<< First  < Prev   1   2   3   Next >  Last >> 
  • 20 Nov 2017 8:52 PM | Anonymous member (Administrator)


    TEKsystems® Inc. is looking for an AFSO.  If you are interested see additional information at the following link,


  • 20 Aug 2017 8:30 PM | Anonymous member (Administrator)

    EOIR is looking for information on how to set up a PERSEC office. Has anyone in the group established a PERSEC office?  If you would be willing to mentor EOIR in assisting with setting up the PERSEC office it would be greatly appreciated.

    Contact Diane Moulton at 540-834-4856 or email


  • 07 Mar 2017 9:06 PM | Anonymous member (Administrator)

    The PSMO-I Personnel Clearance Update Briefing has been posted on the Resource page.   

  • 11 Oct 2016 9:13 PM | Anonymous member (Administrator)

    The Resource page has been updated to include Guidance for Submitting RRUs.  Check out the Resource page to see what's new. 

  • 19 Sep 2016 11:19 AM | Anonymous member (Administrator)

    Attached is a sample Insider Threat Program from CDSE for Industry. 

  • 25 Aug 2016 2:16 PM | Anonymous member (Administrator)

    A new resource has been added to the Resource Page.  The link to the newly released Assessment and Authorization Process Manual has been added.  Please visit the DSS website for information regarding the RMF and new information pertaining to accrediting IS.  

  • 11 Aug 2016 11:27 AM | Anonymous member (Administrator)

    DSS has updated the Self-Inspection Handbook to align with NISPOM Conforming Change 2.


    Self_Inspection Handbook_2016.pdf
  • 11 Aug 2016 11:03 AM | Anonymous member (Administrator)

    DSS has updated the DSS Vulnerability Assessment Rating Matrix Vulnerabilities & NISP Enhancement Categories, to better align with NISPOM Change 2 and ISL-2016-02. 


  • 14 Jun 2016 2:22 PM | Anonymous member (Administrator)

    As many of you are aware, NISPOM Conforming Change 2 / DSS ISL-2016-02 - Insider Threat Program Requirements was released on May 21, 2016. Defense Industrial Base (DIB) contractors must have a written Insider Threat Program Implementation Plan in place to begin implementing an Insider Threat Program, no later than November 30, 2016. Non DIB Contractors, Federal and State Government Agencies and businesses will also benefit greatly from this training. Where do you start? ITD can help you.

    ITD has been providing U.S. Government Agencies, Defense Industrial Base (DIB) Contractors, NCMS Members / Chapters, Defense Security Reps, large and small businesses comprehensive training on National Insider Threat Policy (NITP) and NISPOM Conforming Change 2 - Insider Threat. ITD has trained 200+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training and Insider Threat Risk Mitigation Services. (Client Listing)

    Insider Threat Program Development Training For NITP-NISPOM Conforming Change 2 Overview                                                 

    The Insider Threat Program Development Training Course will provide the Insider Threat Program Senior Official and Facility Security Officer with the knowledge and resources to achieve compliance with NITP and DSS ISL-2016-02 - Insider Threat Program Requirements.

    Two Of The Many Great Comments From Recent Students

    •  Absolutely phenomenal class and materials. Literally everything needed to build an Insider Threat Program. Student Rating: The best security training course I have attended

    •             I would definitely recommend this course to other security professionals. Hands down the best. The information is the best I have ever seen. You did a splendid job of sharing this information.         Student Rating: The best security training course I have attended. (Additional Student Comments)


    ITD for a LIMITED TIME is offering NCMS Members and others the Insider Threat Program Development Training at a special rate of $795.00 per person. The normal cost is $1,395.

    Insider Threat Program Development Training (2 Day Class)

    Key Training Objectives - Students Will Learn:

    •             How To Develop, Implement And Manage A Compliant, Robust And Effective Insider Threat Program Per NITP- DSS ISL-2016-02 - Insider Threat Program Requirements (Step By Step A-Z)

    •             How To Develop An Insider Threat Program Implementation Plan (DSS Requirement - Template Supplied - Mapped To DSS ISL-2016-02, DSS Self Inspection Guide)

    •             How To Create An Insider Threat Risk Management Framework / Insider Threat Program Working Group-Hub

    •             The Behavioral Indicators Of Concern To An Insider Threat Program (Witting, Unwitting)

    •             What Are The Essential Data Sources That Will Support An Insider Threat Program (Data Collection & Analysis, Technical, Non-Technical)

    •             The Importance Of Creating Insider Threat Program NDA's, Rules Of Behavior (Template Supplied)

    •             How To Build Insider Threat Awareness Into The Workforce To Detect And Report Potential Insider Threat (Insider Threat Awareness DVD's Provided)

    •             How To Detect Activity Indicative Of Insider Threat Behavior With User Activity Monitoring Tools

    •             How To Handle Insider Threat Inquiries, Investigations & Case Management

    •             The Technical / Non-Technical Threats That Can Be Utilized By Insiders For Malicious Purposes

    •             How To Conduct Insider Threat Risk Assessments To Identify Vulnerabilities

    •             And More........

    What Is Included With The Training?

    Insider Threat Program Implementation Plan Template

    Insider Threat Risk Assessment And Mitigation Handbook (140+ Pages)

    Insider Threat Program Development Training Course Student DVD Toolkit

    Insider Threat Security Specialist (ITSS) Certificate

    Class Dates, Locations

    Aberdeen, MD -    August 10-11, 2016


    Please Note

    Reference to commercial products, processes, or services do not necessarily constitute an endorsement by NCMS, Inc. The opinions and views expressed on this email and on any link websites do not necessarily reflect those of NCMS.

    E-Mail Opt-Out

    We hope you enjoy receiving e-mail notices from Insider Threat Defense. If you do not wish to receive e-mail messages, please reply to this e-mail and change the subject line to “Unsubscribe.”

    If you are interested in hosting  an Insider Threat Course – Please contact Diane Griffin –  or Carole White –

    Please contact me with any questions you may have about the above training.

    Jim Henderson, CISSP, CCISO

    CEO Insider Threat Defense, Inc.

    Insider Threat Program Development Training Course Instructor / Risk Mitigation Specialist

    Founder / Chairman Of The National Insider Threat Special Interest Group

    888-363-7241 / 561-809-6800


  • 07 Jun 2016 5:48 PM | Anonymous member (Administrator)

    Security Executive Agent Directive (SEAD) 5 was signed by the Director of National Intelligence, James Clapper on 12 May 2016.  The Resource page has a copy of SEAD 5 and the new SF 86 Authorization for Release of Information signature page.

<< First  < Prev   1   2   3   Next >  Last >> 
©2014 Northeast Maryland Security Council.  All Rights Reserved.
Powered by Wild Apricot Membership Software