Security Program nyilvános
[search 0]
Több
Download the App!
show episodes
 
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
  continue reading
 
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past and others don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your question ...
  continue reading
 
Loading …
show series
 
In this conversation, Robert Wood, CEO of Sidekick Security, interviews Tyler Healy, CISO of DigitalOcean, discussing the evolution of security leadership, the importance of security as an enabler for business growth, and the dynamics of building a security team. They explore the challenges of engaging with customers, fostering internal relationshi…
  continue reading
 
Summary In this conversation, Robert Wood and Joe Lewis discuss the complexities of leading cybersecurity efforts within a large organization like the CDC. They explore the balance between security and mission enablement, the nuances of risk management, and the importance of compliance. Joe emphasizes the need for humility in leadership, the value …
  continue reading
 
Send us a text Get the Training Security Training; It's That Important NISPOM requires that every cleared employee receives the initial training and the annual refresher training The rational for initial and refresher is because new employees are introduced to sensitive and classified government information and they should learn the fundamentals. H…
  continue reading
 
Send us a text For some, the FSO designation is a career track with potential growth. For others, it’s an undesired appointment, part of doing business and just another additional duty. However, this responsibility should be taken very seriously as classified contracts depend on success. Regardless of whether desired or appointed, the FSO is key to…
  continue reading
 
Send us a text This is a collaborative effort with Clearancejobs.com and an interview from my newest book, Establish and Insider Threat Program Under NISPOM FSOs have a huge responsibility to protect contractor information. One important job is to start with an insider threat program. Most people make the mistake of relying on tracking employees an…
  continue reading
 
Send us a text Jeff is available for speaking and consulting https://jeffreywbennett.com https://jeffreywbennett.thinkific.com FSOs have a huge responsibility to protect contractor information. One important job is to start with an insider threat program. Most people make the mistake of relying on tracking employees and looking for suspicious behav…
  continue reading
 
Send us a text Free security clearance seminare https://www.redbikepublishing.com/securityclearanceseminar/ NISPOM Fundamentals https://www.bennettinstitute.com Stay tuned for more information about our upcoming book. In the meantime, if you need to provide Insider Threat Training, you can download and present your very own to your employees NISPOM…
  continue reading
 
Send us a text We are having a security clearance webinar. FInd more information here: https://www.redbikepublishing.com/securityclearanceseminar/ This podcast is based on information from our NISPOM fundamentals course at https://www.bennettinstitute.com Podcast discusses: Holding a security clearance is a privilege. The awardee is able to perform…
  continue reading
 
Send us a text We are having a security clearance webinar. FInd more information here: https://www.redbikepublishing.com/securityclearanceseminar/ This podcast is based on information from our NISPOM fundamentals course at https://www.bennettinstitute.com Podcast discusses: Facility Security Clearances (for businesses) Personnel Security Clearances…
  continue reading
 
Send us a text Consulting Services Red Bike Publishing, LLC is a Service Disabled Veteran Owned Small Business. We have sold thousands of books and training materials to individual customers. However, we would like to provide our manuals books and training to government offices to pass down to employees and contractors. Our products include trainin…
  continue reading
 
Send us a text Security Clearance and NISPOM consulting Link to YouTube presentation https://youtu.be/SNTlRrZvr-E This is a presentation of how to be a world class FSO From How to Get U.S. Government Contracts and Classified Work Influence at all levels Integrate security at all levels Be fiscally responsible Be flexible, but knowledgeable If you n…
  continue reading
 
Send us a text Security Clearance and NISPOM consulting If you are a new FSO, there is no reason to travel your journey alone. You may recruit fellow employees to assist with the tasks. Lately, contract language requires the contractor to conduct tasks in support of Program Protection Planning (PPP), Supply Chain Risk Management (SCRM), Criticality…
  continue reading
 
Send us a text Security Clearance and NISPOM consulting Here are the top reasons for marking classified information: Warn and inform a user that an item is indeed classified or sensitive Conveys what exactly needs protection Identifies levels of classification or sensitivity Provides vital information and instruction on when to downgrade or declass…
  continue reading
 
Send us a text Though defense contractors don't assign classification levels, it helps to understand why information gets classified and how the government identifies the classified information. The cleared contractor works with the classified information and protects it according to the markings. From How to Get U.S. Government Contracts and Class…
  continue reading
 
Send us a text There are many contractual reasons to transfer classified information from one location to another. Meetings, working groups, and deliverable requirements are just a few. In the receiving organization, the FSO should ensure all arriving classified information is inspected and received into accountability. From How to Get U.S. Governm…
  continue reading
 
Send us a text When Defense Counterintelligence and Security Agency (DCSA) conduct reviews of cleared defense contractor facilities, they go with a purpose. Their first priority may be to conduct a risk assessment of classified information in the contractor's possession. However, they are also looking at above and beyond metrics that demonstrate th…
  continue reading
 
Send us a text Though not as sinister and espionage riddled as most savvy spy novels, export compliance is an issue that will get defense contractors in trouble. Violating State Department regulations will bring the weight of the US Government on the offending company. According to the International Traffic In Arms Regulation, ITAR, “Any person who…
  continue reading
 
Send us a text A cleared contractor can help reduce expenses with by preparing ahead of time. This is where an experience FSO can anticipate expenses, perform risk assessment while implementing NISPOM and advise on ways to reduce costs while being compliant. The more money saved on overhead expenses, the greater the overall company profit. The earl…
  continue reading
 
Send us a text Red Bike Publishing is pleased to announce the new NISPOM. National Industrial Security Program Operating Manual 32 CFR Part 117. An FSO has readily available data to determine and communicate the effectiveness of the security program. Gathering available information, creating a detailed database and performing solid analysis will de…
  continue reading
 
Send us a text Red Bike Publishing is pleased to announce the addition of training. We have created a training program that includes an Initial Security Training/Annual Awareness Training presentation and much more required by NISPOM. Instead of designing your own, just download and present these. You can even modify them (which we recommend) or ta…
  continue reading
 
Send us a text Contact/newsletter:redbikepublishing.com/contact The National Industrial Security Program NISPOM is THE guidance for Cleared Defense Contractors (CDC) performing on classified contracts. However, it doesn’t always answer some questions these FSOs might have about protecting classified information. For example, suppose a defense contr…
  continue reading
 
Send us a text While Facility Security Officers, government and military employees do an incredible job at training employees, implementing and directing security programs to protect classified information, a more menacing threat is still left unchecked. The security industry spends terrific amounts of money fortifying and constructing buildings ba…
  continue reading
 
Send us a text NISPOM Seminar https://www.redbikepublishing.com/nispom-seminar/ Study NISPOM Fundamentals in Four hour session We excited to offer two live NISPOM Seminar events: • 23 March 4-8 Pm CST • 30 March 4-8 Pm CST Prepare for the Industrial Security Professional ISP Certification (ISP) and the DoD’s SPeD Industrial Security Oversight Certi…
  continue reading
 
Send us a text So let’s talk professional goals, the NCMS’ ISP Certification and CDSE's ISOC are great ones to strive for. 1. Begin at the NCMS, ISP Certification information website @ http://www.ncms-isp.org/ISP_Certification/index.asp. If your goal is ISOC certification, begin at the CDSE website. 2. Understand the application process. There are …
  continue reading
 
Send us a text In the course of performing on classified defense contracts, exchange of classified information is inevitable. While, the movement of classified information outside of a secure environment is to be kept to a minimum, there are times it must be moved in fulfillment of requirements. As the senior industrial security manager in CDCs, th…
  continue reading
 
Send us a text The latest industry buzz is the “release of the new National Industrial Security Program Operating Manual (NISPOM)”. I’m putting air quotes in there, because an actual NISPOM has not been rewritten or re-released. There is no re-release of NISPOM, only a reorganization of the CFRs that duplicate National Industrial Security Program r…
  continue reading
 
Send us a text We are pleased to present the newest podcast. In this issue, we address security certification and security training because; New Year's Resolutions. ISP® AND ISOC Master Exam Prep is now available here and at most online book stores. Also, we've provided real world security discussions and frequently asked questions. These occasions…
  continue reading
 
Send us a text This episodes discusses new guidance on Controlled Unclassified Information. https://www.archives.gov/cui In this episode of DoD Secure, I discuss the new guidance for Controlled Unclassified Information (CUI). There are a few points to consider: 1. The government designates CUI 2. CUI Registries, training and information exist with …
  continue reading
 
Send us a text Careers in Cleared Defense Contractors: I receive a lot of emails from people who wonder how to get into the Cleared Defense Contractor field. Many are looking for a career change and are curious about what kind of education and experience is needed to work as a security specialist in the defense and contractor industry. Industrial s…
  continue reading
 
Send us a text In this issue, we've provided real world security discussions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do. Preparing for growth involves the FSO not only training and hiring security employees, but accurately calculating classified inventory stor…
  continue reading
 
Send us a text Some security training and briefings are very discouraging for the work force. Many times, the training is the exact same video or presentation used year after year. So, if you go to my website www.redbikepublishing.com, you might find training and tests that do ask those types of questions. This topic is specifically about how to ma…
  continue reading
 
Send us a text ITAR issues A few years ago I facilitated a short but very rewarding eight hour seminar on the International Traffic In Arms Regulation (ITAR) Overview. I am grateful to the staff at the University of Alabama in Huntsville and the North Alabama Trade Association for both sponsoring the event and allowing me to present. I found the co…
  continue reading
 
