Posts

Showing posts from March, 2012

6 Awesome Ways to Delay a Security Clearances

One thing an FSO just can't control is how long it takes the US Government to completely investigate, adjudicate and award a security clearance. These investigations rely on trained persons to research a persons background and another set of trained persons to make a decision on the findings. These professionals are charged with determining whether or not a person can be relied on to protect classified information from unauthorized disclosure. Returning or seeking clarification on submitted information is costly. As an  FSO, you can control one critical part of the process. Ensure the applicant fills out the SF86 forms accurately and completely. Any mistakes, omissions or embellishments can cause serious time delays. You can help the applicant understand the content and explain how to complete required forms. Here is great tool to help; the top 6 reasons security clearance decisions are delayed: 1.  Missing or illegible fingerprint cards. The cards must be provided to th...

Latest Article in Clearancejobs.com

A security clearance demonstrates that the government has determined that you are trustworthy. As such, you may perform on classified contracts depending on your security clearance level and need to know. To better understand how to protect classified information, it may help to understand how and why  security classification  is assigned. The following provides answers to popular questions:  Classification Levels and Why Certain Information is Classified Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Gu...

Insider’s Guide to Security Clearances — Red Bike Publishing

So, how do you get a security clearance? Find out in the tell all book Insider’s Guide to Security Clearances — Red Bike Publishing

4 Steps to Winning the Cogswell Award

So, which companies will win the Cogswell Award this year? FSOs who take the time to develop a world class program designed to protect classified information are very deserving of the award. Here are four proven steps to help you demonstrate that your organization is going “above and beyond” NISPOM requirements: 1. Set security goals that everyone understands. These goals help create the organization-wide security culture that everyone can live with. 2.   Conduct institutional training that support these goals. Ensure the training encourages your employees to report any and all security violations, suspicious contacts, and foreign travel, which will further enhance those efforts. 3. Goals should be tracked and institutional training and expectations should be conducted   in preparation for the annual security inspection. Do this by implementing a daily security management process, which includes physical security, visitor control, and security education throughout the ye...

FSO Training-Get Some

Facility Security Officers (FSOs) wear many hats. Depending on the size of company and mission, they can be completely dedicated to security or serve as FSOs as one of many additional duties. Regardless of where their responsibilities lie, all FSOs should be very aware of NISPOM requirements . When it comes to training, FSOs should be able to effectively train cleared employees of these NISPOM and Contract Security Classification Specification (DD Form 254) requirements. Training requirements vary not only based on mission, but also depend on whether or not the facility is cleared as possessing or non-possessing. A possessing facility is authorized to store and work classified information in the cleared facility. A non-possessing facility cannot. Objectives of the FSO Program Management Course are to prepare the FSO to implement and direct a NISPOM based security program in their cleared contractor facility. DSS offers online courses to both possessing and non-possessing facilit...

Going above and beyond requirements of NISP Enhancement Category 11

Going above and beyond requirements of NISP Enhancement Category 11 includes membership and attendance in Security Community Events. Enrollment and attendance in security community and professional organization events demonstrates contribution and growth. For inspection purposes, be sure to collect sign-in sheets, training handouts and more importantly demonstrate application of lessons learned to show proof of your involvement. Monthly lunch meetings, working groups and other opportunities are places where members of a similar community meet to learn or solve common problems. The National Industrial Security Program organizations include: Industrial Security Awareness Council (ISAC)  ISAC- ISAC is an informal, non-profit association of defense contractor, Defense Security Service, and Federal Bureau of Investigation personnel. It was formed to assist defense contractors in compliance with the National Industrial Security program and with the protection of classified and ...