1 / 2

0800 - 1600 August 20, 2013 Bob Jones Auditorium Sparkman Center Redstone Arsenal

SCHEDULE. RSA OPSEC OFFICERS. 0800 - 0815 Welcome Greg Hoffman, MDA 0815 - 0900 OPSEC 5 Step Process Morris Burbank, Garrison 0900 - 0930 OPSEC and the Insider Threat Paul Quintel, AMCOM 0930 - 1000 Public Release/Web Reviews

bena
Télécharger la présentation

0800 - 1600 August 20, 2013 Bob Jones Auditorium Sparkman Center Redstone Arsenal

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SCHEDULE RSA OPSEC OFFICERS 0800 - 0815 Welcome Greg Hoffman, MDA 0815 - 0900 OPSEC 5 Step Process Morris Burbank, Garrison 0900 - 0930 OPSEC and the Insider Threat Paul Quintel, AMCOM 0930 - 1000 Public Release/Web Reviews • Quincy Roby, AMRDEC 1000 - 1015 Break 1015 - 1100 OPSEC and the Internet • Dwayne Smith, NEC-R 1100 - 1145 OPSEC and Social Media Ben McGee, ISSA 1145 - 1300 LUNCH 1300 - 1330 Protecting PII • Luereen Phillips, AMCOM 1330 - 1400 Trash or Treasure • Arnetta Manual, PEOAVN 1400 - 1415 Break 1415 - 1500 Family OPSEC • Greg Hoffman, MDA 1500 - 1550 Round Table Discussion • All 1550 - 1600 Closing Remarks Greg Hoffman, MDA Garrison – Morris Burbank, 313-3296 ACC – Raymond Jones, 955-8206 AMC – James Burns, 450-6771 AMCOM – Paul Quintel, 313-3867 AMRDEC – Quincy Roby, 842-5392 FAHC – Charles Allbritten, 955-8888 LOGSA– Vickie Cooper, 313-6701 MDA – Greg Hoffman, 313-9720 MSFC – Terry Odum, 544-4540 MSIC – SFC Turay, 313-7664 NEC-R – Curtis Elrod, 842-1004 PEOAVN – Arnetta Manuel, 313-5952 PEOMS – Lori Relford, 313-3483 RTC – Blake Stewart, 955-0915 SMDC – Michael Mitchell, 955-2141 TSMO – Terry Vital, 876-8624 USACE – Lori Byrd, 895-1496 USASAC – Ed Reyes, 450-5621 OPERATIONS SECURITY DAY 0800 - 1600 August 20, 2013 Bob Jones Auditorium Sparkman Center Redstone Arsenal OPSEC RULES!

  2. 10 Ways the Adversary Collects on You and Your Organizations Origin of OPSEC OPSEC LINKS Email / Internet / Social Media Recycle Bins, Trash Containers Freedom of Information Request Telephone Directories / Organization Tables Job Announcements Overhearing Conversations Open Source Material (Radio, TV, Magazines) Observation of Activities Conferences / Seminars Tours / Visits to your organization Interagency OPSEC Support Staff (IOSS): https://www.iad.gov/ioss/index.cfm DA OPSEC Support Element https://www.us.army.mil/suite/page/589183 JIOWC / JOSE https://www.facebook.com/JIOWC.OPSEC.Support OPSEC Professionals Society http://www.opsecsociety.org OPSEC Professionals Association http://www.opsecprofessionals.org • Center for Development of Security Excellence • http://www.cdse.edu/catalog/ On Guard Online • http://www.onguardonline.gov/ DoD Social Media Hub • http://www.defense.gov/socialmedia OPSEC, as a methodology, originated during the Vietnam conflict when a small group of individuals were assigned the mission of finding out how the enemy was obtaining advance information on certain combat operations in Southeast Asia. This team was established by the Commander-in-Chief, Pacific, and given the code name "PURPLE DRAGON.“ It became apparent to the team that although traditional security and intelligence countermeasures programs existed, reliance solely upon them was insufficient to deny critical information to the enemy--especially information and indicators relating to intentions and capabilities. The group conceived and developed the methodology of analyzing U.S. operations from an adversarial viewpoint to find out how the information was obtained. The team then recommended corrective actions to local commanders. They were successful in what they did, and to name what they had done, they coined the term "operations security.“ 3 Laws of OPSEC • First Law of OPSEC - If you don’t know the threat, how do you know what to protect? • Second Law of OPSEC- If you don't know what to protect, how do you know you are protecting it? • Third Law of OPSEC - If you are not protecting it (the critical and sensitive information), the adversary wins! OPSEC 5 Step Process • Identify Critical Information • Analyze Threats • Analyze Vulnerabilities • Assess Risk • Apply Countermeasures

More Related