News

  • 11 Aug 2016 11:27 AM | Anonymous member (Administrator)

    DSS has updated the Self-Inspection Handbook to align with NISPOM Conforming Change 2.

     

    Self_Inspection Handbook_2016.pdf
  • 11 Aug 2016 11:03 AM | Anonymous member (Administrator)

    DSS has updated the DSS Vulnerability Assessment Rating Matrix Vulnerabilities & NISP Enhancement Categories, to better align with NISPOM Change 2 and ISL-2016-02. 

     

    VulnAssm_RatingMatrix_2016Update.pdf
  • 14 Jun 2016 2:22 PM | Anonymous member (Administrator)

    As many of you are aware, NISPOM Conforming Change 2 / DSS ISL-2016-02 - Insider Threat Program Requirements was released on May 21, 2016. Defense Industrial Base (DIB) contractors must have a written Insider Threat Program Implementation Plan in place to begin implementing an Insider Threat Program, no later than November 30, 2016. Non DIB Contractors, Federal and State Government Agencies and businesses will also benefit greatly from this training. Where do you start? ITD can help you.

    ITD has been providing U.S. Government Agencies, Defense Industrial Base (DIB) Contractors, NCMS Members / Chapters, Defense Security Reps, large and small businesses comprehensive training on National Insider Threat Policy (NITP) and NISPOM Conforming Change 2 - Insider Threat. ITD has trained 200+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training and Insider Threat Risk Mitigation Services. (Client Listing)

    Insider Threat Program Development Training For NITP-NISPOM Conforming Change 2 Overview                                                 

    The Insider Threat Program Development Training Course will provide the Insider Threat Program Senior Official and Facility Security Officer with the knowledge and resources to achieve compliance with NITP and DSS ISL-2016-02 - Insider Threat Program Requirements.

    Two Of The Many Great Comments From Recent Students

    •  Absolutely phenomenal class and materials. Literally everything needed to build an Insider Threat Program. Student Rating: The best security training course I have attended

    •             I would definitely recommend this course to other security professionals. Hands down the best. The information is the best I have ever seen. You did a splendid job of sharing this information.         Student Rating: The best security training course I have attended. (Additional Student Comments)

    Cost

    ITD for a LIMITED TIME is offering NCMS Members and others the Insider Threat Program Development Training at a special rate of $795.00 per person. The normal cost is $1,395.

    Insider Threat Program Development Training (2 Day Class)

    Key Training Objectives - Students Will Learn:

    •             How To Develop, Implement And Manage A Compliant, Robust And Effective Insider Threat Program Per NITP- DSS ISL-2016-02 - Insider Threat Program Requirements (Step By Step A-Z)

    •             How To Develop An Insider Threat Program Implementation Plan (DSS Requirement - Template Supplied - Mapped To DSS ISL-2016-02, DSS Self Inspection Guide)

    •             How To Create An Insider Threat Risk Management Framework / Insider Threat Program Working Group-Hub

    •             The Behavioral Indicators Of Concern To An Insider Threat Program (Witting, Unwitting)

    •             What Are The Essential Data Sources That Will Support An Insider Threat Program (Data Collection & Analysis, Technical, Non-Technical)

    •             The Importance Of Creating Insider Threat Program NDA's, Rules Of Behavior (Template Supplied)

    •             How To Build Insider Threat Awareness Into The Workforce To Detect And Report Potential Insider Threat (Insider Threat Awareness DVD's Provided)

    •             How To Detect Activity Indicative Of Insider Threat Behavior With User Activity Monitoring Tools

    •             How To Handle Insider Threat Inquiries, Investigations & Case Management

    •             The Technical / Non-Technical Threats That Can Be Utilized By Insiders For Malicious Purposes

    •             How To Conduct Insider Threat Risk Assessments To Identify Vulnerabilities

    •             And More........

    What Is Included With The Training?

    Insider Threat Program Implementation Plan Template

    Insider Threat Risk Assessment And Mitigation Handbook (140+ Pages)

    Insider Threat Program Development Training Course Student DVD Toolkit

    Insider Threat Security Specialist (ITSS) Certificate

    Class Dates, Locations

    Aberdeen, MD -    August 10-11, 2016

    Registration:

    www.nispomcc2training.com

    Please Note

    Reference to commercial products, processes, or services do not necessarily constitute an endorsement by NCMS, Inc. The opinions and views expressed on this email and on any link websites do not necessarily reflect those of NCMS.

    E-Mail Opt-Out

    We hope you enjoy receiving e-mail notices from Insider Threat Defense. If you do not wish to receive e-mail messages, please reply to this e-mail and change the subject line to “Unsubscribe.”

    If you are interested in hosting  an Insider Threat Course – Please contact Diane Griffin – dgriffin@security1stassoc.com  or Carole White – cwhite@innovis.com

    Please contact me with any questions you may have about the above training.

    Jim Henderson, CISSP, CCISO

    CEO Insider Threat Defense, Inc.

    Insider Threat Program Development Training Course Instructor / Risk Mitigation Specialist

    Founder / Chairman Of The National Insider Threat Special Interest Group

    888-363-7241 / 561-809-6800

    www.insiderthreatdefense.com

    www.nispomcc2training.com

    jimhenderson@insiderthreatdefense.com

    www.nationalinsiderthreatsig.org

    jimhenderson@nationalinsiderthreatsig.org

     

  • 07 Jun 2016 5:48 PM | Anonymous member (Administrator)

    Security Executive Agent Directive (SEAD) 5 was signed by the Director of National Intelligence, James Clapper on 12 May 2016.  The Resource page has a copy of SEAD 5 and the new SF 86 Authorization for Release of Information signature page.

  • 19 May 2016 2:11 PM | Anonymous member (Administrator)

    When searching for the updated NISPOM on the DTIC site look under the Publications heading to find the link to download your new copy of the NISPOM.   

  • 19 May 2016 1:49 PM | Anonymous member (Administrator)

    The NIPSOM incorporating Change 2, dated May 18, 2016 and the Summary of Changes can be found at the following link  http://www.dtic.mil/whs/directives/whats_new.html

    Traditional-related Highlights:

    ·         1-202 (Insider Threat Program)

    ·         1-207b (self-inspection program)

    ·         1-400/1-401/1-402 (Reports to DoD about Cyber Incidents…)

    ·         3-103 (Insider Threat Training)

    ·         3-107 and 3-108 (training)

    ·         4-213 (Marking Compilations)

    ·         5-303 (Secret Storage)

    ·         5-311 (Repair of Approved Containers

    ·         9-100  thru 9-109 (See Appendix D)

    ·         9-300 thru 9- (Intelligence Information)

    ·         10-802 thru 10-806 (Defense Article Transfers)

    ·         Appendix C (Definitions)

    ·         Appendix D (NISPOM Supplement – Security Requirements for SAPS, SCI, IC Compartmented Programs, RD, & FRD)

     

    IS-related Highlights:

    Chapter 8 (is now 8 pages) and references

    ·         1-207b (self-inspection program)

    ·         3-107 and 3-108 (training)

    ·         Insider threat

    ·         Appendix D

    IS guidance will be based on requirements for federal systems as established by FISMA and defined in

    ·         NIST SP 800-37

    ·         CNSS Directive 504

    ·         NISP SP 800-53

    ·         CNSSI No. 1253

    The security control baseline will be Moderate, Low, Low unless otherwise required by contract.

  • 03 May 2016 11:40 AM | Anonymous member (Administrator)

    The NMSC would like to welcome the following new members:

    1.  Dean Engelhardt - Battelle

    2.  Jason Franks- Applied Defense

    3.  Cindi Hall - QED Systems

    4.  Tricia Reider - CADRE/JHU

    We look forward to welcoming you into our security community! 

  • 19 Apr 2016 12:05 PM | Anonymous member (Administrator)

    Please see the JFAN Rescind Memo applicable to those who work with Special Access Programs (SAPs).

     

    JFAN Rescind Memo (4 Apr 16).pdf
  • 12 Apr 2016 2:22 PM | Anonymous member (Administrator)

    DSS releases ISL 2016-01, updating the list of Federal agencies that have entered into an agreement with DoD for Industrial Security services.  The ISL can be viewed  at the DSS website, www.dss.mil

  • 30 Mar 2016 10:46 AM | Anonymous member (Administrator)

    Newly added Presentation to the Resource Page. 

    Diane Moulton, Corporate FSO for EOIR Technologies, Inc. has shared her presentation from the Seminar held on 02/23/2016.  Please take time to review the briefing for many tips on how to enhance your Security Program and achieve a Superior rating at your next DSS Assessment.

     

©2014 Northeast Maryland Security Council.  All Rights Reserved.
Powered by Wild Apricot Membership Software