March 29, 2018

New Insider Threat Indicators in UAM Job Aid

This job aid discusses Insider Threat policies and procedures for User Activity Monitoring (UAM) on classified networks in support of Insider Threat Programs. Logging, monitoring, and auditing of information system activities can lead to early discovery and mitigation of behavior indicative of insider threat. UAM also plays a key role in prevention, assistance, and response (PAR) capabilities to insider kinetic violence threats.

Counterintelligence Awareness Vigilance Campaign

Check the Vigilance Tab of the Insider Threat Toolkit for customizable Vigilance Campaign posters, guidance, job aids, and other resources. 

Insider Threat - Unauthorized Disclosure Video

Improper handling of classified documents can happen. As a cleared individual, you have an obligation to protect classified information. Failure to do so can result in damage to national security and the warfighter. There are approved channels to report fraud, waste, or other abuse through existing whistleblower or inspector general channels. There are also approved channels for the release and review of DoD information. Knowing how to handle these situations is crucial to protecting our Nation’s secrets.

New Cybersecurity Program Released

The Center for Development of Security Excellence recently launched a new Cybersecurity program, “NISP Assessment and Authorization (A&A) Program.”  This program provides students with a thorough understanding of the security requirements for safeguarding classified information being processed and stored in information systems at cleared contractor facilities through an in-depth review of the National Industrial Security Program (NISP) Assessment and Authorization process. 

Access the program.

New Cybersecurity Course Released

The Center for Development of Security Excellence recently launched a new Cybersecurity course, “Technical Implementation of Assessment and Authorization in the NISP.”  This course is the third in a series of three courses comprising the National Industrial Security Program (NISP) A&A Program. It focuses more on technical aspects of the A&A process and guides students on assessing the system using the Security Content Automation Protocol (SCAP) Compliance Checker, Security Technical Implementation Guides (STIGs), and STIG Viewer. 

Access the course.

Register For Upcoming Webinar

The Center for Development of Security Excellence (CDSE) invites you to participate in our upcoming webinar:

Key Management Personnel and Personnel Security Clearance
Thursday, April 19, 2018
11:30 a.m. ET                                                                                                                                                                                                                                         2:30 p.m. ET

This webinar will identify the Key Management Personnel (KMP) required to be cleared for granting or maintaining a Facility Security Clearance (FCL). Discussions will include Essential KMP, Non-Essential KMP, Exclusion Resolutions, and Common List of KMP.

Register and be part of the conversation! Sign up today.

Archived Industrial Security Webinar Now Available

Did you miss last month’s “Visits and Meetings in the NISP: What’s New?” webinar? This webinar discussed why it was necessary to make changes to the course, “Visits and Meetings in the National Industrial Security Program (NISP).” It also addressed the definitions of visits and meetings in accordance with the NISPOM. If so, you can now access the archived webinar.
Access the archived webinar (no certificate provided) under Previously Recorded Webinars which provides the option of registering for the on-demand webinar (certificate provided) or viewing webinars (no certificate).

Sign Up For Upcoming Speaker Series

Join CDSE for our April Speaker Series:

Let's Talk About FOCI
Thursday, April 12, 2018
12:00 p.m. ET

This is the first of a series of topics from the Industrial Security discipline that will focus on various missions within DSS. Our guest will be speaking with us regarding Foreign Ownership, Control, or Influence (FOCI) and some main concerns for DSS, as well as the problems that occur when one doesn't report FOCI. The speaker will also delve into ways in which we can change things.

Register and be part of the conversation! Sign up today.

Social Media

Connect with CDSE on Twitter (@TheCDSE ) and on Facebook (www.facebook.com/TheCDSE ).