News

  • 07 Jun 2016 5:48 PM | Anonymous member (Administrator)

    Security Executive Agent Directive (SEAD) 5 was signed by the Director of National Intelligence, James Clapper on 12 May 2016.  The Resource page has a copy of SEAD 5 and the new SF 86 Authorization for Release of Information signature page.

  • 19 May 2016 2:11 PM | Anonymous member (Administrator)

    When searching for the updated NISPOM on the DTIC site look under the Publications heading to find the link to download your new copy of the NISPOM.   

  • 19 May 2016 1:49 PM | Anonymous member (Administrator)

    The NIPSOM incorporating Change 2, dated May 18, 2016 and the Summary of Changes can be found at the following link  http://www.dtic.mil/whs/directives/whats_new.html

    Traditional-related Highlights:

    ·         1-202 (Insider Threat Program)

    ·         1-207b (self-inspection program)

    ·         1-400/1-401/1-402 (Reports to DoD about Cyber Incidents…)

    ·         3-103 (Insider Threat Training)

    ·         3-107 and 3-108 (training)

    ·         4-213 (Marking Compilations)

    ·         5-303 (Secret Storage)

    ·         5-311 (Repair of Approved Containers

    ·         9-100  thru 9-109 (See Appendix D)

    ·         9-300 thru 9- (Intelligence Information)

    ·         10-802 thru 10-806 (Defense Article Transfers)

    ·         Appendix C (Definitions)

    ·         Appendix D (NISPOM Supplement – Security Requirements for SAPS, SCI, IC Compartmented Programs, RD, & FRD)

     

    IS-related Highlights:

    Chapter 8 (is now 8 pages) and references

    ·         1-207b (self-inspection program)

    ·         3-107 and 3-108 (training)

    ·         Insider threat

    ·         Appendix D

    IS guidance will be based on requirements for federal systems as established by FISMA and defined in

    ·         NIST SP 800-37

    ·         CNSS Directive 504

    ·         NISP SP 800-53

    ·         CNSSI No. 1253

    The security control baseline will be Moderate, Low, Low unless otherwise required by contract.

  • 03 May 2016 11:40 AM | Anonymous member (Administrator)

    The NMSC would like to welcome the following new members:

    1.  Dean Engelhardt - Battelle

    2.  Jason Franks- Applied Defense

    3.  Cindi Hall - QED Systems

    4.  Tricia Reider - CADRE/JHU

    We look forward to welcoming you into our security community! 

  • 19 Apr 2016 12:05 PM | Anonymous member (Administrator)

    Please see the JFAN Rescind Memo applicable to those who work with Special Access Programs (SAPs).

     

    JFAN Rescind Memo (4 Apr 16).pdf
  • 12 Apr 2016 2:22 PM | Anonymous member (Administrator)

    DSS releases ISL 2016-01, updating the list of Federal agencies that have entered into an agreement with DoD for Industrial Security services.  The ISL can be viewed  at the DSS website, www.dss.mil

  • 30 Mar 2016 10:46 AM | Anonymous member (Administrator)

    Newly added Presentation to the Resource Page. 

    Diane Moulton, Corporate FSO for EOIR Technologies, Inc. has shared her presentation from the Seminar held on 02/23/2016.  Please take time to review the briefing for many tips on how to enhance your Security Program and achieve a Superior rating at your next DSS Assessment.

     

  • 10 Mar 2016 9:01 PM | Anonymous member (Administrator)

    Here are a few precautions business executives and employees can take to protect trade secrets:

    Recognize there is an insider and outsider threat to your company.

    Identify trade secrets and implement a plan for safeguarding them.

    Secure physical and electronic versions of your trade secrets.

    Confine intellectual knowledge to a need-to-know basis.

    Provide training to employees about your company’s intellectual property plan and security.

    Do not store private information vital to your company on any device that connects to the Internet.

    Use up-to-date software security tools. Many firewalls stop incoming threats but do not restrict outbound data.

    Educate employees on e-mail tactics such as spear phishing. Establish protocols for quarantining suspicious e-mail.

    Remind employees of security policies on a regular basis through active training and seminars. Use signs and computer banners to reinforce security policies.

    Ask the FBI or other security professionals to provide additional awareness training.

     

  • 22 Feb 2016 9:51 PM | Anonymous member (Administrator)

    The Northeast Maryland Security Council 1/2 Day Seminar will begin on time on Tuesday, February 23, 2016. 

    Registration/Networking/Breakfast will start at 7:45 am at

    MITRE, 209 Research Blvd, Suite 200, Aberdeen, MD 21001.

    Drive safely and we will see you soon. 

  • 02 Feb 2016 5:47 PM | Anonymous member (Administrator)

    Small IT Services company has a full-time opening for an experienced FSO who can also assist with various HR and Recruiting functions to include:

    •       HR functions
    •    Tracking open positions
    •        Contract proposals
    •        Security training
    •        Spot audits
    •        Recruiting/screening non-technical positions (i.e. forklift operators, drivers, technicians, etc.)

    They don’t have to have experience with all these skills but this person would need be able to help in other areas outside of their FSO responsibilities as those needs do not take up 40 hours/week.

    Location:  Laurel, Maryland

    Clearance Required:  Top Secret

    If interested, please contact Shelley Koukoulas at skoukoulas@aci.com

     

©2014 Northeast Maryland Security Council.  All Rights Reserved.
Powered by Wild Apricot Membership Software