Artwork

Вміст надано jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

How to Ensure Security Program Stays in Step with Corporate Growth.

27:52
 
Поширити
 

Manage episode 293117334 series 2929664
Вміст надано jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Send us a text

In this issue, we've provided real world security discussions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do.
Preparing for growth involves the FSO not only training and hiring security employees, but accurately calculating classified inventory storage and work performance needs. Meeting legitimate growth is another area where an FSO should be injected into strategic planning. Classified contract opportunities present themselves in many variations.
Potential security professionals should not only be U.S. citizens with security clearances, but demonstrate competence in the tasks they are asked to do and a desire to perform. They should also have the ability to grasp and teach concepts of security to help keep the security fresh in the corporate culture.
During the certification training, the new employee can enroll in government provided on-line and residence training, lessons provided by company personnel and directly under their manager's supervision.
The end of day security checklists play a critical role in protecting classified items as well as personal, proprietary and company sensitive material. The end of day checklist is a procedure required in the NISPOM and other federal agency regulations. However, they could be implemented in any situation where privileged or sensitive items prove vulnerable to theft or espionage.
"What defines this room as approved for open storage?" I had asked while consulting on a project a few years ago. I had been in the middle of a deep security application discussion. The whole time I realized that the security employees I consulted understood their responsibilities, but did not know why the security measures were in place or where to find the guidance.
Resources:

NISPOM Central
Providing security clearance books, training, and resources for cleared defense contractors.
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Support the show

FSO Consulting:
https://thriveanalysis.com
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.

Personnel Security Clearances

  • How to get a clearance
  • What to expect once you get a clearance
  • What you can do to prepare for a clearance

Facility Security Clearance

✓Become a CDC Contractor

✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances

✓Establish a security team to protect classified information

✓Develop and provide required security training

✓Prepare for government inspections

✓Interpret Contract specifications

✓Fight Insider threat

✓Learn Security clearance levels

✓Process Classified information

✓Prepare Derivative Classification

✓Provide required Security Training

✓Appointing a Facility Security Officer

✓Prepare for Government Audits

Security Clearance and NISPOM consulting

  continue reading

59 епізодів

Artwork
iconПоширити
 
Manage episode 293117334 series 2929664
Вміст надано jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Send us a text

In this issue, we've provided real world security discussions. These occasions have proven to be good opportunities to clarify understanding of security policies and the reasons we do what we do.
Preparing for growth involves the FSO not only training and hiring security employees, but accurately calculating classified inventory storage and work performance needs. Meeting legitimate growth is another area where an FSO should be injected into strategic planning. Classified contract opportunities present themselves in many variations.
Potential security professionals should not only be U.S. citizens with security clearances, but demonstrate competence in the tasks they are asked to do and a desire to perform. They should also have the ability to grasp and teach concepts of security to help keep the security fresh in the corporate culture.
During the certification training, the new employee can enroll in government provided on-line and residence training, lessons provided by company personnel and directly under their manager's supervision.
The end of day security checklists play a critical role in protecting classified items as well as personal, proprietary and company sensitive material. The end of day checklist is a procedure required in the NISPOM and other federal agency regulations. However, they could be implemented in any situation where privileged or sensitive items prove vulnerable to theft or espionage.
"What defines this room as approved for open storage?" I had asked while consulting on a project a few years ago. I had been in the middle of a deep security application discussion. The whole time I realized that the security employees I consulted understood their responsibilities, but did not know why the security measures were in place or where to find the guidance.
Resources:

NISPOM Central
Providing security clearance books, training, and resources for cleared defense contractors.
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Support the show

FSO Consulting:
https://thriveanalysis.com
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.

Personnel Security Clearances

  • How to get a clearance
  • What to expect once you get a clearance
  • What you can do to prepare for a clearance

Facility Security Clearance

✓Become a CDC Contractor

✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances

✓Establish a security team to protect classified information

✓Develop and provide required security training

✓Prepare for government inspections

✓Interpret Contract specifications

✓Fight Insider threat

✓Learn Security clearance levels

✓Process Classified information

✓Prepare Derivative Classification

✓Provide required Security Training

✓Appointing a Facility Security Officer

✓Prepare for Government Audits

Security Clearance and NISPOM consulting

  continue reading

59 епізодів

Усі епізоди

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити