DoD Secure

Follow DoD Secure
Share on
Copy link to clipboard

Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Join in on interviews and discussions about our national security and protecting our nation's secrets.

jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC

Donate to DoD Secure


    • Feb 3, 2025 LATEST EPISODE
    • monthly NEW EPISODES
    • 29m AVG DURATION
    • 56 EPISODES
    • 4 SEASONS


    Search for episodes from DoD Secure with a specific topic:

    Latest episodes from DoD Secure

    Implementing an Effective Insider Threat Program for NISPOM Compliance

    Play Episode Listen Later Feb 3, 2025 13:50


    Send us a text descriptionNISPOM Compliance Consulting and FSO Services: https://www.thriveanalysis.comNISPOM Books and Training Resources https://www.nispomcentral.comContact Jeff: jeff.bennett@nispomcentral.comImplementing an Effective Insider Threat Program for NISPOM ComplianceJeff Bennett from Thrive Analysis Group discusses the importance of implementing an aggressive insider threat program to ensure NISPOM compliance. He explains how such a program can protect sensitive information within clear defense contractors, commercial entities, institutions, and nonprofits. The video outlines the identification of sensitive assets, developing countermeasures, and training employees to recognize and report suspicious behavior as focal points of a robust insider threat program. Continuous evaluation, education on adverse information reporting, and practical steps for effective insider threat management are also covered.00:00 Introduction to Jeff Bennett and Thrive Analysis Group00:25 Understanding Insider Threat Programs01:52 Identifying Insider Threat Behaviors03:28 Implementing a Robust Insider Threat Program05:27 Continuous Evaluation and Reporting09:55 Training Employees on Insider Threats12:36 Conclusion and Contact InformationNISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    The Importance of Training Uncleared Employees in Security Protocols

    Play Episode Listen Later Dec 28, 2024 12:40


    Send us a textJeff Bennett, owner of Thrive Analysis Group and NISPOM Central, explains the significance of security training for uncleared employees in defense contracting companies. The video details compliance with the National Industrial Security Program Operating Manual (NISPOM) and covers mandated topics such as threat awareness, counterintelligence, and cybersecurity. Bennett emphasizes the importance of including uncleared employees in security training to prevent unauthorized access to classified information. He also highlights the need for regular training and self-inspection processes, suggesting outsourcing as a solution for overwhelmed FSOs.00:00 Introduction to Thrive Analysis Group00:28 Understanding the Role of FSOs01:05 Outsourcing FSO Tasks01:22 Developing a Sustainable Security Program01:57 Today's Training Topic: Security Training for Uncleared Employees02:09 NISPOM Training Requirements03:34 Benefits of Training Uncleared Employees04:49 Handling Classified Information06:51 Training Tips for FSOs09:14 Self-Inspection and Training Resources10:29 Conclusion and Additional Resourcesvisit https://www.nispomcentral.comNISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    What happens after you get the facility security clearance

    Play Episode Listen Later Dec 16, 2024 14:48


    Send us a textConsulting:  https://www.thriveanalysis.comBooks, Training and Resources:  https://www.nispomcentral.comWhat's Next After Getting Your Facility Security Clearance?Join Jeff Bennett, President of Thrive Analysis Group, as he guides you through the steps to take after obtaining your facility security clearance. In this video, Jeff discusses the responsibilities of facility security officers, how to manage security programs, delegation of tasks, compliance with NISPOM, and preparing for self-inspections. Ideal for companies new to security clearances and those needing assistance in building and maintaining a security-conscious infrastructure.00:00 Introduction to Thrive Analysis Group00:20 Understanding Facility Security Clearances01:10 Roles and Responsibilities of Security Officers02:00 Guidance for New Facility Security Officers03:04 Building and Managing a Security Program04:01 Delegating Tasks and Using Resources06:14 Developing Security Policies and Procedures07:11 Handling Classified Information On-Site11:18 Conducting Self-Inspections12:33 Conclusion and Next StepsNISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    NISPOM Required Training

    Play Episode Listen Later Jul 7, 2024 21:16


    Send us a Text Message.Get the TrainingSecurity Training; It's That Important  NISPOM requires that every cleared employee receives the initial training and the annual refresher training The rational for initial and refresher is because new employees are introduced to sensitive and classified government information and they should learn the fundamentals. Here are some great topics; just so happens to be addressed in NISPOM: The nature of classified material and how to protect it. Notice of their responsibilities to protect classified information and the consequences of unauthorized disclosure Recognizing and protecting U.S. and foreign government classified material Criteria for authorizing access to classified information Responding to classified information released to the public Security chain of command and support structure for addressing security incidents and violations Cleared employees on foreign travel  For example, the newly cleared employee may not understand how to dial a combination or determine who to allow access to classified material. Without proper training, the newly cleared employees may make honest mistakes leading to security violations.Access Commander by MathCraftWe support the mission of FSOs, CSOs and other security professionals. SIMS SoftwareSIMS suite provides features/functionality you need to run automated industrial security programs. Security Defense LawyerIf you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyClearance, NISPOM, and FSO ConsultingThrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.NISPOM CentralProviding security clearance books, training, and resources for cleared defense contractors.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the Show.FSO Consulting:https://thriveanalysis.com/nisp/NISPOM Compliancehttps://www.nispomcentral.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Security Clearances, Insider Threat Programs, Training

    Play Episode Listen Later Nov 10, 2023 32:47


    For some, the FSO designation is a career track with potential growth. For others, it's an undesired appointment, part of doing business and just another additional duty.However, this responsibility should be taken very seriously as classified contracts depend on success. Regardless of whether desired or appointed, the FSO is key to managing classified contracts.Why not let Thrive Analysis Group Inc manage your FSO requirements while you focus on your core capabilities. We are uniquely positioned to equip your organization with FSO solutions and services.While you may be appointed as FSO, you should delegate FSO responsibilities to us. We provide a wide range of managed solutions. Leave FSO tasks to a trusted partner.FSO Solutionshttps://thriveanalysis.com/nisp/https://www.redbikepublishing.com/insiderthreatprogram/Online security clearance webinars and coaching. Providing security training and resources.Most organizations attack the problem with either an employee tracking or online activity reporting goal.After asking the above questions, we recommend a different solution. Of course the employee reporting and activity tracking solutions are important and part of the solution, but they should not be the end goal.This book recommends a different application that can easily be implemented to both resolve insider threat issues and demonstrate compliance.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://thriveanalysis.com/nisp/We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Establish an Insider Threat Program Under NISPOM Interview

    Play Episode Listen Later Jun 26, 2023 27:03


    This is a collaborative effort with Clearancejobs.com and an interview from my newest book, Establish and Insider Threat Program Under NISPOMFSOs have a huge responsibility to protect contractor information. One important job is to start with an insider threat program.Most people make the mistake of relying on tracking employees and looking for suspicious behavior. That's not a good way to start.I've got a better solution. It's here in the video as well as my new book:Establish an Insider threat program under NISPOM. Tools, templates and procedures you can download. https://www.redbikepublishing.com/insiderthreatprogram/Jeff is available for speaking and consultinghttps://jeffreywbennett.comOnline security clearance webinars and coaching. Providing security trainRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://www.redbikepublishing.com/fso-consulting/https://jeffreywbennett.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Establish an Insider Threat Program

    Play Episode Listen Later Apr 22, 2023 19:54


    Jeff is available for speaking and consultinghttps://jeffreywbennett.comhttps://jeffreywbennett.thinkific.comFSOs have a huge responsibility to protect contractor information. One important job is to start with an insider threat program.Most people make the mistake of relying on tracking employees and looking for suspicious behavior. That's not a good way to start.I've got a better solution. It's here in the video as well as my new book:Establish an Insider threat program under NISPOM. https://www.redbikepublishing.com/books/https://www.redbikepublishing.com/insiderthreatprogram/Online security clearance webinars and coaching. Providing security training and resources.It also answers the question that so many people have asked,If we have the NISPOM, why do we need an insider threat program?If the NISPOM is so thorough, what would an additional insider threat program look like?Most organizations attack the problem with either an employee tracking or online activity reporting goal.After asking the above questions, we recommend a different solution. Of course the employee reporting and activity tracking solutions are important and part of the solution, but they should not be the end goal.This book recommends a different application that can easily be implemented to both resolve insider threat issues and demonstrate compliance.Establishing an Insider Threat Program Under NISPOM is writJeff's Website Jeff is available for speaking and consultingSIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://www.redbikepublishing.com/fso-consulting/https://jeffreywbennett.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Training, inspections and other cleared contractor requirements

