SAP Security Incident - Accountability

SAP Security Incident - Accountability
Being responsible for your program’s accountable material and hardware is a serious responsibility. Take a look at this video and see if you can identify what went wrong. Stop and think about what could be done to help prevent scenarios like this from happening in your program.

SAP Security Incident - Overworked

SAP Security Incident - Overworked
Being overworked and constantly trying to meet timelines is a regular occurrence for many employees. Take a look at this video and see if you can identify what went wrong. Stop and think about what could be done to help prevent scenarios like this from happening in your program.

Incorporating Social Media into Federal Background Investigations Vido

Incorporating Social Media into Federal Background Investigations Video
On May 13, 2016, the House Subcommittee on Government Operations and the Subcommittee on National Security held hearings on the recently published Security Executive Agent Directive 5, Collection, Use, and Retention of Publicly Available Social Media Information in Personnel Security Background Investigations and Adjudications.

Ransomware

Ransomware
Ransomware attacks are on the rise. Ransomware "kidnaps" your data and demands ransom. This video lesson guides you through an attack and discusses what you need to know to protect yourself.

Social Media

Social Media
While there are many benefits to sharing and communicating through social media, it can also be a big security risk. This video lesson explores the risks associated with social media and why you should be concerned.

Need to know

Need-to-Know Training Video
This video provides a short refresher on the fundamental Need-To-Know security principle. It reviews a case history and provides guidelines on your responsibilities for applying the principle.

Supply Chain Risk Management Video

Know the Risk - Raise Your Shield: Supply Chain Risk Management
Prepared by the Office of the Director of National Intelligence's National Counterintelligence and Security Center

Counterintelligence Awareness Video

Counterintelligence Awareness Video
Threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. CDSE provides Counterintelligence Awareness training and related materials on recognizing the threat, reporting procedures, and much more.

Operating and Closing the X-10 Electromechanical Combination Lock

Operating the Combination of the X-10 Electromechanical Combination Lock
This video demonstrates how to operate the X-10 Lock. The X-10 Lock is an electromechanical combination lock found on many GSA approved security containers.

Changing the Combination of the X-10 Electromechanical Combination Lock

Changing the Combination of the X-10 Electromechanical Combination Lock
This video demonstrates how to change the combination of the X-10 Lock. The X-10 Lock is an electromechanical combination lock found on many GSA approved security containers.

Operating the S&G 2740B Electromechanical Safe Lock

Operating the S&G 2740B Electromechanical Safe Lock
This video demonstrates how to operate the S&G 2740B Lock. The S&G 2740B is an electromechanical safe lock found on many GSA approved security containers.

Changing the Combination of the S&G 2740B Electromechanical Safe Lock

Changing the Combination of the S&G 2740B Electromechanical Safe Lock
This video demonstrates how to change the combination of the S&G 2740B Lock. The S&G 2740B Lock is an electromechanical safe lock found on many GSA approved security containers.

Operating S&G 2740 Locks

Operating S&G 2740 Locks
This video demonstrates how to operate the S&G 2740 Lock. The S&G is an electronic combination lock found on many GSA approved security containers.

Changing the Combination of S&G 2740 Locks

Changing the Combination of S&G 2740 Locks
This video demonstrates how to change the combination of the S&G 2740 Lock. The S&G 2740 is an electronic combination lock found on many GSA approved security containers.

Operating locks

Operating X-07 and X-09 Locks
This video demonstrates how to operate the X-07 and X-09 locks. The X-07 and X-09 locks are electronic combination locks found on many GSA approved security containers.

Changing the Combination of X-07 and X-09 Locks

Changing the Combination of X-07 and X-09 Locks
This video demonstrates how to change the combination of the X-07 and X-09 locks. The X-07 and X-09 locks are electronic combination locks found on many GSA approved security containers.

Packaging Classified Documents

Packaging Classified Documents
The purpose of this video is to provide baseline procedures to be used when packaging classified materials for transmission or transportation of envelopes and small parcels.

Need to know

How to Take Successful Electronic Fingerprints
This video provides a brief description of the electronic fingerprinting process. It also discusses common errors that may occur, proper technique, and the various aspects of the procedure.