icon-carat-right menu search cmu-wordmark

How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate

Webcast
In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.
Publisher

Software Engineering Institute

Watch

Abstract

On May 18, 2016, the U.S. Department of Defense (DoD) published Change 2 to DoD 5220.22-M, “National Industrial Security Operating Manual (NISPOM).” NISPOM Change 2 requires contractors to establish and maintain an insider threat program to detect, deter, and mitigate insider threats.

In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, describes the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.

Join Randy to “ask the expert,” learn more about these recent changes, and understand how your organization can develop and implement a robust insider threat program to be in compliance with NISPOM requirements.

Topics include

  •  summary of new requirements in NISPOM Change 2
  •  impact to DoD contracting organizations
  •  key components of an effective insider threat program
  •  program implementation best practices

About the Speaker

Headshot of Randy Trzeciak.

Randall F. Trzeciak

Randy Trzeciak is a senior member of the technical staff with CERT at the Software Engineering Institute (SEI), Carnegie Mellon University. He is a member of a team focusing on insider threat research, including insider threat studies being conducted with the U.S. Secret Service National Threat Assessment Center, the U.S. …

Read more