Send us a text I am currently preparing to publish my new book, "How to Win U.S. Government Contracts and Classified Work", it's basically a total revision of "DoD Security Clearance and Contracts Guidebook". Chapter Five reviews the Executive Orders and regulations relating to Classification Markings and there is some good information from all sou…
  continue reading
 
Send us a text Once a company wins a bid on classified work, they will then prepare their organization to perform classified work according to the contract. Some great planning resources are the DD Form 254, Statement of Work, and Security Classification Guide. This podcast teaches how to use the references to set up your program. As part of a clas…
  continue reading
 
Send us a text An FSO can train and write NIPSOM based policy and training, but without the enterprise’s full cooperation, will find it difficult to enforce. The coordination will allow the FSO to be proactive and better support the company's performance on classified contracts. Having a security program integrated into all aspects of the company p…
  continue reading
 
Send us a text This blog continues the series describing what happens after the government grants you a security clearance. After receiving a job with a company or agency performing classified work, you’ll receive your onboarding training, which may have included the SF 312 Non-Disclosure Agreement, Initial Security Awareness, Derivative Classifier…
  continue reading
 
Send us a text Richard Liebespach (Founder & CEO). Teaching people to be safe with our without a weapon. Please visit his website at http://selfprotection.co/ The things that differentiate Self Protection Essentials from the rest are an out growth of our philosophy and out core beliefs. A cornerstone of our core beliefs is that we believe, at the c…
  continue reading
 
Send us a text We are so happy to have with us on our podcast David Bledsoe David Bledsoe. He is the Manager of Industrial Security Compliance at Iron Mountain. In his job, he has oversight of 17 cleared facilities across the country, and provides training, leadership, and education to the local FSOs. We talk about security clearances background ch…
  continue reading
 
Send us a text I sat down with Kimber Hill of Virtforce.us to discuss how they help military spouses and veterans. I really appreciate their mission of: "We reduce the unemployment rate for Active Duty MilSpouses and Veterans by connecting employers seeking to diversify and distribute their talent network to qualified virtual candidates within the …
  continue reading
 
Send us a text We discuss the security clearance investigation and the importance of protecting classified information. You can support our show by buying Insider's Guide to Security Clearances https://amzn.to/2JUjnIc This is great for dod security professionals, industrial security professionals, those who have questions about dod security clearan…
  continue reading
 
Send us a text Discussion of sexual activity and security clearances Support the show FSO Consulting: https://thriveanalysis.com/nisp/ NISPOM Compliance https://www.nispomcentral.com We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What t…
  continue reading
 
Send us a text Why are we giving our sensitive information away so easily? Evaluating risk is very important. Risk events should be used to determine where vulnerabilities exist and the best approach to mitigating those vulnerabilities. We evaluate risks to viruses, sickness, how to protect sensitive information and what to put on social media or w…
  continue reading
 
Send us a text Anchor points, counterintelligence, smart security, Defensive Information Countering Everything. Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years. www.re…
  continue reading
 
Send us a text An interview with Ray Semko world renown security and counter-intelligence speaker and trainer. Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years. Support…
  continue reading
 
Send us a text Regarding each of the 13 Adjudicative Criteria, the applicant should gather all information available to explain the behavior that could cause a denial of a security clearance. The information should be presented during follow up interviews or as requested for review. Being well prepared will help with the adjudicative process and ma…
  continue reading
 
Send us a text Adjudicative Guideline H: Drug Involvement is another concern that could lead to the denial or revocation of a security clearance. Drug involvement includes the abuse of illicit and legal drugs. However, a review of security clearance cases demonstrates that marijuana continues to be a concern for many applicants. Additionally, new s…
  continue reading
 
Send us a text Over the years I've been asked the same question: "Can you help me get a security clearance? My answer is both yes and know. If the individual either owns a business and is competing for a classified contract or has a contractual need for a Facility Clearance, then they are eligible to pursue a security clearance. Likewise, if they w…
  continue reading
 
Send us a text Discussion on how business entities and get security clearances. Support the show FSO Consulting: https://thriveanalysis.com/nisp/ NISPOM Compliance https://www.nispomcentral.com We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clear…
  continue reading
 
Send us a text John W. Davis shares analogies between cold war reporting and insider threat reporting responsibilities. Security managers can gain a better understanding of how to establish a program that facilitates the reporting of credible insider threat information. Support the show FSO Consulting: https://thriveanalysis.com/nisp/ NISPOM Compli…
  continue reading
 
Send us a text Cleared defense contractors are required to integrate an insider threat program. The first step is to designate a “Senior Official” to establish and execute the insider threat program In this episode we'll address: •Fundamentals of the Insider Threat Program (ITP) •Establishing an ITP •ITP Definitions •Insider Threat Impact on Indust…
  continue reading
 
Loading …

Gyors referencia kézikönyv