    Play Episode Listen Later Feb 26, 2023 43:41


    Free security clearance seminarehttps://www.redbikepublishing.com/securityclearanceseminar/NISPOM Fundamentals https://www.bennettinstitute.comStay tuned for more information about our upcoming book. In the meantime, if you need to provide Insider Threat Training, you can download and present your very own to your employees NISPOM requires Derivative Classification Training and Record keeping Guidance. This guidance states that the cleared contractor provide cleared personnel with initial Derivative Classification Training and follow up and at least once every 2 years. No time to write training?You can find training here https://www.redbikepublishing.com/derivative/See more in oMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://www.redbikepublishing.com/fso-consulting/https://jeffreywbennett.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Security Clearance Justification and FSO training

    Play Episode Listen Later Jan 16, 2023 24:28


    We are having a security clearance webinar. FInd more information here:https://www.redbikepublishing.com/securityclearanceseminar/This podcast is based on information from our NISPOM fundamentals course at https://www.bennettinstitute.comPodcast discusses:Holding a security clearance is a privilege. The awardee is able to perform on classified contracts where they would not otherwise be able. However, some defense contractors mistakenly assume that they can request a Facility Security Clearance (FCL) for business development purposes or to better position themselves future classified contract opportunities. Though that is not how FCLs are awarded, there is a process and methodology to justify the FCL.  The FSO has marching orders to develop and implement security programs to protect classified information. But, how effective is security policy if it is written by security and posted Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFSO Consulting:https://www.redbikepublishing.com/fso-consulting/https://jeffreywbennett.comWe provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Security Clearances a little more in depth.

    Play Episode Listen Later Nov 26, 2022 34:03


    We are having a security clearance webinar. FInd more information here:https://www.redbikepublishing.com/securityclearanceseminar/This podcast is based on information from our NISPOM fundamentals course at https://www.bennettinstitute.comPodcast discusses:Facility Security Clearances (for businesses)Personnel Security Clearances (for people)Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Support the showFSO Consulting:https://www.redbikepublishing.com/fso-consulting/We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting. Personnel Security Clearances How to get a clearance What to expect once you get a clearance What you can do to prepare for a clearance Facility Security Clearance ✓Become a CDC Contractor ✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances ✓Establish a security team to protect classified information ✓Develop and provide required security training ✓Prepare for government inspections ✓Interpret Contract specifications ✓Fight Insider threat ✓Learn Security clearance levels ✓Process Classified information ✓Prepare Derivative Classification ✓Provide required Security Training ✓Appointing a Facility Security Officer ✓Prepare for Government Audits Security Clearance and NISPOM consulting

    Gates, Guards and Risk Assessment

    Play Episode Listen Later Oct 3, 2022 30:54


    Red Bike Publishing, LLC is a Service Disabled Veteran Owned Small Business. We have sold thousands of books and training materials to individual customers. However, we would like to provide our manuals books and training to government offices to pass down to employees and contractors. These books are available for credit card purchase from our website and amazon.com.Our products include training, books and services:Reminder magnets for security containers and safes.DODM 5200.01 V 1-3 and study guides for SPeD SFPC certificationNISPOM and study guides for ISP CertificationNISPOM Required TrainingFSO Services (facility and personnel security clearances)DoD and NISP Security Certification            3 day course, perfect for employees and contractorsIn depth study of and testing tipsTailored NISP required trainingeditor@redbikepublishing.comCAGE: 53JF5 NAICS: 511130, 541690, 611430 Cleared employees are trained how to properly mark, store and disseminate classified information, but not taught how to effectively communicate without inadvertently disclosing sensitive information. Develop security program based on numbers 1-3. Include the risk and develop countermeasures and implement those countermeasures as well as regulated NISPOM and other requirements. Identify the threat, determine the risk of threat, and document impact and countermeasure costs.For more information on conducting risk analysis and creating countermeasures, see our book How to Get U.S. Government Contracts and Classified Work.The term Cleared Defense Contractor,might conjure images of large complexes, with a healthy security staff, plenty of closed areas, labs and conference rooms. For example, the risk model may identify that there is a low crime rate. Classified information can be properly stored in a GSA approved security container locked in a central office. If you need assistance with FSO tasks, OPSEC, risk assessments, or security training please contact me or visit my consulting site Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Clearance, NISPOM, and FSO Consulting Thrive Analysis Group Inc is your resource for security clearance, NISPOM, and FSO consulting.Support the show

    World Class Cleared Defense Contractor and NISPOM

    Play Episode Listen Later Jul 19, 2022 43:44


    Link to YouTube presentation https://youtu.be/SNTlRrZvr-EFSOs have a huge responsibility to protect contractor information. Just like an Olympic team may protect their athlete and performance details, the FSO should determine who is on the team, and which team members have access to information. The FSO should not stop work, but facility contract requirements without jamming up the employees with unobtainable security procedures. This is a presentation of how to be a world class FSOFrom How to Get U.S. Government Contracts and Classified WorkInfluence at all levelsIntegrate security at all levelsBe fiscally responsible  Be flexible, but knowledgeableIf you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com.Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/The purposeful execution of Foreign travel pre-briefings-When employees travel to a foreign country, they may be targeted to provide sensitive information. A threat and/or defensive briefing should be provided to all cleared employees per NISPOM. (NISPOM Training). The briefings should be documented with signatures, dates and contents of briefings for presentation to Defense Security Services (DSS) industrial security representatives.There is a lot of debate about professional certification. Currently, the drive and motivation for facility security officers (FSO) and security specialists to become Industrial Security Professional (ISP) certified is still self-motivation and not yet a requirement.Jeff's WebsiteJeff is available for speaking and consultingSIMS SoftwareSIMS suite provides features/functionality you need to run automated industrial security programs.Access Commander by MathCraftWe support the mission of FSOs, CSOs and other security professionals.Bennett InstituteOnline security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, IncMission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.patreon.com/redbike)Support the show

    Program protection, new FSOs, and classified reproduction

    Play Episode Listen Later Jun 12, 2022 33:20


    If you are a new FSO, there is no reason to travel your journey alone. You may recruit fellow employees to assist with the tasks. Additionally, there are many resources available to assist with FSO responsibilities to include DCSA, NISPOM, professional organizations, consultants, books and training are available just for this purpose.Lately, contract language requires the contractor to conduct tasks in support of Program Protection Planning (PPP), Supply Chain Risk Management (SCRM), Criticality Analyses (CA), and providing Program Protection Plan Implementation Plans (PPIP). These requirements include language that requires developing PPIPs, protecting critical components, developing SCRM plans, quantifying risk to the supply chain, vetting vendors and so much more. The ISP and ISOC Master exam prep for NISPOM 32 CFR Part 117 is now available. If you plan to test in winter 2022 or later, make this version part of your study plans.Check it out. While this may not be an organic capability for most organizations, there are many small companies that can step up and provide the necessary guidance or share in the workload. Classified information should only be reproduced in response to a contractual requirement such as in the performance of a deliverable. Reproduction should not be made as a matter of convenience as it puts classified information at unnecessary risk and it requires dedicated resources. The FSO can enforce resource discipline with:1. Creating processes and procedures identifying reproduction only as necessary and using only approved equipment 2. Ensuring only trained and authorized personnel are able to reproduce classified information. 3. Identifying office equipment, copy machines, scanners and other reproduction equipment for classified information reproduction. All other enterprise equipment should be off limits to classified reproduction.Link to NISPOM and cleared contractor security books.Link to NISPOM required trainingRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Support the show

    FSOs are busy. Get ready for performing on classified contracts

    Play Episode Listen Later May 3, 2022 29:52


    Here are the top reasons for marking classified information: Warn and inform a user that an item is indeed classified or sensitiveConveys what exactly needs protection Identifies levels of classification or sensitivityProvides vital information and instruction on when to downgrade or declassify the materialGives sources and reason for classifying the itemWarns of special access, control, dissemination or safeguarding requirements Find out more in How to Get U.S. Government Contracts and Classified WorkBe sure to visit Red Bike Publishing for books and training.If you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com.DCSA ReviewPrior to each inspection, the FSO and cleared contractor leadership should present DCSA with a state of security briefing to introduce and go over the company security policy. Similarly, the DCSA special agent may provide an out-briefing detailing the results of the inspection. This out briefing and soon to follow documentation of the inspection provides further data toward building an excellent security program.Pay attention to the results and apply them to make your security program to protect classified information even more effective.TrainingFSOs should conduct initial and refresher training and file reports as required by the NISPOM. Instead of conducting NISPOM training with compliance as the end goal, the training can be performed as an effective relationship building opportunity. NISPOM required training that you can download and present is here: https://www.redbikepublishing.com/training/Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/Becoming a cleared defense contractorThe facility clearance is required to be in place prior to the contractor performing on classified work. After the GCA or prime contractor submits the sponsorship letter, the company can begin the process of applying for the clearance. A contractor has to meet five requMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Jeff's Website Jeff is available for speaking and consultingSupport the show

    Creating an excellent security environment at cleared defense contractor facilities.

    Play Episode Listen Later Mar 25, 2022 28:17 Transcription Available


    Though defense contractors don't assign classification levels, it helps to understand why information gets classified and how the government identifies the classified information. The cleared contractor works with the classified information and protects it according to the markings.From How to Get U.S. Government Contracts and Classified WorkInfluence at all levelsIntegrate security at all levelsBe fiscally responsible  Be flexible, but knowledgeableIf you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/The purposeful execution of Foreign travel pre-briefings-When employees travel to a foreign country, they may be targeted to provide sensitive information. A threat and/or defensive briefing should be provided to all cleared employees per NISPOM. (NISPOM Training). The briefings should be documented with signatures, dates and contents of briefings for presentation to Defense Security Services (DSS) industrial security representatives.There is a lot of debate about professional certification. Currently, the drive and motivation for facility security officers (FSO) and security specialists to become Industrial Security Professional (ISP) certified is still self-motivation and not yet a requirement.Jeff's WebsiteJeff is available for speaking and consultingSIMS SoftwareSIMS suite provides features/functionality you need to run automated industrial security programs.Access Commander by MathCraftWe support the mission of FSOs, CSOs and other security professionals.Bennett InstituteOnline security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, IncMission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense LawyerIf you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.patreon.com/redbike)Support the show (https://www.patreon.com/redbike)

    Classified document deliveries, Classification markings and security culture

    Play Episode Listen Later Feb 23, 2022 32:02


    There are many contractual reasons to transfer classified information from one location to another. Meetings, working groups, and deliverable requirements are just a few. In the receiving organization, the FSO should ensure all arriving classified information is inspected and received into accountability. From How to Get U.S. Government Contracts and Classified WorkThe FSO should ensure that all classified deliveries are inspected prior to bringing them into accountability. Such checks are necessary to ensure items were sent properly, were not tampered with in transit, contain correct items and are authorized for storage in the classified holdingsBe sure to visit Red Bike Publishing for books and training.If you have questions, visit Jeff's website: jeffreywbennett.comWhen performing Derivative Classification tasks, it's sometimes necessary to produce, reproduce, copy, or print classified information for work products, briefings and demonstrations. When doing so, the derived item should bear the appropriate classification.Classification markings are applied to the top and bottom, front and back of classified items. Markings are also found in internal pages, paragraphs and other locations inside documents, books, manuals and other paper based products.e have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/ FSO trains and treats ALL employees as security “force multipliers”. With security ingrained in the performance and actions of employees, the organization has a united front and all employees exist to protect classified information. For example, even employees without security clearances can help protect classified information by learning to recognize classification markings reporting suspicious behavior or contacts.The corporate culture of successful organizations is published organization wide and employees are well versed. Each employee should understand how they fit into the company mission and the importance of their contribution toward tJeff's Website Jeff is available for speaking and consultingSIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.patreon.com/redbike)

    How Cleared Defense Contractors Institutionalize Security Awareness

    Play Episode Listen Later Jan 14, 2022 34:25


    When Defense Counterintelligence and Security Agency (DCSA) conduct reviews of cleared defense contractor facilities, they go with a purpose. Their first priority may be to conduct a risk assessment of classified information in the contractor's possession. However, they are also looking at above and beyond metrics that demonstrate the commitment to national security. These above and beyond attributes are often recorded and rewarded. Here are some ideas Facility Security Officers can employ to demonstrate above and beyond NISPOM application. You might even consider inviting an Industrial Security Professional (ISP) or Industrial Security Oversight (ISOC) certified guest speaker.Additionally, many vendors offer already developed online NISPOM training perfect for sending to your employees.Be sure to create an index or catalog of where brochures, posters or other training items are located so that you can keep them updated, monitor use and make improvements. Most of all, it's important to document and demonstrate how you use these items to improve your security posture. Become an expert for your training and show DSS how you are making a difference.For those defense contractors who what to perform on classified contracts, there are a few considerations to address. Under the National Industrial Security Program (NISP), a cleared contractor should appoint an FSO to take on this responsibility of directing a security program to protect our classified information. This FSO is the link between the government contractor and the cognizant security agency (CSA).The FSO has a tough task that they can't possibly do alone (for training resources visit our website).More tips can be found in the book “How to Get U.S. Government Contracts and Classified Work”If you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Jeff's Website Jeff is available for speaking and consultingSupport the show (https://www.patreon.com/redbike)

    Security training, export compliance, NISPOM, and working groups

    Play Episode Listen Later Nov 20, 2021 43:03


    Though not as sinister and espionage riddled as most savvy spy novels, export compliance is an issue that will get defense contractors in trouble. Violating State Department regulations will bring the weight of the US Government on the offending company. According to the International Traffic In Arms Regulation, ITAR, “Any person who engages in the United States in the business of either manufacturing or exporting defense articles or furnishing defense services is required to register”. Security clearances should be kept to the minimum amount necessary to perform the classified work, access to that classified information must be kept to only those with a valid need to perform on the government work. Security clearance verification cannot provide need to know. Just because one has a clearance doesn't mean they should be authorized access. Need to know is based on a contractual or work performance basis.A leader can form an HPT from all business units. Since the FSO is responsible for creating a security program to protect classified information, they may either suggest or take the lead and form the group. Once in the group, the individuals begin to discuss the vision, norms and etc. Such topics to tackle might include policy, security violations, refresher training, emergency operations planning, and communication for starters. A multi organizational HPT can bring depth and breadth to a stagnant security program.Only those working in the National Industrial Security Program for at least 5 years are edible for the ISP Certification and anyone holding the SFPC qualifies for ISOC. Five years experience should make the professional more than capable of passing the exam. However, understanding how to study will make a difference in their success.Podcast links:Free NISPOM and ISP Trainingwww.bennettinstitute.com/coursesMy consulting site www.jeffreywbennett.com. NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/ How to Get U.S. Government Contracts and Classified Work.ITAR https://www.redbikepublishing.com/itar/NISPOM https://www.redbikepublishing.com/nispom/Certification: https://www.redbikepublishing.com/ispcertification/Government Security Training https://www.cdse.edu/Support the show (https://www.redbikepublishing.com/insidersguide/)

    Determining security costs, protecting CUI, FSO training and more

    Play Episode Listen Later Sep 16, 2021 39:20


    A cleared contractor can help reduce expenses with by preparing ahead of time. This is where an experience FSO can anticipate expenses, perform risk assessment while implementing NISPOM and advise on ways to reduce costs while being compliant. The more money saved on overhead expenses, the greater the overall company profit. The earlier into the process the assessment is conducted the better the company performs overall.It's a common practice to allow employees to use enterprise computers outside of the enterprise. This has become more common where employees are increasingly working at home. Though a common practice, these occurrences are not always best practices. Anytime an employee leaves work with a company computer, the expectation is that all information is vulnerable.  Protecting classified material – The proper receipt, accountability, storage, dissemination and destruction of classified material. Link to CDSE training https://www.cdse.edu/Required training – This instruction helps the FSO establish an ongoing training program designed to create an environment of security conscious cleared employees.Personnel security clearances – The FSO gains an understanding of the personnel security clearance request procedure, briefing techniques and maintenance of personnel clearances.You can find study recommendations, practice questions and NISPOM links at https://www.redbikepublishing.com/ispcertification/ and https://bennettinstitute.com/course/ispisoctipis/If you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyJeff's Website Jeff is available for speaking and consultingRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Classified contracts, security audits, end of day checks and metrics

    Play Episode Listen Later Jul 26, 2021 47:19


    Red Bike Publishing is pleased to announce the new NISPOM. National Industrial Security Program Operating Manual 32 CFR Part 117.  An FSO has readily available data to determine and communicate the effectiveness of the security program. Gathering available information, creating a detailed database and performing solid analysis will determine the program's success.End of day checks serve as a precaution against leaving classified information unattended.Feel free to contact us for information on how to promote your business through our newsletter.     NISPOM Training Topics:Insider ThreatInitial / Annual Security AwarenessDerivative ClassifierNon Disclosure AgreementIf you need assistance with FSO or security training please contact me or visit my consulting site www.jeffreywbennett.com. Additionally, we have NISPOM fundamentals training perfect for studying and applying to your CDC facility. https://bennettinstitute.com/course/nispomfundamentals/Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Jeff's Website Jeff is available for speaking and consultingSIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Spies, Courtrooms and Security Training

    Play Episode Listen Later Jun 9, 2021 54:38


       Red Bike Publishing is pleased to announce the addition of training. We have created a training program that includes an Initial Security Training/Annual Awareness Training presentation and much more required by NISPOM. Instead of designing your own, just download and present these. You can even modify them (which we recommend) or tailor to your CDC business. Feel free to contact us for information on how to promote your business through our newsletter.     Jeff has made an online recorded version of the course NISPOM Fundamentals that he formerly taught at the University of Alabama Huntsville. He is available teach similar courses at your companies. Send an email to editor@redbikepublishing.com. Red Bike Publishing offers generous royalties and are able to reach over 30,000 people through various magazines, Amazon.com, and other bookstores. Red Bike Publishing uses professional printing and distribute through Ingram, Baker and Taylor, Barnes and Noble and much more.Sometimes life imitates art. Just like in the thrillers that we watch or read, the evil doers seem to either be or think they are smarter than the good guys. They find loopholes that protect their crimes and there isn't a thing the good guys can do about it. Finally, at the last climatic moments, the good guys find the evidence they need to make a prosecution stick. Just like in the movies.A similar thriller plays out in a courtroom according to a January 22, 2010 Washington Examiner article called "Defense Official's Mom Introduces Him to Chinese Spy". According to the Article, James Wilbur Fondren provided three papers to a Taiwanese businessman who paid a consulting fee. Unbeknownst to Mr. Fondren, the Taiwanese businessman was a Chinese Spy. NISPOM Training Topics:Insider ThreatInitial / Annual Security AwarenessDerivative ClassifierNon Disclosure AgreementIf youSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyJeff's Website Jeff is available for speaking and consultingBennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs. Support the show (https://www.redbikepublishing.com/insidersguide/)

    Classified Government Contracts and Risk Assessment

    Play Episode Listen Later May 13, 2021 46:01


    Contact/newsletter:redbikepublishing.com/contactThe National Industrial Security Program NISPOM is THE guidance for Cleared Defense Contractors (CDC) performing on classified contracts. However, it doesn’t always answer some questions these FSOs might have about protecting classified information. For example, suppose a defense contractor company has a contract requiring the storage of classified information at the SECRET level. Do they need an alarm?You might recall in earlier articles that I’ve emphasized the importance of finding out what the threats to classified information are to your particular organization. Be aware of NISPOM vs. Best Practices, vs. Risk Assessment before committing resources that may or may not be required. Industry standards and common practices may almost seem like requirements, but can be expensive endeavors if not necessary to implement. To some, it may be unheard of not to have alarms, cameras or access control systems (door magnets and card readers). However, these are not required in NISPOM (except for intrusion detection systems as identified in certain situations and not in all situations).Prior to travel, a cleared employee should have a good understanding of their responsibilities to protect national security. A Defensive Security Briefing is for those who travel overseas and may be vulnerable to foreign entity recruiting methods. They should be constructed to make the cleared traveler aware of their responsibilities to protect employees, product, customers and those with which they do business. Topics of the defense security briefing should include threat recognition, how to assess and how to respond when approached for recruitment.The Facility Security Officer’s successful program depends on developing relationships with employees, managers and executives to facilitate execution of company policies and adherence to NISPOM. This includes security awareness training, participation in continuous evaluation, and tracking changes of status, and proactive action toward expired, existing and future classified coSupport the show (https://www.redbikepublishing.com/insidersguide/)Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Jeff's Website Jeff is available for speaking and consultingMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.SIMS Software SIMS suite provides features/functionality you need to run automated industrial security programs.

    Controlled Unclassified Information, classified information and such. Getting ready to perform on government contrats

    Play Episode Listen Later Apr 12, 2021 27:01


    While Facility Security Officers, government and military employees do an incredible job at training employees, implementing and directing security programs to protect classified information, a more menacing threat is still left unchecked.     The security industry spends terrific amounts of money fortifying and constructing buildings based on best practices and not entirely on a risk assessment. The NISPOM and other regulations advise on focusing protection and reducing costs. However, without a proper risk assessment, they may fall short of meeting legitimate threats.  The current practice makes it very difficult for someone to break in and steal secrets.  In light of addressing best practices, the main threat should not be overlooked or neglected. For example, when was the last time you read of buildings being broken into and safes blasted open or being cracked to obtain our nation's secrets? Facility security officers and industrial security professionals should develop measures to safeguard classified information at the highest level indicated. Employees should be trained to perform on these contracts based on NISPOM Guidance. This training includes:Non Disclosure Agreement (SF 312)Derivative ClassifierSecurity Awareness Initial and Annual RefresherInsider Threat A buzz is sweeping the security community since the industry has been notified of the recent updates to DoD's CUI program based on the presidential memorandum with the subject, Designation and sharing of Controlled Unclassified Information (CUI). This memorandum implements a program designed to encourage the speedy sharing of information to those authorized and to better protect the information, privacy and legal rights of Americans. The CUI program is designed to promote proper safeguarding and dissemination of unclassified information.      Many readers may be familiar with the program CUI has replaced. Sensitive But Unclassified (SBU) information had enjoyed protection to a certain level but was not conducive to the necessary information sharing. Controlled Unclassified Information (CUI) directives provide procedures for a more appropSupport the show (https://www.redbikepublishing.com/insidersguide/)Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySIMS Softwar SIMS suite provides features/functionality you need to run automated industrial security programs. Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. SIMS Softwar SIMS suite provides features/functionality you need to run automated industrial security programs. Jeff's Website Jeff is available for speaking and consulting

    Preventing Espionage, Classified Information Loss, Every cleared employee should have a NISPOM

    Play Episode Listen Later Mar 8, 2021 30:21


    NISPOM Seminar https://www.redbikepublishing.com/nispom-seminar/Study NISPOM Fundamentals in Four hour sessionWe excited to offer two live NISPOM Seminar events:• 23 March 4-8 Pm CST• 30 March 4-8 Pm CSTPrepare for the Industrial Security Professional ISP Certification (ISP) and the DoD’s SPeD Industrial Security Oversight Certification (ISOC). Those and several similar motivational publications stress that everyone has the same amount of time in a day. What we do during that time helps us either make or goals or fail before we even get started. As leaders, FSOs can help cleared defense contractor employees understand how to create incredible security programs. Focusing on training, interaction with other cleared employees, self-improvement and institutional education should be part of professional development. FSOs and managers who write evaluations for direct reports have an excellent opportunity to help them establish goals to become better at their jobs, more impactful in their careers and hopefully, groomed to become FSO’s themselves. Challenging employees and team members to achieve personal and professional goals breeds success.Security certifications such as ISP Certification and ISOC certification are goals cleared employees could take as a goal as well as encourage employees to achieve. The employee gains from such education and a prestigious career milestone. The organization also benefits from what the security employee learns and applies on the job. When employees study for the ISP Certification, they learn: how to read and apply the NISPOM, the importance of forming professional relationships with cleared employees, how the cleared contractor and the DSS representatives interact, and much more. A leader also creates pride in the organization and employee by making them more competitive in their career and providing basis for professional pride. When employees are challenged with the goal, the manager can help by providing or allowing education as found on the DCSA, professional organization or vendor websites. Studies on NISPOM topics are available on the internet as well as on site. If your team is large enough, consider helping them start a study group. Here are 2 good training ideas:1. If the cleared contractor facility has multiple security employees, provide an opportunity to cross train. Security employees who work personnel security issues could work with document control and etc. Also, consider allowing security employees from one discipline inspect anther security section during the annual self inspectioSupport the show (https://www.redbikepublishing.com/insidersguide/)Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediately

    Security Certification and Cleared Defense Contractors

    Play Episode Listen Later Feb 21, 2021 38:38


    So let’s talk professional goals, the NCMS’ ISP Certification and CDSE's ISOC are great ones to strive for.1. Begin at the NCMS, ISP Certification information website @ http://www.ncms-isp.org/ISP_Certification/index.asp. If your goal is ISOC certification, begin at the CDSE website. 2. Understand the application process. There are minimum experience requirements that applicants must meet as well as administrative tasks built into the process.3. Understand the requirements and get a feel of where you are professionally and any gaps you need to breach to bring your knowledge of NISPOM and ISP or ISOC Certification categories to where it needs to be. It’s not necessary to be an expert in all areas or to be able to quote regulations and requirements. 4. The following are some things that you can do to prepare to fill those knowledge gaps:a. Study the NISPOM and other reference document structure and understand where to find topic related information. Also, become familiar with key industry standard words found in the source documents. b. Join a study group. There you can study their material, ask questions and get feedback.c. Find a mentor. 5. Set a date. Join our reader list for more articles. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security Clearancessecurity training NISPOM ISP® and ISOC certification. CDSE websiteNCMSNISPOM/FSO TrainingSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyRed Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Access Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.redbikepublishing.com/insidersguide/)

    The FSO budget, classified meetings, and introducing new material into the cleared defense contractor facility

    Play Episode Listen Later Feb 8, 2021 24:55


    In the course of performing on classified defense contracts, exchange of classified information is inevitable. While, the movement of classified information outside of a secure environment is to be kept to a minimum, there are times it must be moved in fulfillment of requirements.As the senior industrial security manager in CDCs, the FSO leads the security program designed to protect classified information and prevent unauthorized disclosure. While working in the secure environment, contractors protect classified information under their control and cleared employees protect classified information entrusted to them. Classified Meetings:Prior to the start of a classified meeting either the government sponsor or the contractor representative should provide a security briefing notifying attendees of the classification of information to be discussed, whether or not taking notes is permitted and if so, how they will be controlled. For example, when classified notes are permitted, they will have to be properly marked, introduced into accountability and prepared for dissemination (hand carry with the attendee or mailed at a later date). The presentation is controlled to prevent the inadvertent and unauthorized release. Each attendee should also be reminded to remove any cell phones or other electronic devices.In the National Industrial Security Program Operating Manual (NISPOM), we have a similar package "reveal". Security specialists, document control professionals, facility security officers and others in possessing facilities may receive classified information, depending on the contract. Part of the receipt is the critical inspection of the package during the integration process. As they unwrap the package, the inspector is orienting themselves to better understand what they should be receiving. This begins by inspecting the package physically, then comparing the contents with the receipt. They are also searching for evidence of tampering or to otherwise to inspect that there has been no compromise of classified material since leaving the sender’s organization. I also recommend using current NISPOM for security training and ISP® and ISOC certification. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security Clearances

    NISPOM Codifying, Guidance, Cleared Defense Contractors, and all those CFRs

    Play Episode Listen Later Jan 23, 2021 28:03


    The latest industry buzz is the “release of the new National Industrial Security Program Operating Manual (NISPOM)”. I’m putting air quotes in there, because an actual NISPOM has not been rewritten or re-released. There is no re-release of NISPOM, only a reorganization of the CFRs that duplicate National Industrial Security Program requirements.Conclusion: No new NISPOM (just a few additions)· 32 CFR part 117 and 32 CFR part 2004 are redundant requirements· DoD will no longer publish the DoD Manual 5220.22, NISPOM as a DoD policy issuance in 32 CFR part 117.· 32 CFR part 2004, “National Industrial Security Program” is now the standing CFR· NISPOM Change 2 is still a requirement that Cleared Defense Contractor (CDC) must followBackgroundA quick read will review that there actually is no new NISPOM. This information just codifies (fancy legal term for: arrange (laws or rules) into a systematic code.).You might know that the Director of National Intelligence (DNI) has had a large role in developing NISPOM. Primarily DNI oversees the protection of National Intelligence Information in the hands of the cleared defense contractors. Additionally, DNI has had executive roles In relation to the 2008 publication of E.O. 13467, “Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information.Biggest Impact: Reporting based on 13 Adjudicative Criteria, SF-86, and SEAD 3 SEAD 3 identifies required reporting of data elements that are contained in the Standard Form-86, “Questionnaire for National Security Positions” used in requesting security clearance requests. This doesn’t seem to be a new requirement, but an emphasis as many FSOs have been providing this requirement in security awareness training.For more information on SEAD 3, check this out: https://www.dni.gov/files/NCSC/documents/Regulations/SEAD-3-awareness-briefing.pdfDon’t wait for a new version of NISPOM…yet. While there is no “new NISPOM”, there are some clarifying comments. I also recommend using current NAccess Commander by MathCraft We support the mission of FSOs, CSOs and other security professionals. Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.redbikepublishing.com/insidersguide/)

    NISPOM training, education and certification

    Play Episode Listen Later Jan 2, 2021 34:10


    We are pleased to present the newest podcast. In this issue, we address security certification and security training because; New Year's Resolutions. ISP® AND ISOC Master Exam Prep is now available here and at most online book stores.Also, we've provided real world security discussions and frequently asked questions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do. We would love to hear your stories as well. We hope you continue to learn and benefit from our newsletter and products. If you are, please refer us to a friend or forward this newsletter with our appreciation. Stop by our advertisers websites as well. You just might find what you are looking for. Have you taken the next step to being competitive in the government contracts arena? If not, this article will provide information and tips based on a proven method of studying for and passing the exam. Why earn a certification?There are several reasons to achieve certification. One of which allows cleared defense contractor owners and employees to take advantage of opportunities offered in the recent Presidential Executive Order: National Security Professional Development. The Executive order states: "In order to enhance the national security of the United States...it is the policy of the United States to promote the education, training, and experience of current and future professionals in national security positions (security professionals)..."The National Strategy identified in the Executive Order provides a plan to give security professionals access to education, training to increase their professional experience in efforts to increase their skill level and ability to protect our nation's secrets.The ISP Certification is sponsored by NCMS (Society for Industrial Security) a professional organization specializing in protecting classified information. The ISP holder demonstrates a high level of knowledge in this area. The certification is based on the National Industrial Security Professional Operating Manual (NISPOM) but also covers electives such as: COMSEC, OPSEC, and other topics.Industrial Security Oversight Certification (ISOC) is sponsored by the Department of Defense and information can be accessed at https://www.cdse.edu/certification/Guidance for protection classified information that can be applied for training and certification: How to Get U.S. Government Contracts and Classified Work | Red Bike Publishing Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Getting Familiar with Controlled Unclassified Information Requirements

