DiscoverDoD Secure-Working with National Industrial Security Program
DoD Secure-Working with National Industrial Security Program
Claim Ownership

DoD Secure-Working with National Industrial Security Program

Author: jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC

Subscribed: 9Played: 58
Share

Description

Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past and others don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your questions and walks the reader through the process.It's like having a security clearance roadmap and a private guide.What I've learned after over two decades in the field is that fear and misunderstandings stop people from making good career decisions such as applying for security clearance jobs. Just like any career goal or dream, you can probably list a few reasons why you should give up before you even try. Here are a few common misconceptions:I have a bad past; so they won't give me a clearance. Everyone will see my personal secretsSecurity clearances cost a lot of moneyIt takes years to get a security clearanceSecurity clearances are too competitive; they'll never give me oneNone of these are true. Insider's Guide to Security Clearance gives you the real information and solutions you need to go after that security clearance job.Inside you'll find answers to your security clearance questions and information you can use immediately. My name is Jeff Bennett and I've been working with a security clearance for decades. I understand the system well and want to share with you my knowledge. I've taught courses in college, given security training to corporations, led security teams, and written many books on the subject. I think you will be pleased with this book. If you like it, please provide a review and recommend it to your friends.Visit www.redbikepublishing.com for links to our security clearance blog and podcast. We also have training at www.bennettinstitute.comWebsites and mentions: https://www.redbikepublishing.com security clearance and classified work books and traininghttps://www.bennettinstitute.com security clearance and performing on classified work consulting and traininghttps://amzn.to/39iYPVL How to Win Government Contracts and Classified Workhttps://www.redbikepublishing.com/fso...https://amzn.to/2CVmyz6Watch this on Youtube:https://youtu.be/48mGX03udtw
38 Episodes
Reverse
A cleared contractor can help reduce expenses with by preparing ahead of time. This is where an experience FSO can anticipate expenses, perform risk assessment while implementing NISPOM and advise on ways to reduce costs while being compliant. The more money saved on overhead expenses, the greater the overall company profit. The earlier into the process the assessment is conducted the better the company performs overall.It's a common practice to allow employees to use enterprise computers outside of the enterprise. This has become more common where employees are increasingly working at home. Though a common practice, these occurrences are not always best practices. Anytime an employee leaves work with a company computer, the expectation is that all information is vulnerable.  Protecting classified material – The proper receipt, accountability, storage, dissemination and destruction of classified material. Link to CDSE training https://www.cdse.edu/Required training – This instruction helps the FSO establish an ongoing training program designed to create an environment of security conscious cleared employees.Personnel security clearances – The FSO gains an understanding of the personnel security clearance request procedure, briefing techniques and maintenance of personnel clearances.You can find study recommendations, practice questions and NISPOM links at https://www.redbikepublishing.com/ispcertification/ and https://bennettinstitute.com/course/ispisoctipis/If you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyJeff's Website Jeff is available for speaking and consultingRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)
Red Bike Publishing is pleased to announce the new NISPOM. National Industrial Security Program Operating Manual 32 CFR Part 117.  An FSO has readily available data to determine and communicate the effectiveness of the security program. Gathering available information, creating a detailed database and performing solid analysis will determine the program's success.End of day checks serve as a precaution against leaving classified information unattended.Feel free to contact us for information on how to promote your business through our newsletter.     NISPOM Training Topics:Insider ThreatInitial / Annual Security AwarenessDerivative ClassifierNon Disclosure AgreementIf you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Jeff's Website Jeff is available for speaking and consultingSIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.redbikepublishing.com/insidersguide/)
   Red Bike Publishing is pleased to announce the addition of training. We have created a training program that includes an Initial Security Training/Annual Awareness Training presentation and much more required by NISPOM. Instead of designing your own, just download and present these. You can even modify them (which we recommend) or tailor to your CDC business. Feel free to contact us for information on how to promote your business through our newsletter.     Jeff has made an online recorded version of the course NISPOM Fundamentals that he formerly taught at the University of Alabama Huntsville. He is available teach similar courses at your companies. Send an email to editor@redbikepublishing.com. Red Bike Publishing offers generous royalties and are able to reach over 30,000 people through various magazines, Amazon.com, and other bookstores. Red Bike Publishing uses professional printing and distribute through Ingram, Baker and Taylor, Barnes and Noble and much more.Sometimes life imitates art. Just like in the thrillers that we watch or read, the evil doers seem to either be or think they are smarter than the good guys. They find loopholes that protect their crimes and there isn't a thing the good guys can do about it. Finally, at the last climatic moments, the good guys find the evidence they need to make a prosecution stick. Just like in the movies.A similar thriller plays out in a courtroom according to a January 22, 2010 Washington Examiner article called "Defense Official's Mom Introduces Him to Chinese Spy". According to the Article, James Wilbur Fondren provided three papers to a Taiwanese businessman who paid a consulting fee. Unbeknownst to Mr. Fondren, the Taiwanese businessman was a Chinese Spy. NISPOM Training Topics:Insider ThreatInitial / Annual Security AwarenessDerivative ClassifierNon Disclosure AgreementIf youSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyJeff's Website Jeff is available for speaking and consultingBennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Support the show (https://www.redbikepublishing.com/insidersguide/)
Contact/newsletter:redbikepublishing.com/contactThe National Industrial Security Program NISPOM is THE guidance for Cleared Defense Contractors (CDC) performing on classified contracts. However, it doesn’t always answer some questions these FSOs might have about protecting classified information. For example, suppose a defense contractor company has a contract requiring the storage of classified information at the SECRET level. Do they need an alarm?You might recall in earlier articles that I’ve emphasized the importance of finding out what the threats to classified information are to your particular organization. Be aware of NISPOM vs. Best Practices, vs. Risk Assessment before committing resources that may or may not be required. Industry standards and common practices may almost seem like requirements, but can be expensive endeavors if not necessary to implement. To some, it may be unheard of not to have alarms, cameras or access control systems (door magnets and card readers). However, these are not required in NISPOM (except for intrusion detection systems as identified in certain situations and not in all situations).Prior to travel, a cleared employee should have a good understanding of their responsibilities to protect national security. A Defensive Security Briefing is for those who travel overseas and may be vulnerable to foreign entity recruiting methods. They should be constructed to make the cleared traveler aware of their responsibilities to protect employees, product, customers and those with which they do business. Topics of the defense security briefing should include threat recognition, how to assess and how to respond when approached for recruitment.The Facility Security Officer’s successful program depends on developing relationships with employees, managers and executives to facilitate execution of company policies and adherence to NISPOM. This includes security awareness training, participation in continuous evaluation, and tracking changes of status, and proactive action toward expired, existing and future classified coSupport the show (https://www.redbikepublishing.com/insidersguide/)Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Jeff's Website Jeff is available for speaking and consultingMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs.
While Facility Security Officers, government and military employees do an incredible job at training employees, implementing and directing security programs to protect classified information, a more menacing threat is still left unchecked.     The security industry spends terrific amounts of money fortifying and constructing buildings based on best practices and not entirely on a risk assessment. The NISPOM and other regulations advise on focusing protection and reducing costs. However, without a proper risk assessment, they may fall short of meeting legitimate threats.  The current practice makes it very difficult for someone to break in and steal secrets.  In light of addressing best practices, the main threat should not be overlooked or neglected. For example, when was the last time you read of buildings being broken into and safes blasted open or being cracked to obtain our nation's secrets? Facility security officers and industrial security professionals should develop measures to safeguard classified information at the highest level indicated. Employees should be trained to perform on these contracts based on NISPOM Guidance. This training includes:Non Disclosure Agreement (SF 312)Derivative ClassifierSecurity Awareness Initial and Annual RefresherInsider Threat A buzz is sweeping the security community since the industry has been notified of the recent updates to DoD's CUI program based on the presidential memorandum with the subject, Designation and sharing of Controlled Unclassified Information (CUI). This memorandum implements a program designed to encourage the speedy sharing of information to those authorized and to better protect the information, privacy and legal rights of Americans. The CUI program is designed to promote proper safeguarding and dissemination of unclassified information.      Many readers may be familiar with the program CUI has replaced. Sensitive But Unclassified (SBU) information had enjoyed protection to a certain level but was not conducive to the necessary information sharing. Controlled Unclassified Information (CUI) directives provide procedures for a more apprSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Jeff's Website Jeff is available for speaking and consultingSupport the show (https://www.redbikepublishing.com/insidersguide/)
NISPOM Seminar https://www.redbikepublishing.com/nispom-seminar/Study NISPOM Fundamentals in Four hour sessionWe excited to offer two live NISPOM Seminar events:• 23 March 4-8 Pm CST• 30 March 4-8 Pm CSTPrepare for the Industrial Security Professional ISP Certification (ISP) and the DoD’s SPeD Industrial Security Oversight Certification (ISOC). Those and several similar motivational publications stress that everyone has the same amount of time in a day. What we do during that time helps us either make or goals or fail before we even get started.   As leaders, FSOs can help cleared defense contractor employees understand how to create incredible security programs. Focusing on training, interaction with other cleared employees, self-improvement and institutional education should be part of professional development. FSOs and managers who write evaluations for direct reports have an excellent opportunity to help them establish goals to become better at their jobs, more impactful in their careers and hopefully, groomed to become FSO’s themselves. Challenging employees and team members to achieve personal and professional goals breeds success.Security certifications such as ISP Certification and ISOC certification are goals cleared employees could take as a goal as well as encourage employees to achieve. The employee gains from such education and a prestigious career milestone. The organization also benefits from what the security employee learns and applies on the job. When employees study for the ISP Certification, they learn: how to read and apply the NISPOM, the importance of forming professional relationships with cleared employees, how the cleared contractor and the DSS representatives interact, and much more.   A leader also creates pride in the organization and employee by making them more competitive in their career and providing basis for professional pride. When employees are challenged with the goal, the manager can help by providing or allowing education as found on the DCSA, professional organization or vendor websites. Studies on NISPOM topics are available on the internet as well as on site. If your team is large enough, consider helping them start a study group.   Here are 2 good training ideas:1. If the cleared contractor facility has multiple security employees, provide an opportunity to cross train. Security employees who work personnel security issues could work with document control and etc. Also, consider allowing security employees from one discipline inspect anther security section during the annual self inspection.2. Another Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.redbikepublishing.com/insidersguide/)
 So let’s talk professional goals, the NCMS’ ISP Certification and CDSE's ISOC are great ones to strive for.1.  Begin at the NCMS, ISP Certification information website @ http://www.ncms-isp.org/ISP_Certification/index.asp. If your goal is ISOC certification, begin at the CDSE website. 2. Understand the application process. There are minimum experience requirements that applicants must meet as well as administrative tasks built into the process.3. Understand the requirements and get a feel of where you are professionally and any gaps you need to breach to bring your knowledge of NISPOM and ISP or ISOC  Certification categories to where it needs to be. It’s not necessary to be an expert in all areas or to be able to quote regulations and requirements. 4. The following are some things that you can do to prepare to fill those knowledge gaps:a. Study the NISPOM and other reference document structure and understand where to find topic related information. Also, become familiar with key industry standard words found in the source documents. b. Join a study group. There you can study their material, ask questions and get feedback.c. Find a mentor. 5. Set a date. Join our reader list for more articles. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security Clearancessecurity training NISPOM ISP® and ISOC certification. CDSE websiteNCMSNISPOM/FSO TrainingSupport the show (https://www.redbikepublishing.com/insidersguide/)Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.
