Artwork

Content provided by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Three ways cleared defense contractors can up their security game.

35:02
 
Share
 

Manage episode 293117337 series 2929664
Content provided by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Send us a Text Message.

I am currently preparing to publish my new book, "How to Win U.S. Government Contracts and Classified Work", it's basically a total revision of "DoD Security Clearance and Contracts Guidebook". Chapter Five reviews the Executive Orders and regulations relating to Classification Markings and there is some good information from all sources.

I believe this is fundamental to the profession of anyone working on classified contracts. Understanding why and how information is classified is vital to knowing exactly what to protect and how. There are a few hard and fast rules for classifying information.
It is a fantastic idea to maintain a data set of security breaches, violations, reports of compromise or suspected compromise. However, this data rarely leaves their office. Because of the sensitive nature, it is held closely either for fear of retribution or fear of embarrassment. In truth, there is no retribution for security violation reports and information contained could be very valuable for security awareness. The security manager will probably have information detailing the frequency of violations, the persons committing the violations, resolutions and training to correct the behavior. This security manager could use the information to specifically train the business unit to inform them of the infraction, as well as provide details for the annual security awareness training.
See our website for downloadable training slides for your company. Our training includes Derivative Cl

Security Defense Lawyer
If you have had an event that could put your security clearance in jeopardy. contact Ron immediately
NISPOM Central
Providing security clearance books, training, and resources for cleared defense contractors.
Bennett Institute
Online security clearance webinars and coaching. Providing security training and resources.
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Support the Show.

FSO Consulting:
https://thriveanalysis.com/nisp/
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.

Personnel Security Clearances

  • How to get a clearance
  • What to expect once you get a clearance
  • What you can do to prepare for a clearance

Facility Security Clearance

✓Become a CDC Contractor

✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances

✓Establish a security team to protect classified information

✓Develop and provide required security training

✓Prepare for government inspections

✓Interpret Contract specifications

✓Fight Insider threat

✓Learn Security clearance levels

✓Process Classified information

✓Prepare Derivative Classification

✓Provide required Security Training

✓Appointing a Facility Security Officer

✓Prepare for Government Audits

Security Clearance and NISPOM consulting

  continue reading

53 episodes

Artwork
iconShare
 
Manage episode 293117337 series 2929664
Content provided by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC, Jeffrey W. Bennett, ISP, SAPPC, SFPC, and ISOC or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Send us a Text Message.

I am currently preparing to publish my new book, "How to Win U.S. Government Contracts and Classified Work", it's basically a total revision of "DoD Security Clearance and Contracts Guidebook". Chapter Five reviews the Executive Orders and regulations relating to Classification Markings and there is some good information from all sources.

I believe this is fundamental to the profession of anyone working on classified contracts. Understanding why and how information is classified is vital to knowing exactly what to protect and how. There are a few hard and fast rules for classifying information.
It is a fantastic idea to maintain a data set of security breaches, violations, reports of compromise or suspected compromise. However, this data rarely leaves their office. Because of the sensitive nature, it is held closely either for fear of retribution or fear of embarrassment. In truth, there is no retribution for security violation reports and information contained could be very valuable for security awareness. The security manager will probably have information detailing the frequency of violations, the persons committing the violations, resolutions and training to correct the behavior. This security manager could use the information to specifically train the business unit to inform them of the infraction, as well as provide details for the annual security awareness training.
See our website for downloadable training slides for your company. Our training includes Derivative Cl

Security Defense Lawyer
If you have had an event that could put your security clearance in jeopardy. contact Ron immediately
NISPOM Central
Providing security clearance books, training, and resources for cleared defense contractors.
Bennett Institute
Online security clearance webinars and coaching. Providing security training and resources.
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Support the Show.

FSO Consulting:
https://thriveanalysis.com/nisp/
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.

Personnel Security Clearances

  • How to get a clearance
  • What to expect once you get a clearance
  • What you can do to prepare for a clearance

Facility Security Clearance

✓Become a CDC Contractor

✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances

✓Establish a security team to protect classified information

✓Develop and provide required security training

✓Prepare for government inspections

✓Interpret Contract specifications

✓Fight Insider threat

✓Learn Security clearance levels

✓Process Classified information

✓Prepare Derivative Classification

✓Provide required Security Training

✓Appointing a Facility Security Officer

✓Prepare for Government Audits

Security Clearance and NISPOM consulting

  continue reading

53 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide