Don’t Settle For Less
Jeff is available for speaking on the following topics:
We know how hard it is to book speaking engagements with busy professionals. It’s also difficult to find national security and NISPOM subject matter experts. We hope to be your solution and ease your burdon of finding the speaker you need.
Jeff has spoken at many national and local events including NCMS, Cybersecurity Conferences, University events and much more.
Jeffrey W. Bennett, ISOC, ISP, SAPPC, SFPC is a security clearance, Information security and compliance expert, author, trainer and consultant. He’s written many books and is available to speak on how to protect controlled technical information such as ITAR, CUI and classified information. These directly impact National Defense Industry information.
He is prepared to speak on the following topics:
- Security Compliance
- Insider Threat
- Identifying and protecting:
- ITAR
- Controlled Unclassified Information (CUI)
- Controlled Technical Inforamtion (CTI)
- Classified Information
- Establishing CUI Programs
- Establishing Insider Threat Programs
His books are published by Red Bike Publishing, a known name in the industry. They are also available at NISPOM Central https://www.nispomcentral.com. and his courses are avaialable at Homepage | NISPOM Central training and Courses
His books make perfect handouts for attendees.
Complete the form to request speaking services
Services
What We Can Do For You
Our specialty is our capability to interpret requirements and how they should be implemented for your unique situation. We apply program protection, write and tailor processes, procedures and policies so that they will fit within the constraints of your enterprise.
Your enterprise is made up of many moving parts and business units, but none should stand alone. We believe each requirement should be part of the corporate body and not a stove piped solution. We conduct analyses for entity wide application so that burden and opportunities are shared:
- Corporate Policy
- Program Protection Planning
- Supply Chain Risk Management
- Criticality Analysis
- OPSEC Analysis
- Security Classification Guidance
- NISPOM Compliance
Program Protection Planning
Supply Chain Risk Management (SCRM)
Criticality Analyses
NISPOM Compliance
Processes and Procedures
Cyber-SCRM