    Play Episode Listen Later Dec 7, 2020 33:23


    This episodes discusses new guidance on Controlled Unclassified Information. https://www.archives.gov/cuiIn this episode of DoD Secure, I discuss the new guidance for Controlled Unclassified Information (CUI). There are a few points to consider: 1. The government designates CUI 2. CUI Registries, training and information exist with executors at Information Security Oversight Office (ISOO) and DoD 3. The CUI guidance reflects the guidance found with protection classified information. The government owns the information, designates which is CUI, provides markings and notifications, provides oversight, and communicates to the contractor. Guidance for protection classified information that can be applied CUI can be found at: How to Get U.S. Government Contracts and Classified Work | Red Bike Publishing https://bennettinstitute.com/courses/ This discussion follows the topics: Apply proper initial marking requirements Identify decontrol requirements Describe safeguarding requirements Identify proper destruction methods Apply appropriate access and dissemination controls Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security ClearancesSecurity Clearance and NISPOM TrainingSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Consultants, Volunteers, and Security Clearance Opportunities

    Play Episode Listen Later Nov 11, 2020 30:36


    Careers in Cleared Defense Contractors:I receive a lot of emails from people who wonder how to get into the Cleared Defense Contractor field. Many are looking for a career change and are curious about what kind of education and experience is needed to work as a security specialist in the defense and contractor industry. Industrial security is an outstanding field for someone with all ranges of experience to enter into. Some have been hired at an entry level job and have received promotions and additional responsibilities. Others have transferred full time to security after enjoying serving in an additional duty capacity. Career growth occurs as the contract and company expands or the employee takes on more responsibilities after hiring on with another company. Security managers can also move to higher level security positions as chief security officer or corporate security officer as experience meets opportunity.Consulting: Consultants are hired by a company to fill a need the organization is not prepared to meet. The consultants share office furniture, the water cooler and are hopefully made to feel as part of the team. In spite of being a well respected contributor to the cause, consultants do not always enjoy the same benefits of a regular employee. However, this difference should occur when working on classified contracts the consultant has been hire to perform on. Simply stated, though a consultant is not a regular employee, the NISPOM considers them an employee of the company that they represent. The contractor is expected to maintain the consultant’s clearance and assign classified work as specified in a contract. One thing that I like about security professional organizations like American Society of Industrial Security Professionals International (ASIS) is their emphasis on giving to the community. The group sponsors scholarships, provides security services and training opportunities designed to help non-profit or not for profit organizations. Churches, charities, and students benefit from the generosity of local and national security professionals. In my own community I began to look at examples of how security professionals could contribute in a meaningful way. Volunteering: The best examples I can give are what we have done in my neighborhood. For one organization in particular, I arranged for an FBI agent to present a small presentation on cyber security. The audience consisted of interested parties representing the community and various demographics. We had teachers, children, baseball teams and senior citizens all together for breakfast and training on a fine Saturday morning. The presenter gave valuable information derived from real data. The audience was appreciative and provided positive comments. This, of course was a few yearBennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.redbikepublishing.com/insidersguide/)

    How to Ensure Security Program Stays in Step with Corporate Growth.

    Play Episode Listen Later Oct 12, 2020 27:52


    In this issue, we've provided real world security discussions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do. Preparing for growth involves the FSO not only training and hiring security employees, but accurately calculating classified inventory storage and work performance needs. Meeting legitimate growth is another area where an FSO should be injected into strategic planning. Classified contract opportunities present themselves in many variations. Potential security professionals should not only be U.S. citizens with security clearances, but demonstrate competence in the tasks they are asked to do and a desire to perform. They should also have the ability to grasp and teach concepts of security to help keep the security fresh in the corporate culture. During the certification training, the new employee can enroll in government provided on-line and residence training, lessons provided by company personnel and directly under their manager's supervision. The end of day security checklists play a critical role in protecting classified items as well as personal, proprietary and company sensitive material. The end of day checklist is a procedure required in the NISPOM and other federal agency regulations. However, they could be implemented in any situation where privileged or sensitive items prove vulnerable to theft or espionage. "What defines this room as approved for open storage?" I had asked while consulting on a project a few years ago. I had been in the middle of a deep security application discussion. The whole time I realized that the security employees I consulted understood their responsibilities, but did not know why the security measures were in place or where to find the guidance. Resources:How to Get U.S. Government Contracts and Classified Work.Insider's Guide to Security ClearancesSecurity Clearance and NISPOM TrainingSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyBennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Don't waste valuable training time

    Play Episode Listen Later Sep 20, 2020 31:26


    Some security training and briefings are very discouraging for the work force. Many times, the training is the exact same video or presentation used year after year. So, if you go to my website www.redbikepublishing.com, you might find training and tests that do ask those types of questions. This topic is specifically about how to make your security training more effective for your work force. There are two types of training: for security professionals and for the workforce. So here are three problems I see with the current security training trend:1. Lack of training resourcesWhat is concrete is that there are various training topics required for cleared defense contractor employees, they include:· SF 312 Non-Disclosure Agreement briefing· Initial Security Awareness training· Annual Security Awareness Training· Derivative Classifier training· Insider Threat Training · other required training events and briefings2. One Size Fits allThere are many resources that busy security managers can draw upon to solve the problem of training the workforce. There are downloadable training topics available from vendors and government websites. The problem is, the training never grows up or ever requires growth from members of the cleared workforce. 3. Making a nation of Security ProfessionalsThe very resources we use to present to our cleared force comes from security professional targeted websites. Defense Counterintelligence and Security Agency trains security professionals and their courses are designed for that purposes. Because of problem statements 1 and 2, we are forced to use these canned presentations. In here the workforce is tested on their knowledge of security forms, how to conduct security investigations, and how to challenge classification. In fact they need to understand better that a cover sheet exists, how to recognize and report a violation, and what to do if something is over or under classified.The solution1. Begin with the Contract Security Classification Specification or DD Form 254. 2. &Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Mission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Security Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelySupport the show (https://www.redbikepublishing.com/insidersguide/)

    Security Clearances, Export Compliance, Security Questions and Presidential Elections

    Play Episode Listen Later Sep 10, 2020 26:13


    ITAR issuesA few years ago I facilitated a short but very rewarding eight hour seminar on the International Traffic In Arms Regulation (ITAR) Overview. I am grateful to the staff at the University of Alabama in Huntsville and the North Alabama Trade Association for both sponsoring the event and allowing me to present. I found the course rewarding as I presented to a mixed audience of 30 professionals ranging from shipping and receiving specialists to executive vice presidents. The mix also consisted of professionals with various degrees of know-how as consultants, attorneys, technology control officers and those brand new to the field shared experiences and learned from one another. As a compliance officer in various disciplines, I have had the privilege of leading security and compliance teams and seminars on multiple topicsThough this was my first of hopefully many export regulations seminars, I noticed the similar need in the compliance field. Regardless of the discipline, compliance works best when driven from the top down. No matter the program a compliance officer intends to build or support, Influence is key when developing it whether security, privacy protection, safety, export, etc. Experience and technical savvy are great to have however, minus influence; the person is just an administrator playing catch-up in a crucial game. Let’s test your knowledge of international operations. The following situation is pure fiction, but is based on issues facing businesses everyday. This situation is tricky enough with unclassified contracts, but the addition of possible classified work may complicate the issue. Try to answer the following question:As the security manager of a classified facility, you have many responsibilities including approving classified visits. Not a problems since most visit requests are handled through agency approved data bases . Besides, you have a very large staff and the process is pretty much routine until….A program manager enters your office and informs you that her foreign customer wants to send an employee to work onsite on a classified program for six months. The program manager wants you to give her a visit request form that the foreign company can use to submit a visit request. You think about this for a moment and realize that though the situation is unusual, it should be a workable solution. Do you provide the visit request form? Why or why not?Security QuestionsReaders of this newsletter can use the same questions while conducting walk around security or otherwise conducting a security survey. Field these questions to your teams. If they respond correctly give loud and public praise. If they answer incorrectly you have just created a training opportuniSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)

    Three ways cleared defense contractors can up their security game.

