X

Download Incoming Visitors San Diego Industrial Security PowerPoint Presentation

SlidesFinder-Advertising-Design.jpg

Login   OR  Register
X


Iframe embed code :



Presentation url :

Home / News & Politics / News & Politics Presentations / Incoming Visitors San Diego Industrial Security PowerPoint Presentation

Incoming Visitors San Diego Industrial Security PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Incoming Visitors San Diego Industrial Security powerpoint presentation easily and in no time. This helps you give your presentation on Incoming Visitors San Diego Industrial Security in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Incoming Visitors San Diego Industrial Security powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by worldwideweb in News & Politics ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Slide 1 - Incoming Visitors San Diego Industrial Counterintelligence Working Group This document is intended solely for the use and information of the client to whom it is addressed. Version 1 - 07/09/2012
Slide 2 - Table of Contents Visit Purpose Vulnerabilities and Collection Techniques Countermeasures Reporting Requirements 2
Slide 3 - Visit – Knowledge Collection Types Contractually based Exploratory Unsolicited Benefits Face-to-face collaboration Relationship building Scientific and technical exchange Share successes Dispute resolution Promote products and services 3
Slide 4 - An Inherent Threat Although the majority of visits are valid with well intention, visits are a low risk manner for a collector to obtain access to information and/or materials Unclassified and/or Private/Proprietary information more likely to be target of collection due to access Threat not limited to Foreign Visitors 4
Slide 5 - Collection Techniques The possibility of a trained collector within the visit delegation The unannounced visitor or last minute addition to the planned visit delegation The wandering visitor Taking photographs, excessive notes, or collecting materials Probing questions beyond the scope of the meeting Easily concealed recording device(s) 5
Slide 6 - Countermeasures Identification and Badging Require visitors to provide U.S.-based identification In turn, require visitors to display identification while on site Host briefing reinforcing Need-to-Know principle Pre-visit survey Determine before the visit meeting space and tour routes Ensure affected areas are clear of potentially sensitive information 6
Slide 7 - Countermeasures Inform affected employees about the presence and purpose of visitors prior to the meeting Employees may need to be reminded to protect sensitive information or materials Opportunity for employees to be an extra set of eyes and ears regarding the visitor activities and whereabouts Visitor briefing Control the potential for inappropriate activities by informing visitors they must remain under escort, they may not use audio or visual recording devices, etc. If visitors require network access consider a guest network or standalone system to prevent visitor access to your company information Acknowledge non-compliance of security and safety regulations will result in an immediate end to the meeting 7
Slide 8 - Countermeasures Technology Control Plan (TCP) may be required for long term foreign visitors Details badging, escort, work areas, awareness trainings/briefings, etc., all aimed at preventing unauthorized access. TCP requires active signature acknowledgment from both affected employees and long term visitors. National Industrial Security Program Operating Manual (NISPOM) 2-307, TCP within the framework of Foreign Ownership, Control, or Influence (FOCI) NISPOM 10-508 & 10-509, TCP when hosting on-site foreign nationals 8
Slide 9 - Reporting Requirements Post visit follow-up with host and/or affected employees NISPOM 1-302 requires reporting of suspicious contacts to the CSA Report anything questionable Benefits of reporting something seemingly inconsequential outweigh the negative impact of not reporting at all Your report may be the missing piece of the puzzle or the beginning of a trend 9
Slide 10 - ppt slide no 10 content not found