In the course of performing on classified defense contracts, exchange of classified information is inevitable. While, the movement of classified information outside of a secure environment is to be kept to a minimum, there are times it must be moved in fulfillment of requirements.As the senior industrial security manager in CDCs, the FSO leads the security program designed to protect classified information and prevent unauthorized disclosure. While working in the secure environment, contractors protect classified information under their control and cleared employees protect classified information entrusted to them. Classified Meetings:Prior to the start of a classified meeting either the government sponsor or the contractor representative should provide a security briefing notifying attendees of the classification of information to be discussed, whether or not taking notes is permitted and if so, how they will be controlled. For example, when classified notes are permitted, they will have to be properly marked, introduced into accountability and prepared for dissemination (hand carry with the attendee or mailed at a later date). The presentation is controlled to prevent the inadvertent and unauthorized release. Each attendee should also be reminded to remove any cell phones or other electronic devices.In the National Industrial Security Program Operating Manual (NISPOM), we have a similar package "reveal". Security specialists, document control professionals, facility security officers and others in possessing facilities may receive classified information, depending on the contract. Part of the receipt is the critical inspection of the package during the integration process. As they unwrap the package, the inspector is orienting themselves to better understand what they should be receiving. This begins by inspecting the package physically, then comparing the contents with the receipt. They are also searching for evidence of tampering or to otherwise to inspect that there has been no compromise of classified material since leaving the sender’s organization. I also recommend using current NISPOM for security training and ISP® and ISOC certification. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security ClearancesSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyAccess Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.redbikepublishing.com/insidersguide/)
The latest industry buzz is the “release of the new National Industrial Security Program Operating Manual (NISPOM)”. I’m putting air quotes in there, because an actual NISPOM has not been rewritten or re-released. There is no re-release of NISPOM, only a reorganization of the CFRs that duplicate National Industrial Security Program requirements.Conclusion:  No new NISPOM (just a few additions)·                 32 CFR part 117 and 32 CFR part 2004 are redundant requirements·                DoD will no longer publish the DoD Manual 5220.22, NISPOM as a DoD policy issuance in 32 CFR part 117.·                 32 CFR part 2004, “National Industrial Security Program” is now the standing CFR·                NISPOM Change 2 is still a requirement that Cleared Defense Contractor (CDC) must followBackgroundA quick read will review that there actually is no new NISPOM. This information just codifies (fancy legal term for: arrange (laws or rules) into a systematic code.).You might know that the Director of National Intelligence (DNI) has had a large role in developing NISPOM. Primarily DNI oversees the protection of National Intelligence Information in the hands of the cleared defense contractors. Additionally, DNI has had executive roles In relation to the 2008 publication of E.O. 13467, “Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information.Biggest Impact: Reporting based on 13 Adjudicative Criteria, SF-86, and SEAD 3  SEAD 3 identifies required reporting of data elements that are contained in the Standard Form-86, “Questionnaire for National Security Positions” used in requesting security clearance requests. This doesn’t seem to be a new requirement, but an emphasis as many FSOs have been providing this requirement in security awareness training.For more information on SEAD 3, check this out: https://www.dni.gov/files/NCSC/documents/Regulations/SEAD-3-awareness-briefing.pdfDon’t wait for a new version of NISPOM…yet. While there is no “new NISPOM”, there are some clarifying comments. I also recommend using current NISPOM for security training and ISP® and ISOC certificationSupport the show (https://www.redbikepublishing.com/insidersguide/)Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediately
  We are pleased to present the newest podcast. In this issue, we address security certification and security training because; New Year's Resolutions. ISP® AND ISOC Master Exam Prep is now available here and at most online book stores.Also, we've provided real world security discussions and frequently asked questions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do.  We would love to hear your stories as well.     We hope you continue to learn and benefit from our newsletter and products. If you are, please refer us to a friend or forward this newsletter with our appreciation.  Stop by our advertisers websites as well. You just might find what you are looking for.  Have you taken the next step to being competitive in the government contracts arena? If not, this article will provide information and tips based on a proven method of studying for and passing the exam. Why earn a certification?There are several reasons to achieve certification. One of which allows cleared defense contractor owners and employees to take advantage of opportunities offered in the recent Presidential Executive Order: National Security Professional Development. The Executive order states: "In order to enhance the national security of the United States...it is the policy of the United States to promote the education, training, and experience of current and future professionals in national security positions (security professionals)..."The National Strategy identified in the Executive Order provides a plan to give security professionals access to education, training to increase their professional experience in efforts to increase their skill level and ability to protect our nation's secrets.The ISP Certification is sponsored by NCMS (Society for Industrial Security) a professional organization specializing in protecting classified information. The ISP holder demonstrates a high level of knowledge in this area. The certification is based on the National Industrial Security Professional Operating Manual (NISPOM) but also covers electives such as: COMSEC, OPSEC, and other topics.Industrial Security Oversight Certification (ISOC) is sponsored by the Department of Defense and information can be accessed at https://www.cdse.edu/certification/Guidance for protection classified information that can be applied for training and certification: How to Get U.S. Government Contracts and Classified Work | Red Bike Publishing https://bSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)
     In this issue, we've provided real world security discussions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do.     Preparing for growth involves the FSO not only training and hiring security employees, but accurately calculating classified inventory storage and work performance needs. Meeting legitimate growth is another area where an FSO should be injected into strategic planning. Classified contract opportunities present themselves in many variations.     Potential security professionals should not only be U.S. citizens with security clearances, but demonstrate competence in the tasks they are asked to do and a desire to perform. They should also have the ability to grasp and teach concepts of security to help keep the security fresh in the corporate culture.     During the certification training, the new employee can enroll in government provided on-line and residence training, lessons provided by company personnel and directly under their manager's supervision.        The end of day security checklists play a critical role in protecting classified items as well as personal, proprietary and company sensitive material. The end of day checklist is a procedure required in the NISPOM and other federal agency regulations. However, they could be implemented in any situation where privileged or sensitive items prove vulnerable to theft or espionage.           "What defines this room as approved for open storage?" I had asked while consulting on a project a few years ago.    I had been in the middle of a deep security application discussion. The whole time I realized that the security employees I consulted understood their responsibilities, but did not know why the security measures were in place or where to find the guidance. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security ClearancesSecurity Clearance and NISPOM TrainingSupport the show (https://www.redbikepublishing.com/insidersguide/)Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyBennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.
ITAR issuesA few years ago I facilitated a short but very rewarding eight hour seminar on the International Traffic In Arms Regulation (ITAR) Overview. I am grateful to the staff at the University of Alabama in Huntsville and the North Alabama Trade Association for both sponsoring the event and allowing me to present. I found the course rewarding as I presented to a mixed audience of 30 professionals ranging from shipping and receiving specialists to executive vice presidents. The mix also consisted of professionals with various degrees of know-how as consultants, attorneys, technology control officers and those brand new to the field shared experiences and learned from one another. As a compliance officer in various disciplines, I have had the privilege of leading security and compliance teams and seminars on multiple topicsThough this was my first of hopefully many export regulations seminars, I noticed the similar need in the compliance field. Regardless of the discipline, compliance works best when driven from the top down. No matter the program a compliance officer intends to build or support, Influence is key when developing it whether security, privacy protection, safety, export, etc. Experience and technical savvy are great to have however, minus influence; the person is just an administrator playing catch-up in a crucial game. Let’s test your knowledge of international operations. The following situation is pure fiction, but is based on issues facing businesses everyday. This situation is tricky enough with unclassified contracts, but the addition of possible classified work may complicate the issue. Try to answer the following question:As the security manager of a classified facility, you have many responsibilities including approving classified visits. Not a problems since most visit requests are handled through agency approved data bases . Besides, you have a very large staff and the process is pretty much routine until….A program manager enters your office and informs you that her foreign customer wants to send an employee to work onsite on a classified program for six months. The program manager wants you to give her a visit request form that the foreign company can use to submit a visit request. You think about this for a moment and realize that though the situation is unusual, it should be a workable solution. Do you provide the visit request form? Why or why not?Security QuestionsReaders of this newsletter can use the same questions while conducting walk around security or otherwise conducting a security survey. Field these questions to your teams. If they respond correctly give loud and public praise. If they answer incorrectly you have just created a training opportunitySecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)