    Play Episode Listen Later Aug 15, 2020 35:02


    I am currently preparing to publish my new book, "How to Win U.S. Government Contracts and Classified Work", it's basically a total revision of "DoD Security Clearance and Contracts Guidebook". Chapter Five reviews the Executive Orders and regulations relating to Classification Markings and there is some good information from all sources. I believe this is fundamental to the profession of anyone working on classified contracts. Understanding why and how information is classified is vital to knowing exactly what to protect and how. There are a few hard and fast rules for classifying information. It is a fantastic idea to maintain a data set of security breaches, violations, reports of compromise or suspected compromise. However, this data rarely leaves their office. Because of the sensitive nature, it is held closely either for fear of retribution or fear of embarrassment. In truth, there is no retribution for security violation reports and information contained could be very valuable for security awareness. The security manager will probably have information detailing the frequency of violations, the persons committing the violations, resolutions and training to correct the behavior. This security manager could use the information to specifically train the business unit to inform them of the infraction, as well as provide details for the annual security awareness training.See our website for downloadable training slides for your company. Our training includes Derivative Classifier, Insider Threat and Required Annual Security Awareness topics.Security through walking around requires a plan. Without the plan you are just milling about engaging in conversation and basically, wasting everyone’s time. A plan will keep you focused as well as prevent the temptations to have conversations and activities that can cause you to lose credibility. The plan doesn’t have to be complicated or lengthy. Links mentioned.Youtube Videohttps://youtu.be/eF1JHRa2U8MFree Book plus shippinghttps://www.redbikepublishing.com/insiders-guide-to-security-clearances-free-plus-shipping/Free book to first five peoplehttps://www.redbikepublishing.com/contact/Cleared employee traininghttps://www.redbikepublishing.com/fsocertification/https://www.BennettInstitute.comSecurity Defense Lawyer If you have had an event that could put your security clearance in jeopardy. contact Ron immediatelyMission Driven Research, Inc Mission Driven Research, Inc is a growing company providing technical services to the US government.Red Bike Publishing Providing security clearance books, training, and resources for cleared defense contractors.Bennett Institute Online security clearance webinars and coaching. Providing security training and resources.Support the show (https://www.redbikepublishing.com/insidersguide/)

    How to establish a new security program on a classified contract

    Play Episode Listen Later Aug 1, 2020 23:06


    Once a company wins a bid on classified work, they will then prepare their organization to perform classified work according to the contract. Some great planning resources are the DD Form 254, Statement of Work, and Security Classification Guide. This podcast teaches how to use the references to set up your program.As part of a classified contract, Cleared Defense Contractors (CDC) may receive or transmit classified information. Part of the receipt task is the critical inspection of the package throughout the unwrapping process. The inspector is searching for evidence of tampering or to otherwise to inspect that there has been no compromise of classified material since leaving the sender’s organization. Once all the checks and verifications are complete, the receiver can then sign a copy of the receipt and return to the sender, thus closing the loop on the sender’s accounting responsibilities. The copies of receipts are filed away and the classified information is put into a database and the items are stored according to the classification.Those wrapping classified information should only do so after receiving extensive training on the classification system.The National Industrial Security Program charges cleared contractors with protecting classified information. This protection extends through all phases of contracts and throughout the duration of the classification. Protection also includes the reception, storage, dissemination, and destruction of the information.Dissemination is a critical part of protecting classified information as the classified information leaves the control of the cleared organization. Whether couriered, mailed, or otherwise delivered, it is removed from a cleared facility and must be prepared in a way to protect the information from unauthorized disclosure.Prior to sending out classified information the FSO should ensure that it is double wrapped with opaque paper to preclude casual observation of the classification markings and contents. Always store and protect classified information properly. The information provided below can prove helpful as a checklist for transmitting classified information:Links mentioned.Youtube Videohttps://youtu.be/eF1JHRa2U8MDoD Security Clearances and Contracts Guidebook https://www.redbikepublishing.com/dodsecurityclearancesandcontracts/Insider's Guide to Security Clearanceshttps://www.redbikepublishing.com/insidersguide/Free Book plus shippinghttps://www.redbikepublishing.com/insiders-guide-to-security-clearances-free-plus-shipping/Free book to first five peoplehttps://www.redbikepublishing.com/contact/Cleared employee traininghttps://www.redbikepublishing.com/fsocertification/https://www.BennettInstitute.comSupport the show (https://www.redbikepublishing.com/insidersguide/)

    Security Clearances Myths, FSO Certification, and Defensive Security Training

    Play Episode Listen Later Jul 24, 2020 28:34


    An FSO can train and write NIPSOM based policy and training, but without the enterprise’s full cooperation, will find it difficult to enforce.The coordination will allow the FSO to be proactive and better support the company's performance on classified contracts. Having a security program integrated into all aspects of the company produces award winning situations and dramatically reduces security violations. Prior to travel, a cleared employee should have a good understanding of their responsibilities to protect national security. Though usually snuggled into Security Awareness Training, A Defensive Security Briefing should also be "stand along" and for those who travel overseas and possibly vulnerable to foreign entity recruiting methods. This training should be constructed to make the cleared traveler aware of their responsibilities to protect employees, product, customers and those with which they do business. Topics of the defense security briefing should include threat recognition, how to assess and how to respond when approached for recruitmentHere are a few common security clearance misconceptions: I have a bad past Everyone will see my personal secrets Security clearances cost a lot of moneyWebsites and mentions: https://www.redbikepublishing.com security clearance and classified work books and training https://www.bennettinstitute.com security clearance and performing on classified work consulting and training https://amzn.to/39iYPVL How to Win Government Contracts and Classified Workhttps://www.redbikepublishing.com/fso... https://amzn.to/2CVmyz6 Watch this on Youtube:https://youtu.be/48mGX03udtwSupport the show (https://www.redbikepublishing.com/insidersguide/)

    What to expect with a brand new security clearance

    Play Episode Listen Later Jul 1, 2020 24:49


    This blog continues the series describing what happens after the government grants you a security clearance. After receiving a job with a company or agency performing classified work, you’ll receive your onboarding training, which may have included the SF 312 Non-Disclosure Agreement, Initial Security Awareness, Derivative Classifier and other required training events and briefings. Even though the Facility Security Officer (FSO) brought you into the system, awarded your security clearance, and performed the required high-level training, there is still much more work to do to ensure you understand how to perform on classified contracts.The high-level training and onboarding is enough to get you “authorized” and prepared for the work. The rest of the preparation will come from other sources to include peers, supervisors and program managers. This training is usually provided on the job as you actually begin performing on the classified contract.This is how it might play out. The Government Contracting Agency (GCA) or program office flows down the classified work in the contract to the Cleared Defense Contractor (CDC). Part of the classified contract is the Contract Security Classification Specification or DD Form 254. According to the information on the DAMI website, the purpose of the DD Form 254 is to “…convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract…” This DD Form 254 provides direct information to complete your training so that you can perform well. Keep in mind that if you will be working on multiple contracts, you should understand the contents for each contract.The DD Form 254 will explain the classification level that you will be working with. It is important to understand that this level will be at the same level or lower than your security clearance level. Therefore, you would need a Top Secret clearance to work on classified contracts at the Top Secret level or lower. The form may also state any additional classification concerns such as foreign government information, communications security (COMSEC) requirements, and more.The form also determines where you will perform the classified work. If the CDC facility has a possessing Facility Clearance (FCL), then you might perform work at that location. If the CDC facility has a non-possessing FCL, you will usually performed classified work at another location. For example, a cleared employee may not necessarily perform the classified portion of the work at their location based on guidance in the DD Form 254. As a result, any cleared employees have an office at their headquarters or company property, but perform classified work off-site at a government, research, or other cleared contractor location.While the FSO will provide the required NISPOM security training reflecting National Industrial Professional Operating Manual (NISPOM), your supervisor may give you more work specific training as you perform on the classified contract. Your supervisor will teach you how to write documents, assemble subsystems, collect raw data from sensors, or other specific work required by your contract. They will also teach you how to correctly mark, assemble, store and protect the classified work products.Websites Mentioned:www.bennettinstitute.comhttps://www.redbikepublishing.com/fsocertification/https://www.amazon.com/-/e/B002BM2LY8Support the show (https://www.redbikepublishing.com/insidersguide/)

