WEBVTT

00:01.140 --> 00:03.307
The Center for Development of Security

00:03.307 --> 00:05.362
Excellence , or C . D . S . C . Is a

00:05.362 --> 00:07.473
nationally accredited , award winning

00:07.473 --> 00:09.696
directorate within the Defense Security

00:09.696 --> 00:12.170
service . C D . S . C provides security

00:12.170 --> 00:15.060
education , training , awareness and

00:15.060 --> 00:17.227
certification products and services to

00:17.227 --> 00:19.171
a broad audience within the United

00:19.171 --> 00:21.500
States government and industry . This

00:21.500 --> 00:23.444
supports the interests of national

00:23.444 --> 00:25.840
Security and professionalization of the

00:25.840 --> 00:28.760
Defense Security Enterprise , or DSC .

00:29.340 --> 00:31.562
Security is a mission critical function

00:31.562 --> 00:33.896
of the Department of Defense , or D . O .

00:33.896 --> 00:35.840
D . And its proper execution has a

00:35.840 --> 00:38.062
direct impact on national Defense . The

00:38.062 --> 00:40.350
DS is comprised of an elaborate set of

00:40.350 --> 00:43.020
rules , policies and procedures that

00:43.020 --> 00:45.353
directly led to the protection of D . O .

00:45.353 --> 00:48.260
D . Personnel , equipment , facilities

00:48.490 --> 00:51.490
and information to securities assets .

00:51.490 --> 00:53.820
The D O . D . Requires a complex array

00:53.820 --> 00:55.987
of security disciplines and associated

00:55.987 --> 00:58.120
programs . Personnel security ,

00:58.270 --> 01:00.330
physical security information ,

01:00.330 --> 01:03.120
security , cybersecurity , special

01:03.130 --> 01:05.800
access programs , counterintelligence ,

01:05.840 --> 01:08.470
insider threat operations , security

01:08.480 --> 01:10.850
and industrial security . These

01:10.850 --> 01:13.220
programs have layered security controls

01:13.220 --> 01:15.164
that complement one another , both

01:15.164 --> 01:17.920
actively and passively . Each security

01:17.920 --> 01:19.642
discipline and program service

01:19.642 --> 01:22.300
Foundational pillars and the DSC . If

01:22.300 --> 01:24.467
one pillar is diminished , the overall

01:24.467 --> 01:27.310
security structure is weakened . C . D .

01:27.310 --> 01:29.143
S . C supports this structure by

01:29.143 --> 01:30.866
providing D . O . D . Security

01:30.866 --> 01:33.088
professionals the training necessary to

01:33.088 --> 01:35.143
safeguard D . O . D . Assets against

01:35.143 --> 01:37.890
harm , loss or hostile acts because the

01:37.890 --> 01:39.890
security structure is built on four

01:39.890 --> 01:41.834
core disciplines and programs that

01:41.834 --> 01:43.890
strengthen each other . The civilian

01:43.890 --> 01:46.200
military and contractor personnel who

01:46.200 --> 01:48.200
uphold these pillars are the diodes

01:48.200 --> 01:51.150
most important asset before someone can

01:51.150 --> 01:53.317
work for the D . O . D . In a national

01:53.317 --> 01:55.428
security or sensitive position . They

01:55.428 --> 01:57.150
have to be vetted using diodes

01:57.150 --> 01:59.900
personnel security system . The vetting

01:59.900 --> 02:01.678
process begins by looking at an

02:01.678 --> 02:03.733
employee's personal and professional

02:03.733 --> 02:05.622
background to evaluate both their

02:05.622 --> 02:07.344
suitability for employment and

02:07.350 --> 02:09.406
eligibility for access to classified

02:09.406 --> 02:11.239
information . An assignment to a

02:11.239 --> 02:13.440
sensitive position . The potential

02:13.440 --> 02:15.384
employee voluntarily provides this

02:15.384 --> 02:17.220
information as required by the

02:17.220 --> 02:19.010
applicable security form and a

02:19.010 --> 02:21.232
background investigation is conducted .

02:21.440 --> 02:23.051
The results are passed to an

02:23.051 --> 02:24.940
adjudicator who determines if the

02:24.940 --> 02:27.300
individual is suitable and eligible for

02:27.300 --> 02:29.650
employment . If eligible , they must

02:29.650 --> 02:31.483
sign a nondisclosure statement ,

02:31.483 --> 02:33.800
receive a security briefing and access

02:33.800 --> 02:35.800
classified information on a need to

02:35.800 --> 02:38.670
know basis even after the employee has

02:38.670 --> 02:40.940
been granted access . Their behavior is

02:40.940 --> 02:43.040
continuously monitored for anything

02:43.040 --> 02:44.873
that raises a security concern .

02:45.140 --> 02:47.084
Protecting D . O . D . Assets is a

02:47.084 --> 02:49.196
priority and is addressed through the

02:49.196 --> 02:51.880
physical security program . This

02:51.880 --> 02:53.713
program establishes the physical

02:53.713 --> 02:55.436
security measures to safeguard

02:55.436 --> 02:57.870
personnel , information , equipment ,

02:57.880 --> 03:00.710
facilities , activities and operations

03:00.720 --> 03:03.190
from threats of espionage , sabotage ,

03:03.200 --> 03:05.780
damage and theft . These measures are a

03:05.780 --> 03:07.669
combination of specially designed

03:07.669 --> 03:09.891
buildings and access control measures ,

03:10.540 --> 03:12.160
classified national security

03:12.160 --> 03:14.360
information or C . N . S . I . Is

03:14.360 --> 03:16.249
protected through the information

03:16.249 --> 03:18.470
security program Within this program .

03:18.470 --> 03:20.860
Administrative policies and procedures .

03:20.870 --> 03:24.040
Identify control and protect CNS . I

03:24.230 --> 03:26.341
that is identified by executive order

03:26.341 --> 03:29.400
statute or regulation Information can

03:29.400 --> 03:31.350
include classified information

03:31.390 --> 03:33.680
controlled unclassified information or

03:33.680 --> 03:36.140
see you I . And sensitive compartmented

03:36.140 --> 03:39.130
information or S . C . I . This

03:39.130 --> 03:41.352
information must be properly marked for

03:41.352 --> 03:43.574
viewing by authorized personnel handled

03:43.574 --> 03:46.020
appropriately and properly declassified

03:46.030 --> 03:48.510
or destroyed some of D . O . D . S .

03:48.510 --> 03:50.320
Capabilities . Technologies and

03:50.320 --> 03:52.540
operations are very sensitive and

03:52.540 --> 03:54.540
policies are put in place requiring

03:54.540 --> 03:56.707
them to have additional protection and

03:56.707 --> 03:59.080
controls . Information in this category

03:59.080 --> 04:00.969
is placed within a special access

04:00.969 --> 04:04.540
program . National security information

04:04.540 --> 04:06.580
includes materials kept in security

04:06.580 --> 04:09.080
containers and also digital data stored

04:09.080 --> 04:11.970
on information systems . Cybersecurity

04:11.970 --> 04:13.970
is required to protect this type of

04:13.970 --> 04:16.920
information . The cybersecurity program

04:16.920 --> 04:19.090
protects diode computers and networks

04:19.090 --> 04:21.270
from deliberate an inadvertent damage

04:21.270 --> 04:24.090
from external and internal threats . C .

04:24.090 --> 04:26.312
D . S . C . Provides training to ensure

04:26.312 --> 04:28.423
the D . O . D . Workforce is aware of

04:28.423 --> 04:30.368
those threats and the policies and

04:30.368 --> 04:32.368
procedures to defend against them .

04:33.040 --> 04:34.850
Threats come in many forms and

04:34.860 --> 04:36.527
adversaries attempt to gather

04:36.527 --> 04:38.304
information in different ways .

04:38.304 --> 04:40.590
Operations security or Opsec is an

04:40.590 --> 04:42.620
analytical process that denies our

04:42.620 --> 04:45.190
adversaries information . C . D . S . C

04:45.190 --> 04:47.023
provides training to D . O . D .

04:47.023 --> 04:49.134
Personnel on what op Second Tales and

04:49.134 --> 04:51.246
how it supplements and supports other

04:51.246 --> 04:54.160
security programs . Part of ensuring

04:54.160 --> 04:56.271
the strength of security structure is

04:56.271 --> 04:58.160
maintaining the integrity of each

04:58.160 --> 05:00.049
pillar . This is where if you see

05:00.049 --> 05:02.382
something say something comes into play .

05:02.440 --> 05:04.273
The counter intelligence program

05:04.273 --> 05:06.329
stresses the importance of reporting

05:06.329 --> 05:08.162
suspicious activities that could

05:08.162 --> 05:09.829
indicate targeting by foreign

05:09.829 --> 05:12.380
intelligence entities . C . D . S . C .

05:12.380 --> 05:14.547
Provides counterintelligence awareness

05:14.547 --> 05:17.790
training to D . O . D . Employees . The

05:17.790 --> 05:19.910
DSE is concerned with insider threats

05:19.910 --> 05:22.290
as well . An insider threat is a person

05:22.290 --> 05:24.234
with authorized access to national

05:24.234 --> 05:26.480
security information who wittingly or

05:26.490 --> 05:28.370
unwittingly harms United States

05:28.370 --> 05:30.450
national security interests through

05:30.460 --> 05:32.320
unauthorized disclosure data

05:32.320 --> 05:35.570
modification , espionage , terrorism or

05:35.570 --> 05:37.730
violent actions resulting in the loss

05:37.740 --> 05:39.462
or degradation to resources or

05:39.462 --> 05:42.810
capabilities . C D . S . C provides

05:42.810 --> 05:44.977
personnel with training on the insider

05:44.977 --> 05:46.866
threat program and the associated

05:46.866 --> 05:49.140
reporting procedures . They also have

05:49.140 --> 05:51.400
specialized training designed to assist

05:51.400 --> 05:54.170
senior leadership , The mission

05:54.170 --> 05:56.281
critical function of security and its

05:56.281 --> 05:58.337
proper execution would be incomplete

05:58.337 --> 06:00.392
without the support of contractors .

06:00.740 --> 06:02.796
The industrial security program is a

06:02.796 --> 06:05.250
multi disciplinary approach used to

06:05.250 --> 06:07.140
protect classified information

06:07.140 --> 06:09.470
developed by or entrusted to industry ,

06:09.770 --> 06:11.659
incorporating all of the security

06:11.659 --> 06:13.326
disciplines and supplementary

06:13.326 --> 06:15.570
programmes . C . D S C . Is the

06:15.570 --> 06:17.681
training facility for the D . O . D .

06:17.681 --> 06:20.890
Industrial security workforce . D O . D .

06:20.890 --> 06:22.830
Security relies on the four core

06:22.830 --> 06:25.000
disciplines and programs designed to

06:25.000 --> 06:27.030
ensure D . O . D . Personnel

06:27.040 --> 06:29.740
information facilities and systems are

06:29.740 --> 06:32.570
protected to the highest degree . C D S

06:32.570 --> 06:34.760
C provides courses and resources to

06:34.760 --> 06:36.982
professionalize the D O . D workforce ,

06:36.982 --> 06:39.038
creating a strong foundation for the

06:39.038 --> 06:42.890
dsc . Please visit www dot c .

06:42.890 --> 06:45.560
D sc dot e D U for the full scope of

06:45.560 --> 06:47.504
training available in all security

06:47.504 --> 06:48.060
disciplines .

