpage. To reach this site you must have access to Intelink on NIPRnet (and you must use a CAC/PIV for access). Once on Intelink, enter this URL to get to the SPOD webpage: Once you are on the webpage, look for the Insider Threat TAB at the top of the page (far right); hit it, and you will be directed to the Insider Threat page, which we are populating with program information and guidance. April
4 Question: How do you suggest the Components apply knowledge management IT aspects to the Insider Threat program? If we need data, it all needs to interact and "speak" for aggregation purposes. Answer: Please contact your respective CIO staff official regarding this item. Question: For those Defense Agencies with subcomponents located on military installations (CONUS and OCONUS), does the HUB at the HQ level cover its subcomponents? Or, can the subcomponents feed into the HUB at the military installations level? Answer: This matter must be address by the Component; OSD does not set implementing standards for subcomponents. Question: Is the senior official accrediting or who? Answer: Please provide more information; I cannot answer it as worded. Question: I understand this forum is more for DoD policy, but the recent DITMAC CONOPS sent out was misleading as far as what was initially briefed on their intent. Do you have any input on this? Answer: Refer to DSS POC for complete answer. Question: These programs discussed to this point appear to be heavily focused on "Information" protection - but little information regarding the "physical" element of insider violence. Will additional information be forthcoming from the DoD regarding the physical element of violence? Answer: Unable to answer; out of my topical area. Question: Is it also going to eventually draw from the terrorist watch list? Answer: This remains a possibility; however, authority for DoD components to connect to that database, and the means of connecting to it remain unresolved at this time. Question: Will OUSDI be pushing out standardized training for Insider Threat similar to what exists for AT/FP? So there is a minimum standard? Answer: Yes; this does not impact the minimum standard for training; but it will establish a standard training package. Question: Is IMESA available to the Defense Agencies? Is IMESA limited to Law Enforcement agencies or can Uniformed Security Service personnel utilize it? April
5 Answer: Yes, IMESA is available to Defense Agencies; contact the Defense Manpower Data Center. General obstacles include Components not having Physical Access Control Systems (PACS) that are compatible with IMESA. Question: The Defense Science Board Task Force on - Predicting Violent Behavior provided some excellent recommendations regarding threat management with regard to physical violence. Is the DoD planning on implementing any of those recommendations? Answer: Unable to answer; out of my topical area. Question: Just to revalidate... Did we hear correct that the OUSDI Implementer to should be out in 2 weeks? Answer: The final, signed, document will not be out in two weeks. Our goal remains to get the draft of the implementation plan to DoD Components for review and comment NLT 15 May Question: Where are the specific training requirements for hub personnel identified? Answer: Baseline topics/subjects will be identified in the DoD insider threat implementation plan. Question: What training is available in the civil liberties area? Answer: Unable to answer; out of my topical area. Question: Will CDSE be developing a training curriculum for Insider Threat Program Managers? Answer: CDSE has developed a course Establishing an Insider Threat Program which covers many of the basic elements required for Insider Threat Program Management personnel. At this time, there are no plans to develop a training curriculum. However what a great suggestion. We will take it under advisement. Please note that the National Insider Threat Task Force currently hosts Establishing an Insider Threat Detection Program seminar that is an excellent resource for program management personnel. Question: Who keeps Insider Threat Personnel training records? Answer: Training records will be retained in accordance with DoD Component guidance/procedures. Question: I'm sorry; I forgot what is NITTF stands for? Answer: National Insider Threat Task Force April
6 Question: Good Afternoon, what is the Insider Threat course called that individuals would need to take that access classified. Thank you. Answer: CDSE provides general Insider Threat Awareness course that has been recommended under Directive One issued by the National Insider Threat Task Force. Question: In order to test ITPs (and overall security) where are the red teams/threat emulating teams that you can provide points of contacts for? Answer: For this issue, please coordinate with your servicing intelligence official. Question: When did this requirement go into effect? Answer: Officially, it will go into effect when the Implementation Plan is signed. This plan, though, is based on DoD policy issued in September Question: Much of this overlaps with Work Place violence? Yet I don't hear anything about that correlation. Answer: Collaboration is occurring at OSD and needs to occur at activity level amongst staff personnel. Question: Is the Insider Threat Awareness Training available elsewhere besides the toolkit to provide to command personnel in meeting the initial and annual refresher training requirement? Answer: Although there are several Insider Threat Awareness courses in the community, CDSE provides the only general Insider Threat Awareness course that has been recommended under Directive One issued by the National Insider Threat Task Force. Question: Have you seen the MARADMIN on Insider Threat program it has the Security Manager be appointed as the Program manager. Answer: Unable to answer this question; MARADMIN what is that? Question: Will there be a centralized DoD Hub/TMU for Components to feed their information into for consolidated Analyses? Answer: Yes. Question: Will the DoD CAF be required to share information with insider threat programs? Answer: Conversely, the TMUs/hubs and DITMAC will forward their flags to the DoD CAF. April
7 Question: Does the.16 policy take a pro-active posture to prevent insider threats or is primarily reactive in nature? Answer: It provides guidance that employs both proactive and reactive measures. Question: Will we see funding to support this program sometime in the future? Answer: To Be Determined based on the identification of needs/requirements and program posture versus other Component priorities. Question: Is DBIDS the same as IMESA? Answer: No. DBIDS is an all-inclusive, expandable force protection access control system (i.e., PACS) utilizing biometrics and automatic identification technology. It is designed to verify DoD-produced identification credentials and access authorization of personnel entering military installations or governmentcontrolled areas using machine-based authentication technologies in conjunction with photograph and fingerprint biometric identification. Question: Is there a train the trainer for this program? Answer: Not planned at this time. Question: When can we expect to see the Implementation Plan? Answer: This draft plan should be in your hands NLT 15 May for you to review and comment. If this timeline is met, the plan should be published NLT 15 July. Question: Will this program be required to be integrated within ATFP programs? Answer: This is not a stated requirement, but it makes sense to do so. Question: Are there any plans to look at the CAF s loss of capability to conduct a full Insider Threat review of adjudication files that was loss upon its consolation? Or additional policy to tie the DOD CAF into an Insider Threat program? Answer: The DoD CAF will receive funding to hire additional staff to service the anticipated increase in case workload. Question: Will this be an inspectable program and what inspection will it fall under 107 Answer: At a minimum, the programs will be assessed by: the local insider threat program manager, overseen by the Component Senior Official, monitored by OUSD(I), and subject to NITTF assessment. April
8 Question: What if there are joint programs. How is the requirement initiated and would the requirement fall to all involved, or only DoD personnel? Answer: Cannot answer this until joint is clarified here (multiple Services; or multiple countries). Question: What is your relationship to components regarding implementation? Answer: OSD is obligated to provide implementing guidance to the Components; assist as needed; and receive quarterly and annual program status reports. Question: It does not apply to classified information? Answer: Yes the insider threat program does apply to classified information, and much more. Insider threat is not exclusive to classified information though. Question: In the real world as we continue to downsize employees in the security department. Identifying an individual with the title security administrative as the insider threat officer if they are given the authority to make the decisions. Is this feasible? Answer: This scenario sounds to be dependent on decisions being made at a sub-component level, and OSD is not positioned to comment on this. It s a component level or organizational decision. Question: In regards to SO management and oversight. Do these responsibilities need to be direct management/oversight? Answer: Senior Official duties can be delegated; however, the Senior Official will be held accountable that management and oversight is conducted and corrective actions are taken when necessary. Question: When is IMASA online? And does it do live NCIC checks or are they batched checks? Answer: IMESA is operational now. PACS must be compatible with and connect to IMESA. IMESA vets identity (using biographic information) authorized to access a DoD installation against authoritative data sources (DEERS, FBI/NCIC wants/warrants, installation data, local population data, and (pending) terrorist screening center data, in real time, not batched. Question: Is the initial/annual training for cleared personnel the same as training as the counterintelligence that NCIS gives? Answer: Unable to answer; must defer question to CDSE CI staff. Question: Since this is an unfunded mandate, who does it and what do they stop doing to make this happen? April
9 Answer: The response to this question must come from the respective Component Head. Question: How are recurring Risk Assessments conducted within the program? Answer: In accordance with the DoD Insider Threat Implementation Plan. Question: What is the expected date of implementation to have an insider threat required? Answer: National program standards require Departments and Agencies to have fully operational programs NLT December 31, Accordingly, DoD Components must meet this same timeline. Question: Is there a recommendation on a budget request for this new program? Answer: No standardized recommendation can be offered; however, you can utilize the program cost estimator tool found at the SPOD website: Please note: there were numerous questions from our industry partners regarding the pending update to the NISPOM under Conforming Change 2 (CC2) and attendant Insider Threat Program requirements. Until such time as the update is released, we are unable to comment on program specifics. In the interim, DSS has provided an External Website Notice to provide Information on Pending Insider Threat Program Requirements for Industry. CC2 and/or related Industrial Security Letters are expected to be published within the calendar year and full compliance with the program will be mandated six months from the date of publication. April
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 July 14, 2015 DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This instruction: a. In accordance with
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
For information on the other levels, visit the appropriate security training short.
Student Guide Personnel Security: JPAS Levels 2 and 3 Objective Estimated Completion Time The purpose of this short is to refresh your understanding of JPAS User Levels 2 and 3. 10 Minutes Screen 1 The
2015 Cybersecurity Awareness
2015 Cybersecurity Awareness CDSE Cybersecurity Thomas N. LeBaron, CISSP Cybersecurity Curriculum Manager Mr. LeBaron has been the Cybersecurity Curriculum Manager for CDSE since October 2012 Mr. LeBaron
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3305.13 February 13, 2014 USD(I) SUBJECT: DoD Security Education, Training, and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Federal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.
Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:
Hiring Information Tracking System (HITS)
for the Hiring Information Tracking System (HITS) May 13, 2010 Contact Point Robert Parsons Director, Office of Human Capital U.S. Immigration and Customs Enforcement (202) 732-7770 Reviewing Official
THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC 20301 3010
THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC 20301 3010 ACQUlsmON, TECHNOLOGY AND LOG ISTICS AUG 1 0 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT
INSIDER THREAT PROGRAM DEVELOPMENT TRAINING (INSIDER THREAT SECURITY SPECIALIST COURSE)
INSIDER THREAT PROGRAM DEVELOPMENT TRAINING (INSIDER THREAT SECURITY SPECIALIST COURSE) Presented by: Jim Henderson, CISSP, CCISO CEO, Insider Threat Defense, TopSecretProtection.com, Inc. Counterespionage-Insider
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7045.14 January 25, 2013 USD(C) SUBJECT: The Planning, Programming, Budgeting, and Execution (PPBE) Process References: See Enclosure 1 1. PURPOSE. This Directive:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.03 November 4, 2015 USD(AT&L) SUBJECT: Unique Identification (UID) Standards for Supporting DoD Net-Centric Operations References: See Enclosure 1 1. PURPOSE.
Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),
Review of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region
Review of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region Response to the Deputy Secretary of Defense (DSD) Memo subject Review of the Total Costs
DEFENSE ACQUISITION WORKFORCE
United States Government Accountability Office Report to Congressional Committees December 2015 DEFENSE ACQUISITION WORKFORCE Actions Needed to Guide Planning Efforts and Improve Workforce Capability GAO-16-80
Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program
Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program Office: Name of Beginning Lawyer: Bar No. Name of Mentor: Bar No. MODEL MENTORING PLAN OF ACTIVITIES AND EXPERIENCES FOR STATE
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.29 January 24, 2014 USD(P&R) SUBJECT: Job Training, Employment Skills Training, Apprenticeships, and Internships (JTEST-AI) for Eligible Service Members References:
Department of Defense INSTRUCTION. DoD Civilian Personnel Management System: Volume 250, Civilian Strategic Human Capital Planning (SHCP)
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 250 November 18, 2008 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Volume 250, Civilian Strategic Human Capital Planning (SHCP) References:
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE. This manual: a. Provides accreditation guidance
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
ISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA))
Department of Defense DIRECTIVE NUMBER 5122.05 September 5, 2008 DA&M SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA)) References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5545.04 April 7, 2011 USD(P&R) SUBJECT: Policy on the Congressional Reporting Process for Military Educational Institutions Seeking to Establish, Modify, or Redesignate
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 7600.07 August 3, 2015 IG DoD SUBJECT: DoD Audit Manual References: See Enclosure 1 1. PURPOSE. This manual: a. Reissues DoD 7600.07-M (Reference (a)) in accordance
Frequently Asked Questions
Frequently Asked Questions Naval VAMOSC Public Key Infrastructure/ Common Access Card (PKI/CAC) Registration and Log in Please Note: A PKI-enabled browser is required for certificate registration and to
National Security Adjudicator Training Program
DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
DEFENSE SECURITY SERVICE
DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A STRATEGIC PLAN 2012-2016 Partnership and Service for a Secure Future TABLE OF CONTENTS Who We Are Vision Values
Department of Defense INSTRUCTION. Reduction of Social Security Number (SSN) Use Within DoD
Department of Defense INSTRUCTION NUMBER 1000.30 August 1, 2012 USD(P&R) SUBJECT: Reduction of Social Security Number (SSN) Use Within DoD References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
DON CIO Cyber/IT Workforce Management and Competencies
DON CIO Cyber/IT Workforce Management and Office of the DON CIO February 2010 Twenty thousand people with one year's experience are not the same as 1,000 people with 20 years' experience. You need people
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000 INTELLIGENCE July 8, 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Defense Acquisition Executive Summary (DAES)
DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION Defense Acquisition Executive Summary (DAES) Portfolio Management and Integration Directorate DCMA-INST 406 DCMA-PII Validated current,
SAMPLE COURSE SYLLABUS*
DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
DRAFT REVISED READINESS CHECKLISTS
DRAFT REVISED READINESS CHECKLISTS OVERVIEW The Readiness Checklists are lists of expectations for any health department that is preparing to apply for public health department accreditation. The Checklists
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
COURSES AND. Courses & Products LEARN. PERFORM. PROTECT. CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE REVISED AS OF MARCH 2015 PRODUCTS
DEFENSE SECURITY SERVICE CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE LEARN. PERFORM. PROTECT. COURSES AND REVISED AS OF MARCH 2015 PRODUCTS Courses & Products Revised as of April 2014 A M E R I C A U
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3305.15 August 13, 2015 USD(I) SUBJECT: DoD Human Intelligence (HUMINT) Training and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan
Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan CBI s Biopharmaceutical Forum on Clinical and Commercial Global Supply Chain Excellence Sandy Onorato
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED
Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major
Information Technology (IT) Investment Management Insight Policy for Acquisition
MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES OF DEFENSE DIRECTOR, DEFENSE RESEARCH AND ENGINEERING ASSISTANT SECRETARIES OF DEFENSE GENERAL
NWX-DTSW-DEFENSE SECURITY SERV. Moderator: Nancy McKeown March 12, 2015 10:30 am CT
Page 1 NWX-DTSW-DEFENSE SECURITY SERV March 12, 2015 10:30 am CT Our security vulnerabilities and DSS assessment webinar. So without further ado it's my pleasure to introduce two of the greatest presenters
ACTION: Direct final rule with request for comments. SUMMARY: Defense Logistics Agency (DLA) is exempting records
1 This document is scheduled to be published in the Federal Register on 07/09/2015 and available online at http://federalregister.gov/a/2015-16575, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 6495.03 September 10, 2015 USD(P&R) SUBJECT: Defense Sexual Assault Advocate Certification Program (D-SAACP) References: See Enclosure 1 1. PURPOSE. This instruction:
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
DEPUTY ASSISTANT SECRETARY OF THE AIR FORCE (FORCE MANAGEMENT AND PERSONNEL) DIRECTOR FOR MANPOWER AND PERSONNEL (J-1), JOINT CHIEFS OF STAFF
DEPUTY ASSISTANT SECRETARY OF THE AIR FORCE (FORCE MANAGEMENT AND PERSONNEL) DIRECTOR FOR MANPOWER AND PERSONNEL (J-1), JOINT CHIEFS OF STAFF DIRECTOR, PERSONNEL AND SECURITY, DEPARTMENT OF DEFENSE INSPECTOR
Defense Security Service (DSS)
Fiscal Year 2011 Budget Estimates Defense Security Service (DSS) February 2010 DSS 461 (This page intentionally left blank.) DSS 462 I. Description of Operations Financed (cont.) DEFENSE SECURITY SERVICE
Privacy Impact Assessment
M AY 2, 2013 Privacy Impact Assessment CFPB BUSINESS INTELLIGENCE TOOL Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected]
Department of Defense INSTRUCTION. DoD and Department of Veterans Affairs (VA) Health Care Resource Sharing Program
Department of Defense INSTRUCTION NUMBER 6010.23 January 23, 2012 Incorporating Change 1, Effective October 3, 2013 USD(P&R) SUBJECT: DoD and Department of Veterans Affairs (VA) Health Care Resource Sharing
GAO MILITARY EDUCATION. Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry Programs
GAO United States Government Accountability Office Report to Congressional Committees April 2012 MILITARY EDUCATION Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5120.39 October 1, 2015 USD(P&R) SUBJECT: DoD Wage Fixing Authority - Appropriated Fund and Nonappropriated Fund Compensation Programs References: See Enclosure
April 19, 2006. Human Capital. DoD Security Clearance Process at Requesting Activities (D-2006-077) Department of Defense Office of Inspector General
April 19, 2006 Human Capital DoD Security Clearance Process at Requesting Activities (D-2006-077) Department of Defense Office of Inspector General Quality Integrity Accountability Additional Copies To
Department of Defense Fiscal Year (FY) 2015 Budget Estimates
Department of Defense Fiscal Year (FY) 2015 Budget Estimates March 2014 Defense Security Service Defense Wide Justification Book Volume 5 of 5 Research, Development, Test & Evaluation, Defense-Wide Defense
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
