
Sign up to save your podcasts
Or


Send us a text
Why are we giving our sensitive information away so easily?
Evaluating risk is very important. Risk events should be used to determine where vulnerabilities exist and the best approach to mitigating those vulnerabilities. We evaluate risks to viruses, sickness, how to protect sensitive information and what to put on social media or websites.
Support the show
FSO Consulting:
https://thriveanalysis.com
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.
Personnel Security Clearances
Facility Security Clearance
✓Become a CDC Contractor
✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances
✓Establish a security team to protect classified information
✓Develop and provide required security training
✓Prepare for government inspections
✓Interpret Contract specifications
✓Fight Insider threat
✓Learn Security clearance levels
✓Process Classified information
✓Prepare Derivative Classification
By jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC4.6
77 ratings
Send us a text
Why are we giving our sensitive information away so easily?
Evaluating risk is very important. Risk events should be used to determine where vulnerabilities exist and the best approach to mitigating those vulnerabilities. We evaluate risks to viruses, sickness, how to protect sensitive information and what to put on social media or websites.
Support the show
FSO Consulting:
https://thriveanalysis.com
NISPOM Compliance
https://www.nispomcentral.com
We provide facility security clearance, personnel security clearance, FSO consulting and NISPOM consulting.
Personnel Security Clearances
Facility Security Clearance
✓Become a CDC Contractor
✓Determine security requirements for SECRET, TOP SECRET and SCI Clearances
✓Establish a security team to protect classified information
✓Develop and provide required security training
✓Prepare for government inspections
✓Interpret Contract specifications
✓Fight Insider threat
✓Learn Security clearance levels
✓Process Classified information
✓Prepare Derivative Classification