    Self protection, active shooters, and personal security

    Play Episode Listen Later May 18, 2020 30:48


    Richard Liebespach (Founder & CEO). Teaching people to be safe with our without a weapon. Please visit his website at http://selfprotection.co/The things that differentiate Self Protection Essentials from the rest are an out growth of our philosophy and out core beliefs.A cornerstone of our core beliefs is that we believe, at the core of our being, that we have been equipped to be able teach and with material to teach, that can save lives and save people from severe bodily harm. As a result, the martial arts and other material we have learned over several decades is the foundation of the physical techniques we teach. The material we teach is not everything we have learned. The material that we teach has been specifically chosen for its ability to be rapidly learned by people with no martial arts background. More than that, it is material that has been chosen because it is effective. And finally, it is material that almost every adult can perform adequately.Support the show (http://www.redbikepublishing.com)

    Managing the security of classified information. What people with security clearances do. an interview with David Bledsoe ISP Iron Mountain

    Play Episode Listen Later May 7, 2020 29:59 Transcription Available


    We are so happy to have with us on our podcast David Bledsoe David Bledsoe. He is the Manager of Industrial Security Compliance at Iron Mountain. In his job, he has oversight of 17 cleared facilities across the country, and provides training, leadership, and education to the local FSOs. We talk about security clearances background checks and working with customers on classified contract requirements. Iron Mountain is the world’s trusted partner for storage and information systems management and provides security storage, destruction, transportation and more.An interview with a defense contractor security manager. What people with security clearances do and how security programs are implemented.Websites relevant to the interview.www.redbikepublishing.com. security clearances, books, and training.www.bennettinstitute.com. security clearance information and education for security managers. Support the show (https://www.redbikepublishing.com/insidersguide/)

    Working in a virtual environment with a security clearance.

    Play Episode Listen Later Apr 25, 2020 22:17 Transcription Available


    I sat down with Kimber Hill of Virtforce.us to discuss how they help military spouses and veterans.I really appreciate their mission of:"We reduce the unemployment rate for Active Duty MilSpouses and Veterans by connecting employers seeking to diversify and distribute their talent network to qualified virtual candidates within the military community."Links and Resources VirtForce Podcast on Apple Podcasts VirtForce Podcast on Spotify Kimber Hill LinkedIn Jeff Bennett LinkedIn Support the show (http://www.redbikepublishing.com)

    How the federal security clearance investigation works

    Play Episode Listen Later Apr 11, 2020 20:55 Transcription Available


    We discuss the security clearance investigation and the importance of protecting classified information. You can support our show by buying Insider's Guide to Security Clearances https://amzn.to/2JUjnIcThis is great for dod security professionals, industrial security professionals, those who have questions about dod security clearances, and much more. Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past.Many don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your questions and walks the reader through the process.It's like having a security clearance roadmap and a private guide.What I've learned after over two decades in the field is that fear and misunderstandings stop people from making good career decisions such as applying for security clearance jobs. Just like any career goal or dream, you can probably list a few reasons why you should give up before you even try. Here are a few common misconceptions:I have a bad past; so they won't give me a clearance. Everyone will see my personal secretsSecurity clearances cost a lot of moneyIt takes years to get a security clearanceSecurity clearances are too competitive; they'll never give me oneNone of these are true. Insider's Guide to Security Clearance gives you the real information and solutions you need to go after that security clearance job.Inside you'll find answers to your security clearance questions and information you can use immediately. My name is Jeff Bennett and I've been working with a security clearance for decades. I understand the system well and want to share with you my knowledge. I've taught courses in college, given security training to corporations, led security teams, and written many books on the subject. I think you will be pleased with this book. If you like it, please provide a review and recommend it to your friends.Support the show (http://www.redbikepublishing.com)

    Can my sexual activity prevent me from getting a security clearance

    Play Episode Listen Later Mar 22, 2020 25:00


    Discussion of sexual activity and security clearancesSupport the show (http://www.redbikepublishing.com)

    Why are we giving our sensitive information away so easily?

    Play Episode Listen Later Mar 15, 2020 32:04 Transcription Available


    Why are we giving our sensitive information away so easily?Evaluating risk is very important. Risk events should be used to determine where vulnerabilities exist and the best approach to mitigating those vulnerabilities. We evaluate risks to viruses, sickness, how to protect sensitive information and what to put on social media or websites. Support the show (http://www.redbikepublishing.com)

    How to protect anything DICE Man Part II

    Play Episode Listen Later Mar 1, 2020 24:48


    Anchor points, counterintelligence, smart security, Defensive Information Countering Everything.Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years.www.redbikepublishing.comSupport the show (http://www.redbikepublishing.com)

    How to protect everything An Interview with Ray D*I*C*E Man Semko

    Play Episode Listen Later Feb 15, 2020 39:18 Transcription Available


    An interview with Ray Semko world renown security and counter-intelligence speaker and trainer.Ray Semko is a security educator and a professional public speaker who is nationally known for his popular and motivating D*I*C*E security awareness briefings which he has been providing to American audiences for over twenty years.Support the show (http://www.redbikepublishing.com)

    How security clearances are granted. Adjudicating the Security Clearance

    Play Episode Listen Later Feb 9, 2020 22:54


    Regarding each of the 13 Adjudicative Criteria, the applicant should gather all information available to explain the behavior that could cause a denial of a security clearance. The information should be presented during follow up interviews or as requested for review. Being well prepared will help with the adjudicative process and may result in a favorable decision. However, a lack of preparation may not fare so well. Remember, the adjudicator makes decisions with the priority being on risk to national security.The adjudicators consider the following as they try to make a decision as to whether or not the applicant will be a national security risk. They make security clearance decisions based on interest to national security. Consequently, the applicant is required to demonstrate they are not a threat to national security and should provide artifacts demonstrating that though they may have been a risk to national security at one point, that risk has been mitigated.Support the show (http://www.redbikepublishing.com)

    Can drug users get a security clearance? Drug Use and Security Clearance Applications

    Play Episode Listen Later Jan 24, 2020 26:05


    Adjudicative Guideline H: Drug Involvement is another concern that could lead to the denial or revocation of a security clearance. Drug involvement includes the abuse of illicit and legal drugs. However, a review of security clearance cases demonstrates that marijuana continues to be a concern for many applicants. Additionally, new state laws, public opinion, and attitudes may make it tempting for Americans to casually use marijuana and other drugs. Recently Colorado and other states have legalized the use of marijuana and some states also allow the use of medical marijuana. However, where national security is concerned, marijuana and the abuse of legal and illicit drugs for any reason can be cause for denial of a security clearance. Support the show (http://www.redbikepublishing.com)

    How to get a security clearance The Personnel Security Clearance

    Play Episode Listen Later Jan 7, 2020 26:09


    Over the years I've been asked the same question: "Can you help me get a security clearance? My answer is both yes and know. If the individual either owns a business and is competing for a classified contract or has a contractual need for a Facility Clearance, then they are eligible to pursue a security clearance. Likewise, if they work for a cleared defense contractor and require a security clearance to perform on classified work, then the answer is yes as well.Support the show (http://www.redbikepublishing.com)

    How To Get A Facility Security Clearance

    Play Episode Listen Later Nov 20, 2019 24:13 Transcription Available


    Discussion on how business entities and get security clearances. Support the show (http://www.redbikepublishing.com)

    Interview with a Cold War Counter-Spy

    Play Episode Listen Later Sep 16, 2019 35:27


    John W. Davis shares analogies between cold war reporting and insider threat reporting responsibilities. Security managers can gain a better understanding of how to establish a program that facilitates the reporting of credible insider threat information.Support the show (http://www.redbikepublishing.com)

    Establishing an Insider Threat Program

    Play Episode Listen Later Aug 8, 2019 25:57


    Cleared defense contractors are required to integrate an insider threat program. The first step is to designate a “Senior Official” to establish and execute the insider threat programIn this episode we'll address: •Fundamentals of the Insider Threat Program (ITP)•Establishing an ITP•ITP Definitions•Insider Threat Impact on Industry•ITP Training RequirementSupport the show (http://www.redbikepublishing.com)

    Claim DoD Secure

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel