National Counterintelligence and Security Center
Matthew Halvorsen, Strategic Program Director for NCSC’s Supply Chain and Cyber Directorate, recently sat down with Andrew Coffey, a Deputy Director with the High Intensity Drug Trafficking Areas (HIDTA) Program at the Office of National Drug Control Policy (ONDCP), for an audio interview on how the HIDTA program worked quickly to implement supply chain security measures to stem risks from certain Chinese companies, as mandated by Section 889 of the National Defense Authorization Act (NDAA) of 2019. The discussion is instructive for other federal agencies working to comply with supply chain security provisions of the NDAA.
This episode is the second in a series of interviews with experts and practitioners from government, industry, research and academia to spotlight threats to key U.S. supply chains and highlight mitigation.
- Check out the podcast interview, click here
- For a transcript of the interview, click here
Guest Speaker
Andrew Coffey, Ph.D. is a Deputy Director with the High Intensity Drug Trafficking Areas (HIDTA) Program at the Office of National Drug Control Policy (ONDCP). He oversees a number of portfolios to include policy development, intelligence and information sharing, and performance management. Prior to joining ONDCP he held various positions in the private sector advising clients around the globe on security and risk management. He holds a doctorate in public administration and policy from Virginia Tech, and a bachelor’s degree from Radford University. From 2016-2017, he was a Senior Fellow with the George Washington University Center for Cyber and Homeland Security.
test
test
Cyber Security
The cyber threat is simultaneously a national & homeland security threat and a counterintelligence problem. State and non-state actors use digital technologies to achieve economic and military advantage, foment instability, increase control over content in cyberspace and achieve other strategic goals — often faster than our ability to understand the security implications and neutralize the threat.
NCSC works with the U.S. Government cyber community and the IC, to provide the CI and security perspective on foreign intelligence and other threat actors’ cyber capabilities and provides context and possible attribution of adversarial cyber activities.
Relevant Reports, Briefings & Reading Material:
Provides an indispensable series of basic steps every American can take to safeguard their home networks from cyber intrusions
Ci tips for cyber smarts:
- Spear Phishing and Common Cyber Attacks (PDF)
- Mobile Device Safety (PDF)
- Social Media Safety (PDF)
- Reducing Your Digital Footprint (PDF)
Other Links:
Cyber Threat Intelligence Integration Center (CTIIC)
This sections provides additional resources that have been developed by our various partners that provide additional information and resources to the Insider Threat Community. Resources include external links, briefings, and documentation. NITTF would like to thank our partners for sharing their information with the Insider Threat Community.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
PERSEREC | PERSEREC | Website |
PERSEREC Threat Lab. The Defense Personnel and Security Research Center (PERSEREC) is committed to improving the efficiency, effectiveness and fairness of the DoD personnel security and suitability programs. In furtherance of this mission, PERSEREC established the Threat Lab in 2018 to realize the DoD Counter-Insider Threat Program Director’s vision to integrate the social and behavioral sciences into the mission space. For more information on PERSEREC, please email This email address is being protected from spambots. You need JavaScript enabled to view it. and the Threat Lab, email This email address is being protected from spambots. You need JavaScript enabled to view it.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
Certified Counter-Insider Threat Professional (CCITP) | DOD | Website |
OUSD(I&S), in partnership with the NITTF, created two professional certifications. These certifications were developed with maximum participation from across the USG, resulting in broad applicability across the InT workforce. The website provides information for potential candidates that are interested in completing the program.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
EPRM | United States Air Force (USAF) | PowerPoint Briefing |
NOTE: Presentation was made during the NITTF Spring Forum in May 2018.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
Insider Threat Mitigation | Department of Homeland Security (DHS) | Website |
NOTE: This website was developed by the department of Homeland Security to discuss the importance of mitigating insider threats.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
Active Shooter Preparedness Portal | Active Assailant Security Branch, CISA (AAS CISA) | Website |
NOTE: The website provides products, tools, and resources to help you prepare for and respond to an active shooter incident.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide | Interagency Security Committee, CISA (ISC CISA) | Website |
NOTE: This second edition of the Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide removes the FOUO material from the first edition released in July 2015 so that this guidance could be distributed to the public.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
Insider Threat Awareness Course Additional Training: http://www.cdse.edu/catalog/insider-threat.html |
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) | Online Training |
NOTE: For agencies without "in house" training for their workforce, the NITTF issued a directive in 2014 for federal agencies to use the Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) web-based Insider Threat Awareness course. The DSS CDSE site is open to all government D/As, and certificates are available after course completion.
* Materials listed below is for Official Use only and has not been approved for public release. Please contact the NITTF if you have an official need for this item.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
*Civil Liberties and Privacy Training | Federal Bureau of Investigation (FBI) | Briefing |
NOTE: The FBI Office of the General Counsel, Privacy and Civil Liberties Unit, prepared these slides to aid federal departments and agencies (D/As) in training insider threat personnel on civil liberties and privacy laws. NOTE: This training presentation, in and of itself, does not meet the minimum standards. D/As may incorporate these into their own civil liberties and privacy training with added D/A-specific material from, and with the concurrence of, their general counsel.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
*OMBs Role in Federal Cybersecurity Risk Management | Office of Management and Budget (OMB) | Briefing |
NOTE: Presentation was made during the NITTF Fall Forum in November 2017.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
*DVE Pilots Summary | Department of Defense | Briefing |
NOTE: Presentation was made during the NITTF Spring Forum in May 2018.
Name of Resource | Author of Resource | Resource Type |
---|---|---|
*Risky Business Threats as Opportunity for Innovation | Pacific Northwest National Laboratory (PNNL) | Briefing |
NOTE: Presentation was made during the NITTF Fall Forum in November 2017.
This section includes learning modules that have developed and shared by NITTF Partners and provides additional insider threat information and training to the Insider Threat Community. For additional information please contact This email address is being protected from spambots. You need JavaScript enabled to view it..
One of our Intelligence Community partners developed this training to address a variety of insider threat matters such as leaks, spills, espionage, sabotage, and targeted violence. Click on the image to access the module.
This mental wellness training was developed by the Office of Intelligence Community Equal Employment Opportunity and Diversity to explain challenges our workforce may endure if they are experiencing mental health issues. While there are times when behaviors of security concern overlap with mental disorders and require further review, the overwhelming reason for an employee to visit an agency’s Employee Assistance Program (EAP) is to have an objective, trained professional help sort out generally temporary and minor emotional problems. Click on the image to access the module.
NITTF Endorsed Workforce Training:
In addition to training tailored for your insider threat professionals, the Minimum Standards also require insider threat awareness training for the federal workforce. Many D/As have taken the initiative to develop their own training in line with the standards. For agencies without "in house" training for their workforce, the NITTF issued a directive in 2014 for federal agencies to use the Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) web-based Insider Threat Awareness course. The DSS CDSE site is open to all government D/As, and certificates are available after course completion. Additional DSS CDSE training can be found at http://www.cdse.edu/catalog/insider-threat.html
NITTF Directives & Advisories
This section of the resource library provides the Executive order that establishes the NITTF as well as additional information on key insider threat topics developed by NITTF. For additional information please contact This email address is being protected from spambots. You need JavaScript enabled to view it..
As needed, the NITTF publishes advisories and directives, the former serve to inform, instruct, or guide and the latter to establish a policy, assign responsibilities or define objectives to be followed. In addition, NITTF has fostered the development and publication of policy and programmatic tools such as the Insider Threat Program Cost Model, the Insider Threat Security Classification Guide, and the Guide to Accompany the National Insider Threat Policy and Minimum Standards.
Directives and Advisories:
- Insider Threat Program Activities and Compliance with Trusted Workforce 2.0
- NITTF Advisory 2021-002: Sunsetting the NITTF Insider Threat Hub Operations Course
- NITTF Advisory 2021-001: Insider Threat Program Personnel Training (PDF)
- NITTF Advisory 2017-01: Insider Threat Competency Resource Guide (Unclassified) (PDF)
- NITTF Advisory: Maturing the Enterprise (Unclassified) (PDF) and Insider Threat Overlays (Unclassified) (PDF)
- NITTF Clarification of Enterprise Audit Management (EAM), User Activity Monitoring (UAM), Continuous Monitoring, and Continuous Evaluation Memorandum*
- NITTF Insider Threat Awareness Training Directive*
- NITTF Computer Banner Language Advisory*
- NITTF Data Mining Reporting Advisory*
- NITTF Legal Guidance Advisory*
- NITTF Records Management Advisory*
NOTE: Materials in the NITTF Resource Library marked with asterisk (*) are For Official Use Only and has not been approved for public release. Please contact the NITTF (Hyperlink to email This email address is being protected from spambots. You need JavaScript enabled to view it.) if you have an official need for this item.
For additional information on the National Insider Threat Policy, click on the NITTF Policy & Legal Page.
NITTF Produced Guides & Templates
This section of the resource library provides guidance developed and produced by the NITTF, including the Any Given Day Video and the 2017 Insider Threat Guide. For additional information please contact This email address is being protected from spambots. You need JavaScript enabled to view it..
NITTF Guides and Multimedia:
2017 NITTF Insider Threat Guide | Protect Your Organization Guide |
2017 Insider Threat Guide: A Compendium of best practices to accompany the National Insider Threat Minimum Standards Errata |
Protect Your Organization from the Inside Out: Government Best Practices (PDF) |
Any Given Day Video |
Click the image to view the video |
Any Given Day (VIDEO) is an 8-minute video that was produced to enhance insider threat education and awareness. It highlights the balance between collecting information and privacy concerns and presents a side of insider threat programs that is not often considered: protecting national security at the human level. Executive Order 13587 focuses on safeguarding classified networks and classified information, but it's not just about information; it's also about protecting people. NITTF encourages inclusion of this video in your existing training plan for your workforce. |
NITTF Technical Bulletins
NITTF has developed Technical Bulletins that identify key technical issues in developing an Insider Threat program. Please click on the NITTF Technical page to review these bulletins.
Additional NITTF Guides and Templates
- Insider Threat Program Inquiries Handbook*
- Insider Threat Cost Model Template*
- NITTF 2014 Guide to Accompany the National Insider Threat Policy and Minimum Standards*
- (New) A Capabilities-Driven Framework for Threat Mitigation*
* This material is For Official Use Only and has not been approved for public release. Please contact the NITTF if you have an official need for this item.
For Additional guidance on Assessment Information please refer to the NITTF Assessment Page.