An FSO can train and write NIPSOM based policy and training, but without the enterprise’s full cooperation, will find it difficult to enforce.The coordination will allow the FSO to be proactive and better support the company's performance on classified contracts. Having a security program integrated into all aspects of the company produces award winning situations and dramatically reduces security violations. Prior to travel, a cleared employee should have a good understanding of their responsibilities to protect national security. Though usually snuggled into Security Awareness Training, A Defensive Security Briefing should also be "stand along" and for those who travel overseas and possibly vulnerable to foreign entity recruiting methods. This training should be constructed to make the cleared traveler aware of their responsibilities to protect employees, product, customers and those with which they do business. Topics of the defense security briefing should include threat recognition, how to assess and how to respond when approached for recruitmentHere are a few common security clearance misconceptions: I have a bad past Everyone will see my personal secrets Security clearances cost a lot of moneyWebsites and mentions: https://www.redbikepublishing.com security clearance and classified work books and training https://www.bennettinstitute.com security clearance and performing on classified work consulting and training https://amzn.to/39iYPVL How to Win Government Contracts and Classified WorkSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)
We discuss the security clearance investigation and the importance of protecting classified information. You can support our show by buying Insider's Guide to Security Clearances https://amzn.to/2JUjnIcThis is great for dod security professionals, industrial security professionals, those who have questions about dod security clearances, and much more. Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past.Many don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your questions and walks the reader through the process.It's like having a security clearance roadmap and a private guide.What I've learned after over two decades in the field is that fear and misunderstandings stop people from making good career decisions such as applying for security clearance jobs. Just like any career goal or dream, you can probably list a few reasons why you should give up before you even try. Here are a few common misconceptions:I have a bad past; so they won't give me a clearance. Everyone will see my personal secretsSecurity clearances cost a lot of moneyIt takes years to get a security clearanceSecurity clearances are too competitive; they'll never give me oneNone of these are true. Insider's Guide to Security Clearance gives you the real information and solutions you need to go after that security clearance job.Inside you'll find answers to your security clearance questions and information you can use immediately. My name is Jeff Bennett and I've been working with a security clearance for decades. I understand the system well and want to share with you my knowledge. I've taught courses in college, given security training to corporations, led security teams, and written many books on the subject. I think you will be pleased with this book. If you like it, please provide a review and recommend it to your friends.Support the show (https://www.redbikepublishing.com/insidersguide/)
Discussion of sexual activity and security clearancesSupport the show (https://www.redbikepublishing.com/insidersguide/)
Why are we giving our sensitive information away so easily?Evaluating risk is very important. Risk events should be used to determine where vulnerabilities exist and the best approach to mitigating those vulnerabilities. We evaluate risks to viruses, sickness, how to protect sensitive information and what to put on social media or websites. Support the show (https://www.redbikepublishing.com/insidersguide/)
Anchor points, counterintelligence, smart security, Defensive Information Countering Everything.Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years.www.redbikepublishing.comSupport the show (https://www.redbikepublishing.com/insidersguide/)
An interview with Ray Semko world renown security and counter-intelligence speaker and trainer.Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years.Support the show (https://www.redbikepublishing.com/insidersguide/)
Regarding each of the 13 Adjudicative Criteria, the applicant should gather all information available to explain the behavior that could cause a denial of a security clearance. The information should be presented during follow up interviews or as requested for review. Being well prepared will help with the adjudicative process and may result in a favorable decision. However, a lack of preparation may not fare so well. Remember, the adjudicator makes decisions with the priority being on risk to national security.The adjudicators consider the following as they try to make a decision as to whether or not the applicant will be a national security risk. They make security clearance decisions based on interest to national security. Consequently, the applicant is required to demonstrate they are not a threat to national security and should provide artifacts demonstrating that though they may have been a risk to national security at one point, that risk has been mitigated.Support the show (https://www.redbikepublishing.com/insidersguide/)
Adjudicative Guideline H: Drug Involvement is another concern that could lead to the denial or revocation of a security clearance. Drug involvement includes the abuse of illicit and legal drugs. However, a review of security clearance cases demonstrates that marijuana continues to be a concern for many applicants. Additionally, new state laws, public opinion, and attitudes may make it tempting for Americans to casually use marijuana and other drugs. Recently Colorado and other states have legalized the use of marijuana and some states also allow the use of medical marijuana. However, where national security is concerned, marijuana and the abuse of legal and illicit drugs for any reason can be cause for denial of a security clearance. Support the show (https://www.redbikepublishing.com/insidersguide/)
loading
Comments 
Download from Google Play
Download from App Store