- =
- =
- =
- =
- =
Employment Records
Course Offering Rachel WallaceHR- Workplace Conduct 4.24.2023 / v1 - Web-Based Training (WBT)
Course Offering Rachel WallaceHR- Alcohol and Substance Abuse Policy 10.22.2024 / 1.0 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- CenCore Whistleblower Policy 3.22.2024 / v1 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- COVID/Respiratory Illness Policy 8.26.2024 / v1 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- Discrimination Prevention Employee Training 4.24.2024 / v1 - Web-Based Training (WBT)
Course Offering Rachel WallaceHR- Diversity, Equity and Inclusion Policy 7.1.2024 / v1.0 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- Employee Assistance Program 1.26.2024 / v1 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- Harassment Prevention - Semi-Annual Employee Training 4.24.2023 / v1 - Web-Based Training (WBT)
Course Offering Rachel WallaceHR- Red Flag Reporting 2024.9.20 / v4 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceHR- Prevention of Sexual Harassment - Semi-Annual Employee Training 5.15.2024 / v2.0 - Web-Based Training (WBT)
Course Offering Rachel WallacePRG- Baldwin Reporting - Quality Observation Report 5.8.2024 / v1 - Document-Based Acknowledgement (PDF)
As always, if you have any questions regarding security, please do not hesitate to contact us.
|
Course Offering Rachel WallaceSEC1.0 Personal Identifiable Information (PII) Safeguard 4.13.2023 - Web-Based Training (WBT)
Course Offering Rachel WallaceSEC1.0 Security Memo - Social Media 4.22.2024 - Web-Based Training (WBT)
Nuclear Regulatory Commission Hotline
U.S. Nuclear Regulatory Commission
Office of the Inspector General, MS-TSD 28
Washington, D.C. 20555
(800) 233-3497
CIA Hotline
Office of the Inspector General
28 Central Intelligence Agency
Washington, D.C. 20505
(703) 874-2600
Federal Bureau of Investigation
Washington Metropolitan Field Office
(202) 278-2000
Department of Energy Hotline
Department of Energy
Office of the Inspector General
1000 Independence Ave, SW Room 5A235
Washington, D.C. 20585
(202) 586-4073, (800) 541-1625
Course Offering Rachel WallaceSEC1.0- 2024 Q3 Insider Threat-CI Newsletter- 9.24.2024 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceTNG - 004 Directive Distribution System - 2024.11.19 - Document-Based Acknowledgement (PDF)
Course Offering Rachel WallaceTNG- Annual - 2024 Escort Safety Training 2024-03-01 / v1 - Web-Based Training (WBT)
Course Offering Rachel WallaceHR- Polygraph Examination Pay Reimbursement Policy 11.21.2024 - Document-Based Acknowledgement (PDF)
Insider Threat Awareness Review
As a review of your training, below are some key points of the training you took online:
- What is an Insider Threat? Any person with authorized access to sensitive government resources by virtue of employment, volunteer activities, or contractual relationship with the government. This can include employees, former employees, consultants, and anyone with access.
- 5 Main Categories of an Insider Threat:
- LEAKS – the intentional, unauthorized disclosure of classified or proprietary information to a person or an organization that does not have a "need-to-know."
- SPILLS – the unintentional transfer of classified or proprietary information to unaccredited or unauthorized systems, individuals, applications, or media. Spills are the most common form of insider threat. They don't have to have malicious intent to cause damage. Most people think of data spills from computer systems or over the internet. Spills, however, are not limited to the cyber realm. They can occur when a book is published or when a public presentation or interview is given.
- ESPIONAGE – the unauthorized transmittal of classified or proprietary information to a competitor, foreign nation, or entity with the intent to harm
- SABOTAGE – to deliberately destroy, damage, or obstruct, especially for political or military advantage.
- TARGETED VIOLENCE – any form of violence that is directed at an individual or group, for a specific reason. In other words, targeted violence is not a random act.
Insider Threat Awareness Review: Vulnerabilities
Vulnerabilities: No one is immune to vulnerabilities and the difficult situations that confront us at various times in our lives. Adversaries look for vulnerabilities to exploit. In some instances, vulnerabilities motivate us to consider doing something that makes us an insider threat.
Examples of vulnerabilities include:
- Financial stress
- Exploitable promiscuity
- Addictive behaviors (e.g., drug/alcohol abuse, gambling, pornography)
- Loneliness
- Disgruntlement
Seeking assistance to help deal with life’s challenges is not a sign of weakness. In fact, it’s a sign of good judgement and an act of bravery to say, "I need help." Identifying colleagues who may be in need of help is not an act of betrayal. It is an ultimate act of respect; respect for the safety and well-being of the individual, for the company, and for the nation.
Insider Threat Awareness Review: Reporting
Below are several potential insider threat indicators. If you see any of these indicators, you should report it to your ITPSO, regardless of whether you think it is of concern.
More information can be found at CDSE
Foreign Considerations
- Support or advocacy of any acts of sabotage, espionage, treason, etc.
- Foreign travel, contacts, assets, documents, etc. of concern
- Involvement in Foreign affairs, employment or service
- Foreign business, political, or property interests
- Foreign bank accounts and sources of income
Personal Conduct
- Any criminal conduct or allegations
- Repeated dishonesty, rule violations
- Emotional or mental instability
- Abuse, vulnerable sexual behavior
- Alcohol, Substance misuse
- Disruptive, violent, bizarre, or other inappropriate behavior
Insider Threat Awareness Review: Reporting pt 2
Financial Considerations
- Unexplained affluence
- Concerning debt
- Deceptive or illegal financial practices
- Failure to file or pay income taxes
Security & Compliance Incidents
- Violations related to the handling of protected information
- Non-compliance with security training requirements
- Failure to self-report information required for security clearance eligibility
- Misuse of information security privileges or credentials
- Misuse of facilities or work-issued equipment
- Anomalous or suspicious accessing of facilities or systems during non-work hours
Technical Activity
- Unauthorized access or use of any information technology
- Violations of acceptable use or other automated information system policies
- Suspicious or improper activity or correspondence on any system
- Unauthorized modification, destruction, or manipulation of any information technology


(385) 448-8363
No comments:
Post a Comment