tag:blogger.com,1999:blog-5239474422425503931.comments2011-12-17T09:27:18.318-06:00Security Executive Blogjeffhttp://www.blogger.com/profile/07813710516522583125noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-5239474422425503931.post-59014511752616364442011-12-17T09:27:18.318-06:002011-12-17T09:27:18.318-06:00WEll said David. I appreciate the comment and best...WEll said David. I appreciate the comment and best of success with your book. It looks like it is selling well on Amazon.jeffhttps://www.blogger.com/profile/07813710516522583125noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-60482400301400451342011-12-17T09:24:09.477-06:002011-12-17T09:24:09.477-06:00Absolutely right Ken and well said. As you probabl...Absolutely right Ken and well said. As you probably know this includes the biggest problem of all, export compliance.jeffhttps://www.blogger.com/profile/07813710516522583125noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-52711065178021951432011-12-17T09:22:22.781-06:002011-12-17T09:22:22.781-06:00HI Kimberly,
Thanks for commenting. I apologize f...HI Kimberly,<br /><br />Thanks for commenting. I apologize for responding a year later, but I was unaware the comment was posted.<br />I've experienced the same situation. I've asked DSS and looked up criteria in NISPOM. The best answer I can give is for KMPs to be key decision makers concerning work on classified contracts. If these senior managers influence a contract, perhaps they should be considered as KMPs and documented.jeffhttps://www.blogger.com/profile/07813710516522583125noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-54586164088133308422010-10-26T16:04:02.094-05:002010-10-26T16:04:02.094-05:00Thank for the FSO 101 insight. However, I am havi...Thank for the FSO 101 insight. However, I am having some difficulty in locating the Key Management Personnel criteria. Is the KMP based on percentage of ownership, voting percentage, decision maker status??<br /><br />Is there a link I find this criteria? I have perused the NISPOM and DSS with no luck.<br /><br />Thank you<br /><br />KimberlyAnonymoushttps://www.blogger.com/profile/12628482193382525541noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-80967720681780952732010-04-23T09:03:07.983-05:002010-04-23T09:03:07.983-05:00When dealing with sensitive information, there sho...When dealing with sensitive information, there shouldn't be any question of procedure or protocol. Confusion on such a matter often leads to oversight. This can be costly for employers, employees and those needing to keep the data secure.<br /><br />DefensePlacements<br /><a href="http://www.defenseplacements.com" rel="nofollow">Security Clearance Jobs</a>Unknownhttps://www.blogger.com/profile/15045240009462721030noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-78320657954998288782010-04-08T02:32:51.830-05:002010-04-08T02:32:51.830-05:00Hey here you also get nationwide security services...Hey here you also get nationwide security services with the help of <a href="http://www.areal.ca/security-services.html" rel="nofollow">Security Services</a><br /><br />As they provide the best Security Services you all can check this out.Tomhttps://www.blogger.com/profile/05324930410050897152noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-62151512863005758352009-12-09T03:45:12.423-06:002009-12-09T03:45:12.423-06:00Fabulous post,
To maintain effective industrial ...Fabulous post,<br /><br />To maintain effective <a href="http://www.endoacustica.com/safety_cases_en.htm" rel="nofollow"> industrial security</a> we have to use auto security system.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-53504062878938388122009-07-30T10:38:40.811-05:002009-07-30T10:38:40.811-05:00Hi, Nice Blog.......Adit Security system offers Ti...Hi, Nice Blog.......Adit Security system offers <a href="http://aditgroup.com/products/ta_access/ta_access.htm" rel="nofollow">Time Attendance, Access Control, Time Management System,Time Attendance Tracking</a>, Access Control System, Door Locks, access control systems, security access control, attendance software.Anonymoushttps://www.blogger.com/profile/02948732124937815781noreply@blogger.comtag:blogger.com,1999:blog-5239474422425503931.post-89543916680957576642008-10-31T09:21:00.000-05:002008-10-31T09:21:00.000-05:00In the realm of risk, unmanaged possibilities beco...In the realm of risk, unmanaged possibilities become probabilities: These data breaches and thefts are due to a lagging business culture. As CIO, I'm always looking for ways to help my team, business teams, and ad hoc measures of various vendors, contractors and internal team members. A book that is required reading is "I.T. WARS: Managing the Business-Technology Weave in the New Millennium." <BR/>We keep a few copies kicking around - it would be a bit much to expect outside agencies to purchase it on our say-so. But, particularly when entertaining bids for projects and in the face of challenging change, we ask potential solutions partners to review relevant parts of the book, and it ensures that these agencies understand our values and practices.<BR/>The author, David Scott, has an interview here that is a great exposure: http://businessforum.com/DScott_02.html<BR/>The book came to us as a tip from one of our interns who attended a course at University of Wisconsin, where the book is in use. It has helped us to understand that, while various systems of security are important, no system can overcome laxity, ignorance, or deliberate intent to harm. The real crux of the matter is education and training to the organization as a whole – and a recurring schedule of training – in building a sustained culture and awareness; an efficient prism through which every activity is viewed from a security perspective prior to action. <BR/>I like to pass along things that work, in the hope that good ideas continue to make their way to me.David Scotthttps://www.blogger.com/profile/08649364455477091387noreply@blogger.com