Contact Jeff

Questions, comments and more

Contact Jeff for solving hard problems with information security. It’s one thing to apply information assurance, NISPOM, ITAR, NIST and other compliance regulations, however, it’s another it identify the raw, derived products. These products can exist in software, networks, computers, work travellers, work processes, and finished products.

Jeff can help you set up a derivative classifier program or derivative training to determine what sensitive work product derived information you may have. This works with product developers, labs, prime integrators, contractors, vendors, suppliers and OEMs. Jeff’s experise includes identifying, marking and protecting derived information. Jeff’s experience includes analyzing work products and crosswalking compliance issues. Jeff then developes processes and procedures that can be specifically tailored for the enterprise. Jeff’s expertise includes:

  • ITAR compliance and identifying ITAR derived products
  • NISPOM compliance and identifying classified derived products
  • CUI compliance and identifying controlled unclassified information derived products
  • Derivative classifier training

 

 

 

Contact Us