20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual...

12

Transcript of 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual...

Page 1: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll
Page 2: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

RegisteR by

MAR 20and

SAVE$50!

MAR 20

SAVE$50!

National Security in Transition: New Rules, New Tools

“NSI’s Impact seminar continues to hit the mark in addressing the relevant issues security professionals deal with on a daily basis. Re-energizing our security program is what it’s all about”

Leighton Quick, Immarsat Government2

GAIN KNOWLEDGE,

INSIGHTS AND

EXPERTISE

GAIN KNOWLEDGE,

INSIGHTS AND

EXPERTISE

Security Clearance Transformation, Risk Management Framework, Insider Threats, CUI, Cybersecurity, Espionage, Terrorism, New NISPOM Requirements… and the list goes on.

Welcome to the world of Government and defense contractor security for 2017.

The new year is ushering in sweeping changes to Government security programs that are changing the way you’ll do your job. Prepare for the changes ahead and get out in front of the compliance curve by attending NSI’s IM-PACT ’17 Forum—the premier training event for security professionals. IMPACT ’17 will prepare you with proactive, effective and practi-cal security strategies essential to the success of your security program.

Timely Information. Practical Solutions

Clearly, the need for security is as great as it’s ever been. Now is not the time to skimp on security, or security training as Government and corpo-rate secrets are even more vulnerable. IMPACT ’17 provides you with need-to-know, actionable intelligence to safeguard classified information from a growing array of threats — both in the physical and virtual realm.

Led by a top-flight faculty of speakers and train-ers, IMPACT ’17 features an impressive line-up of security threat briefings, training workshops, case studies and practical take-home tools to improve your program. From the nuts and bolts of DoD Security, NISPOM and Insider Threats to the biggest information security threats, you’ll find the answers you need at IMPACT.

Learn the How-to at IMPACT

Join the best minds in government and industry security for three innovative days at NSI’s 32nd Annual IMPACT ’17 Seminar and Expo on April 24-26 at the Westfields Marriott in Chantilly, VA.

Expert presentations, group discussions, case stud-ies, and practical workshops look beyond the sur-face, giving you real and proven solutions that will work in your organization and prepare you for the security challenges ahead.

Whether you’re new to the profession or an industry veteran, there’s no better training opportunity than IMPACT to equip you with the skills and resources needed to make you indispensable at your job.

Informative Sessions, PracticalWorkshops and Networking

Got questions about the National Industrial Se-curity Program Operating Manual, Insider Threat Program Requirements, Security Clearance Pro-cessing Issues, and Classified Information Systems Security? Get answers at NSI IMPACT ’17.

Learn everything you need-to-know from over 21 leading government and industry security experts at IMPACT ’17 — the one seminar you and your security team can’t afford to miss this year.

FREE BONUS WORKSHOP:Pre-Seminar DISS TrainingSunday, April 23, 2:00 pm — 5:00 pm

Open to seminar attendees only, this three-hour bonus workshop will help you to successfully navigate the transition to the new Defense Infor-mation System for Security (DISS). This practical training session provides a hands-on demonstra-tion of the new clearance data system that replaces JPAS. This complimentary workshop is available to three-day registrants only.

Your Once-a-Year Opportunity to Recharge, Refocus and Re-Energize

Why does the security community look for-ward to NSI IMPACT so eagerly every year?

Agenda. The agenda is targeted to your needs. IMPACT 2017 is programmed by security professionals who know the respon-sibilities of your job and the kind of pressures you face. They organize the schedule to make effective use of your valuable — and limited — time by focusing on the issues you face both day-to-day and long-term.

Focus. The participants are your peers. IMPACT 2017 draws its audience exclusively from government and industry security man-agers and professionals — the people who are doing the same job you’re doing… the people you want to meet and share with.

Environment. Why get lost in a giant convention center or wait in long lines after a session to meet the speaker? IMPACT 2017 offers small, more intimate sessions that bring you closer to the action and the speakers as well as your peers.

Page 3: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Valuable Take-Home Resources

Every IMPACT 2017 registrant goes home with a comprehensive binder of seminar ma-terials and handouts and a DVD containing

the 2017 Edition of NSI’s Reference Library.

This remark-able DVD is packed with articles, white papers, check-lists, glossaries,

reports, statutes, executive orders, manuals, surveys, and primary sources. It’s the most comprehensive collection of security-related information available, and it’s all organized in a user-friendly format in categories that are meaningful to security professionals. If you ever need to write policies, prepare reports, plan strategy, forecast trends, or justify proce-dures… you’ll appreciate having all this infor-mation at your fingertips.

We also will update you after the conference by e-mail with additional session handouts and presentations as they become available.

Security Awareness Fair and Expo

Your registration includes admission to NSI’s 2017 Security Awareness Fair and Expo. The major government security agencies will be there offering a broad array of complimentary materials and media through their security outreach programs. These complimentary re-sources are ready to take home to implement in your organization.

NSI’s exclusive vendor expo brings you up-close to the hottest technologies, and products de-signed to help you handle today’s ever-changing security challenges.

DCIS

NSA

FBI

3

Champagne ReceptionMONDAY, APRIL 24, 5:00 - 6:00PMPlease join us for complimentary hors d’oeuvres and champagne. On Monday come meet your colleagues in a fun and relaxed setting, making contacts that will enhance your conference experience — and extend beyond.

A Sampling of the2017 Exhibitors

Reasons to Attend

1. Top SpeakersAll speakers at IMPACT 2017 are renowned for the topic they will address. Expert instruc-tors from government and industry will arm you with the skills and solutions necessary to successfully implement changing security requirements.

2. Targeted TopicsParticipate in top-notch education. IMPACT 2017 is packed with sessions and workshops targeted to your specific needs so your time is always spent productively.

3. It’s What You Asked forWe extensively surveyed hundreds of top secu-rity professionals to deliver the tailored solu-tions to the most important challenges you face now… and throughout 2017.

4. Come Away with SolutionsNo other conference reveals proven tactics to guarantee enhanced security solutions you can take back with you and implement. You’ll get the right balance between government and in-dustry security issues, and sessions for beginners through veteran security practitioners.

5. Practical, In-Depth WorkshopsInteractive workshops provide extended training in critical security areas like NISP compliance; communication skills; clearance processing; counterintelligence; cyber security; insider threat programs; security awareness; vulnerability assessment; security case studies, and real-world lessons learned.

6. Professional DevelopmentYou’ll get career-building strategies and a personalized road map for your professional growth while participating in sessions that you need to advance to the next level.

IMPACT 2017 Extras!IMPACT 2017 Extras!

CI Centre

ISOO

DSS

Page 4: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

“Extremely powerful from start to finish. The NSI Impact forum presents extremely relevant topics that inspire security professionals.”

Paula FridellBoeing Company

New Challenges for Security In a World of TransitionBill Evanina National Counterintelligence Executive

The national security sector is going through a grand transition that will radically change the way security professionals do their jobs. From insider threats to state-sponsored cyber attacks on American com-panies, the entire threat landscape is changing dramatically with the increased sophistication of adversar-ies. In addition, changes to the way the government conducts security clearance evaluations, risk assess-ments and insider threat programs will re-write the book on security for years to come. The Office of the National Counterintelligence Execu-tive is at the forefront of these critical changes that will shape the future of security. Bill Evanina, who serves as both National Counterintelligence Executive (NCIX) and the Director of the National Counterintelligence Center will present this year’s keynote address and will offer insight into the most critical issues affecting security along with what it takes to protect classified information in today’s ever-changing risk environment.

Monday

April 24Monday

April 24Educational

SessionsEducational

Sessions

4

Monday, April 24 8:45am-9:40am

Terrorism 2017: Coun-tering Threats at Home and AbroadMichael B. Steinbach, Exec. Asst. Director, FBI National Security Branch

America faces its highest threat from Islamist terrorists since the Sept. 11, 2001 terror attacks, according to the House Homeland Security Committee. ISIS and other terrorist groups have largely abandoned at-tempts to put together spectaculars like Sept. 11, and are focusing now on “a new landscape,” where lone killers, empowered by the technol-ogy of the digital age, can strike with smaller-scale massacres. Officials are convinced that terrorism will remain a grave threat during 2017. Prevent-ing terrorist attacks remains the FBI’s top priority. Michael Steinbach, FBI’s Executive Assistant Director, National Security Branch will exam-ine the widespread reach of terrorists’ influence, which transcends geo-graphic boundaries like never before. As terrorists become more creative, resourceful and technology savvy, their approaches will become more sophisticated and deadly.

You Will Learn:

Vital intelligence aboutlatest trends in terrorism

ISIS recruiting efforts inthe U.S.

Effective and practicalcounterterrorism measures

Monday, April 24 10:40am-11:40am

Espionage, Insider Threats: Real World Lessons LearnedDavid G. Major, PresidentCI Centre

In the post-Snowden world, federal agencies and cleared contractors know they need to defend against the real possibilities of insider threats and economic espionage—two threats that have been on a relentless upward trend. With the recent es-calation of high profile cyber threats from hostile nation-states and mali-cious insiders, 2017 is poised to feature more of the same. While new tools are needed to combat ever changing security threats, it is help-ful to examine the recent history of espionage and insider threat inci-dents, because it’s possible to derive many important lessons for defend-ing against them in the future. In this informative session, David Major, president and founder of the CI Centre, will provide several illustrative examples of the kind of damage that can be done along with valuable lessons on how to protect yourself and your organization.

You Will Learn:

Trends, patterns andsecurity countermeasures

Potential risks to watchfor this year

Risk mitigation strategies

Monday, April 24 11:40am-12:40pm

State of the DSS: Shaping the Future of SecurityDaniel E. Payne, Director, Defense Security Service

The Defense Security Service is working more closely than ever with cleared defense contractors and other stakeholders to ensure the protec-tion of classified information. From processing record numbers of suspi-cious contact reports to oversight of industrial security and insider threat programs, DSS’s mission continues to evolve and change with the times. Find out what’s in store for DSS (and FSOs) in 2017, and how it will impact the changing compliance requirements of the NISP. In this an-nual state of the DSS briefing, you’ll get a chance to hear about important plans and priorities that will affect the way DSS continues to accom-plish its industrial security mission. Highlights include such vital topics as: security vulnerability assessments; insider threat program requirements; new risk management framework; security clearance processing and timelines; counterintelligence report-ing; FOCI and CDSE training.

You Will Learn:

Security policy and pro-gram initiatives for 2017

New NISPOM imple-mentation requirements

Keynote Address:

Page 5: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Best Practices in Implementing an Insider Threat ProgramRandall Trzeciak, Director, Insider Threat Programs, CERTMichael G. Gelles, Managing Dir., Deloitte ConsultingWayne Belk, Co-Director, Nat. Insider Threat Task Force, ODNI

Government agencies and contractors are facing increasing security challenges from insider threats. Recent arrests, such as that of Harold Martin, a govern-ment contractor for the NSA, serve as a stark reminder of the danger of the in-sider threat and illustrate the need for improved security within all organizations. In an effort to address this complex problem, the U.S. government has issued Executive Order 13587 and NISPOM Change 2 to increase protections against insider threats within government agencies and contracting companies.

These newly implemented federal rules that call for the creation of mandatory insider threat programs have many organizations scrambling to comply. Once implemented, contractors have continuing obligations to gather and report rel-evant and credible information that indicates potential or actual insider threats. In addition, contractors are required to monitor classified network activity and conduct self-inspections of their insider threat programs.

This comprehensive workshop is designed to develop the critical components of an insider threat program and will highlight regulatory requirements, proven best practices and social-psychological factors critical to shaping a comprehensive insider threat program.

You Will Learn:

Key components of an effective insider threat program

Program implementation best practices

Behavioral risk indicators

How to improve your security posture against inside threats

Strategies to mitigate insider threats

5

Monday, April 24 3:45pm-5:00pm

Transition to the Defense InformationSystem for Security (DISS)Quinton Wilkes, Corp. Security Mgr., L-3 ComNick Levasseur, Dep. Prog. Mgr. for DISS, DMDC

The Pentagon’s new Defense Information System for Security (DISS), promises to transform how personnel security, and clearance suitability data are collected, reviewed, and shared. It replaces the legacy Joint Personnel Adjudication System (JPAS) system with a more secure, end-to-end IT system.

DISS is designed to meet several requirements of security clearance reform efforts, including reciprocity, automated record checks, and continuous evaluation. It will also cover various records, including personal information, DoD affiliation types, employment status, eligibility status for security clearances, foreign travel and contacts, security-associated incident reports, debriefing as well as records of adjudication and investigations conducted by federal investigative agencies.

According to DoD, the new system will work to help the department determine an individual’s eligibility to access classified data, check employment suitability and perform personal identity verification for accessing government systems and facilities. Successfully navigating your way around the new DISS will not come without some growing pains. This comprehensive workshop will explore problems and resolutions and provide an extended opportunity for you to have all of your questions answered.

You Will Learn:

Rules of the road to navigate the new DISS

Steps to minimize problems and get help

How to obtain timely access to automated records

Monday, April 24 2:00pm-3:15pm

Afternoon

WorkshopsAfternoon

Workshops

Page 6: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Tuesday, April 25 8:00am-8:45am

Cyber Security: Navigating a Changing Threat LandscapeLucia M. Ziobro, Section Chief, Cyber Operational Engagement, FBI

New cybersecurity threats are emerging daily; each one more sophisticated than the last, evolv-ing to do more damage and af-fect more organizations. From ransomware and the Internet- of-Things to spear-phishing and social engineering attacks, cyber-criminals will continue to expand their reach in 2017. In addition, workplace mobility is enabling employees to access sensitive infor-mation resources from anywhere in the world and on any device. As a result, employees and data are leaving the network perimeter and sensitive data is becoming more vulnerable than ever. As cyber threats evolve, so must the way that we react to and deal with them. Staying ahead of emerg-ing threats and the increasing sophistication of cybercriminals requires constant vigilance. No one can predict when the next cyber breach will happen – so it’s all about pre-emptive strategy. In this presentation, you’ll gain ex-pert advice on how your organiza-tion can better prepare for, defend against, and respond to changing cyber security risks.

You Will Learn:

How to stay ahead ofemerging threats

Key trends that youshould anticipate in 2017

Best practices for mitigat-

ing cyber threats

Tuesday, April 25 10:00am-11:00am

Transformation of the Security Clearance ProcessCharles Phalen, Director, NBIBPerry Russell-Hunter, Director, DOHA

Several key building blocks are now in place to implement security clear-ance reforms designed to improve the speed and efficiency of the vet-ting and adjudication process in the wake of the Edward Snowden leaks and the Navy Yard shooting. The recently established National Background Investigations Bureau (NBIB), is tasked with leading the overhaul and overseeing clearance and adjudication standards. While trimming the clearance backlog is a priority, reducing the time it takes to complete an investigation is the agency’s top focus. Additionally, personnel security investigation and adjudication are being strengthened to ensure that clearance processing addresses insider threats. In this informative Q&A panel session, you’ll hear from two of the key government players involved in the security clearance process and ongo-ing reform efforts.

You Will Learn:

Current reforms underwayand what they mean to you

Best practices to resolveclearance problems

How to ensure timelyclearance processing

Tuesday

April 25Tuesday

April 25Educational

SessionsEducational

Sessions

“As always great seminar. My third consecu-tive attendance. Speakers were awesome and networking very successful.”

David CummingsHarris Corporation

6

Tuesday, April 25 8:45am-9:45am

Trends in Social Engineering: Securing the Weakest Link Araceli Treu Gomes, Cybersecurity Strategist, CrowdStrike

Industry analysts and security ex-perts can all agree on one security constant: Your people are your biggest security vulnerability. It’s no surprise, then, that social engineers have capitalized on this weakness, making social engineering one of the biggest security challenges facing organizations today. While social engineering attacks come in many forms, the common thread is that they involve an attacker exploiting a human vulnerability. Social engi-neering was identified as a key ele-ment in several high profile security breaches including the hacking of former CIA director John Brennan’s email account. Today, email-based attacks using social engineering are enabling cybercriminals to steal cor-porate secrets, carry out politically motivated attacks and steal massive amounts of sensitive data. In this session, you’ll learn how social en-gineering is evolving in 2017, and how to help employees shed the bad habits that make them vulnerable.

You Will Learn:

Current trends in socialengineering

The psychology behindthe threats

Common forms of attack

Tuesday, April 25 11:00am-12:00pm

Understanding the New Risk Management Framework ProcessKarl Hellman, Asst. Dep. Director, NISP Authorization Office, DSS

The new Risk Management Frame-work (RMF) is changing that way that cleared contractors and agencies obtain certification and accredita-tion of their classified IT systems. Developed by the National Institute of Standards and Technology, RMF focuses on a standard set of activities to certify and accredit DoD infor-mation systems. The new standards are dynamic, risk management focused and offer continuous moni-toring practices. This session will help you successfully transition to the Risk Management Framework and ensure that you’ll be in compli-ance with the new standards. If your organization is struggling with getting through the process of ob-taining accreditation for your sys-tems or if you just need direction on how to get started then this session is for you. You’ll have an expanded opportunity to have all your ques-tions answered.

You Will Learn:

Identify the steps and toolsin the RMF process

Keys to submitting SSP’sthat get approved

Deep dive into theauthorization process

Page 7: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Afternoon

WorkshopsAfternoon

Workshops

7

Tuesday, April 25 1:45pm-3:00pm Track 1

Track 1 — Protecting Controlled, Unclassified InformationMark Riddle, Sr. Prog. Analyst, Information Security Oversight Office

Classified information usually gets all the attention, but a new rule that went into effect in November, addresses the way controlled, unclassified information (CUI) is marked, handled and disseminated. The new rule defines CUI as an interme-diate level of protected information between classified information and uncon-trolled information. It’s designed to replace the inconsistent, and often conflict-ing, patchwork of over 100 different agency-specific policies, markings and other requirements used to control “Sensitive But Unclassified” information.

A key function of the rule is to ensure that agencies and contractors are mark-ing and handling the information in the same way. Documents that may have been marked “proprietary” or “official use only” will now be marked “CUI.” This workshop will provide an overview of the CUI Program, along with looming deadlines for implementation.

You Will Learn:

Key features of the new CUI program

Special marking and handling requirements

CUI milestones and timelines

Tuesday, April 25 3:20pm–4:35pm Track 2

Track 2 — How to Build a Strong Security Awareness ProgramMartin McNair, Consultant, National Security Training Institute

Awareness is a powerful tool in creating culture, and influencing organizational behavior. But few awareness programs are delivering on their intended impact as employee missteps and insider threats continue to dominate the headlines. Changing behavior is one of the greatest challenges security practitioners face when implementing security awareness programs. Convincing people to change is hard in any arena, but when it comes to security – an area which most people neither know nor care much about – it’s especially difficult.

So how do you empower your workforce with the security know-how to help protect government and company secrets? In this eye-opening session, Martin McNair, an expert on security training, will offer insights on what works in security awareness programs – and what doesn’t. You’ll get insights on how to build and deliver a program that makes employees smarter about security.

What You’ll Learn:

How to create an awareness program that people won’t hate

Critical factors that lead to high-impact awareness

Marketing techniques that get employee buy-in

Tuesday, April 25 3:20pm–4:35pm Track 1

Track 1 — DSS Industrial Security Issues and AnswersGus E. Greene Sr., Director, Industrial Security, Defense Security Service

Sweeping changes in the National Industrial Security Program mean that FSOs will have more compliance issues to contend with in 2017. DSS vulner-ability assessments will broaden their scope to include insider threat programs and new information system security mandates. Keeping up with changing requirements and knowing where potential problems lie is critical to avoid security compliance issues and safeguard classified information. Maintaining an effective security program and achieving a “superior” rating should be a key element of your security strategy.

This interactive Q&A session features key personnel from the Defense Security Service who will guide you through the compliance issues you face in meeting NISPOM requirements. You’ll also find out what red flags IS reps are encoun-tering during their contractor assessment visits so you can avoid any potential problems in your security program and help you on your path to compliance.

What You’ll Learn:

Hands-on advice for keeping your program in compliance

Industrial security program initiatives for 2017

How to achieve security excellence

Tuesday, April 25 1:45pm-3:00pm Track 2

Track 2 — Navigating the NISP Contracts Classification System (NCCS)Lisa Gearhart, Sr. Policy Analyst, Defense Security Service

The new National Industrial Security Program (NISP) Contracts Classification System (NCCS) is now online and DSS is implementing it in a phased approach for both government and industry. The NCCS was designed to automate the pa-per-driven DD Form 254 — the foundational document for classified contracts. The new web-based system creates a single, centralized, and secure repository for all DD254s. Users will have the capability of drafting original, revised, and final DD254s, completing facility clearance sponsorship requests, and providing ap-provals for the flow down of certain security accesses to subcontractors.

This workshop features a demonstration of the NCCS, its deployment time-line, registration and system access requirements, available functionality, and future enhancements. This is your opportunity to learn how to navigate the new NCCS and have your questions answered.

You Will Learn:

NCCS set up requirements

Retrieve real time statuses of DD 254 submissions

How to manage and monitor DD 254 activities

Page 8: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Wednesday, April 26 8:00am-8:45am

Strategies to Counter Cyber Threats to National SecurityD. Renee Tarun, Deputy Director NSA’s Cyber Task Force

Cyber threats and attacks are one of the most serious economic and na-tional security challenges the United States faces, and are increasing in scale and intensity. The nation’s criti-cal networks, infrastructure, com-munications and data are increasing-ly at risk from diverse and persistent threats. These include rogue states, cybercriminals and terrorists who are showing an aptitude to employ sophisticated capabilities against us. As cyber attacks on U.S. government and commercial computer systems increase at alarming rates, the risk for national security information to be compromised is also growing. The National Security Agency is on the frontlines in defending the govern-ment’s national security systems from a growing array of threats. This briefing will examine emerging threats on the virtual horizon and how to defend against them.

You Will Learn:

The state of the cyber threat for 2017

Defenses against cyber attack methods

Insight into cyber threat actors

Wednesday, April 26 10:35am-11:35am

DICE 2017: Make Security Great AgainRay Semko – The DICE Man

There’s no denying that we live in a dangerous world. We continue to face grave security threats like terror-ism, cyber attacks and insider threats. Barely a day goes by without a major security breach coming to light. Combating these threats begins with fostering a culture of security aware-ness and re-emphasizing the role that everybody plays in security. To coin a phrase, making security “great again”. Ray Semko, security expert and creator of the well-known DICE Program, will wrap up IMPACT with a high-energy briefing on the 2017 threat environment and advice to help protect your organization and strengthen your security program. This security consciousness-raising session will equip you with tools and techniques to educate your workforce on the growing threats to national security from foreign spies, terrorists, and malicious insiders.

You Will Learn:

Understanding the role of the individual

Why security is more vital than ever

How to go from awareness to action

Wednesday

April 26Wednesday

April 26Educational

SessionsEducational

Sessions

Deidre ConnonApplied Information Sciences

“Great presenters! Many tools were given that can be immediately imple-mented in the workplace.”

8

Security Leadership Tools: What You Need in Your ToolboxApril H. Armstrong, CEO, AHA Insight

In today’s rapidly changing world, the mission of security is expand-ing and managers face a new test of leadership. As a security pro-fessional, you are responsible for managing the crucial links between safeguarding government secrets and information assets, and person-nel security and insider threats. It is a job that continues to change, and as the scope and complexity of technology’s contribution increases, so does the role of security. While security programs transform to meet new threats, it will be up to you to refine your skills in communications and undertake the disciplined ap-proach required for effective leader-ship during this time of change. There is a tendency within security organizations to focus on reactive se-curity rather than taking a proactive approach. In this valuable session you’ll be given useful tools and strat-egies to help navigate change and focus forward.

You Will Learn:

How to improve your people skills

How to gain buy-in for your ideas

Wednesday, April 26 9:50am-10:35am

The Evolving NISP: Navigating The Road AheadMark Bradley, Director, Information Security Oversight Office

The National Industrial Security Program (NISP) is undergoing sig-nificant changes in several key areas that will dictate future requirements for the protection of classified and sensitive unclassified information. The Information Security Oversight Office (ISOO), which oversees the government-wide security clas-sification system and the National Industrial Security Program, is at the forefront of these efforts. As changes to industrial security policy advance, security practitioners can take a num-ber of steps now to address changing requirements and stay ahead of com-ing reforms. This timely presentation will bring you up to speed on key areas of government security that will affect the way you do your job. Among the issues to be examined are: classification management; Controlled Unclassified Informa-tion (CUI); Insider Threat program requirements; security policy imple-mentation; new reporting require-ments; and much more.

You Will Learn:

Understand changing security policies

What’s on the NISPPAC agenda for 2017

Wednesday, April 26 8:45am-9:30am

Page 9: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Tuesday, April 25 7:00 — 7:50 am. Coffee and Pastry 7:50 — 8:00 am. Opening Remarks 8:00 — 8:45 am. Cyber Security: Navigating a Changing Threat Landscape Lucia M. Ziobro, Section Chief, Cyber Operational Engagement, FBI 8:45 — 9:45 am. Trends in Social Engineering: Securing the Weakest Link Araceli Treu Gomes, Cybersecurity Strategist, CrowdStrike 9:45 — 10:00 am. Refreshment/Networking Break 10:00 — 11:00 am. Transformation of the Security Clearance Process Charles Phalen, Director, NBIB & Perry Russell-Hunter, Director, DOHA 11:00 — 12:00 pm. Understanding the New Risk Management Framework Process Karl Hellman, Asst. Dep. Director, NISP Authorization Office, DSS 12:00 — 1:45 pm. Host Networking Luncheon 1:45 — 3:00 pm. Track 1: Protecting Controlled, Unclassified Information Mark Riddle, Sr. Prog. Analyst, Information Security Oversight Office Track 2: Navigating the NISP Contracts Classification System (NCCS) Lisa Gearhart, Sr. Policy Analyst, Defense Security Service 3:00 — 3:20 pm. Refreshment/Networking Break 3:20 — 4:35 pm. Track 1: DSS Industrial Security Issues and Answers Gus E. Green, Director, Industrial Security, Defense Security Service Track 2: How to Build a Strong Security Awareness Program Martin McNair, Consultant, National Security Training Institute

Monday, April 24 7:00 — 7:50 am. Registration. Coffee and pastry will be served during registration 7:50 — 8:00 am. Welcome and Opening Remarks 8:00 — 8:45 am. New Challenges for Security In a World of Transition Bill Evanina, National Counterintelligence Executive 8:45 — 9:40 am. Terrorism 2017: Countering Threats at Home and Abroad Michael B. Steinbach, Exec. Asst. Director, FBI National Security Branch 9:40 — 10:40 am. Opening of Awareness Fair, Expo and Refreshment Break10:40 — 11:40am. Espionage, Insider Threats: Real World Lessons Learned David G. Major, President, CI Centre 11:40 — 12:40 pm. State of the DSS: Shaping the Future of Security Daniel E. Payne, Director, Defense Security Service 12:40 — 2:00 pm. Host Networking Luncheon, Security Awareness Fair and Expo 2:00 — 3:15 pm. Best Practices in Implementing an Insider Threat Program Randall Trzeciak, Director, Insider Threat Programs, CERT Michael G. Gelles, Managing Dir., Deloitte Consulting Wayne Belk, Co-Director, Nat. Insider Threat Task Force, ODNI 3:15 — 3:45 pm. Refreshment Break, Security Awareness Fair and Expo 3:45 — 5:00 pm. Transition to the Defense Information System for Security Quinton Wilkes, Corp. Security Mgr., L-3 Com Nick Levasseur, Dep. Prog. Mgr. for DISS, DMDC

9

Lucy Perrotta Raytheon

“Extremely informative, great networking opportunities, well organized and executed.”

Wednesday, April 26 7:00 — 7:50 am. Coffee and Pastry 7:50 — 8:00 am. Opening Remarks 8:00 — 8:45 am. Strategies to Counter Cyber Threats to National Security D. Renee Tarun, Deputy Director, NSA’s Cyber Task Force 8:45 — 9:30 am. Security Leadership Tools: What You Need in Your Toolbox April H. Armstrong, CEO, AHA Insight 9:30 — 9:50 am. Refreshment/Networking Break 9:50 — 10:35 am. The Evolving NISP: Navigating The Road Ahead Mark Bradley, Director, Information Security Oversight Office10:35 — 11:35 am. DICE 2017: Make Security Great Again Ray Semko – The DICE Man 11:35 — 11:45 am. Closing Remarks

At-A-Glance Three Days of

Career-Critical Information

At-A-Glance Three Days of

Career-Critical Information

Page 10: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Seminar Hours Monday, April 24 Registration 7:00 am. – 7:50 am. Conference 7:50 am. – 5:00 pm. Networking Reception 5:00 pm. – 6:00 pm. Tuesday, April 25 Conference 7:50 am. – 4:35 pm. Wednesday, April 26 Conference 7:50 am. – 11:45 am.

Pre-Conference Workshop Sunday, April 23, 2:00 pm. – 5:00 pm.

Security Awareness Fair and Expo Monday, April 24, 9:40 am. – 3:45 pm.

Meeting Attire Attire for the National Security Institute’s Impact Forum and Exhibition is business casual.

Hotel Reservations To reserve your room call Marriott reserva-tions at 1-877-212-5752 or reserve your room online at https://aws.passkey.com/event/15543595/owner/13564/home. When calling, please ask for the NSI IM-

PACT 2017 rate at the Westfields Marriott in order to receive the dis-counted group rate of $229. The group rate will be available until April 3rd or until the group block is sold-out, whichever comes first. Please be aware the room block fills quickly, so we suggest you make your hotel and travel plans early.

The Westfields Marriott is located at 14750 Conference Center Drive, Chantilly, Virginia, 20151. The Westfields Marriott hotel combines sophisticated meeting facilities with elegant hotel accommodations and also features access to the Westfields Signature Fred Couples Golf Club.

Register

early & SaveRegister

early & Save

FOUR EASY WAYS TO REGISTER

1. Register online at: http://nsi.org/impact-2017.html

2. Fax the registration form with payment information to: (508) 507-3631

3. Mail the registration form and payment to: National Security Institute 165 Main St., Ste 215 Medway, MA 02053

4. Call (508) 533-9099

REGISTER EARLY AND SAVE $50Earlybird Discount A special rate of $895 is being offered to all attendees whose payment is received by March 20, 2017. The registration fee covers all program materials, admission to the pre-conference workshop, host reception, luncheons and refreshment breaks.

Regular RateThe fee for registrations received after March 20, 2017 is $945. All registrations must be accompanied by a check made payable to the National Security Institute, a Purchase Order or Government Train-ing Form. You may also charge your MasterCard, Visa or American Express.

Cancellation PolicyCancellations must be made in writing to the National Security Institute. Refunds for cancellations received on or before April 3rd will be subject to a $50 administrative fee. Cancellations received after April 3, 2017 will forfeit the conference fee. Substitutions may be made at any time by calling NSI.

10

About NSIFounded in 1985, the National Security Institute (NSI) is a veteran-owned publisher and educator serving the needs of security professionals in government, the corporate sector, and defense contracting. We publish newsletters and special reports, we sponsor seminars and conferences, and we offer government and industry security professionals a FREE e-newsletter, delivering national and international news pertinent to the security profession. We produce the industry’s most respected and cost-effective security awareness services. Visit us at http://nsi.org.

Page 11: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

Registration FormRegistration Form

RegisteR byMAR 20andSAVE$50!

MAR 20SAVE$50!

Please print, type or attach your business card and forward to: National Security Institute, 165 Main Street, Suite 215, Medway, MA 02053. Tel: 508-533-9099 Fax: 508-507-3631. Photocopy for additional registrations.

Registration Fees Rcvd. by 3/20/17 After 3/20/17

3-day Registration $895 $945

2-day Registration $845 $845

1-day Registration $595 $595

Name: Title:

Company/Agency:

Address:

City: State: Zip:

Phone: E-mail:

Priority Registration Form

Method of Payment Check Enclosed Purchase Order/1556 Form EnclosedCharge to Credit Card: VISA Mastercard AMEX

Card No. Exp. Date

Name on Card

Authorized Signature

Who Should Attend IMPACT 2017… Facility Security Officers Information System Security Professionals Government Personnel Security Managers Corporate Security Directors Information Security Managers Classification Management Specialists Counterintelligence Professionals Security Education and Training Specialists Government Agency Security Specialists Classified Material Control Specialists OPSEC Managers Security Adjudicators DISS Account Managers

impact 2017

11

Enroll me in the JPAS Transition to the Defense Information System for Security (DISS) Workshop

Sunday, April 23, 2:00 - 5:00 pm Note: This complimentary workshop is available to all three-day Impact registrants.

Gold Sponsors

National Security in Transition: New Rules, New Tools

Chantilly, Virginia, April 24 - 26, 2017

Page 12: 20 - nsi · MAR 20. National Security in Transition: ... CUI, Cybersecurity, Espionage, ... nual state of the DSS briefing, you’ll

You’ll get up to date on the hottest security issues: security clearances, DISS, NISP, classified systems security, economic espionage, cyber security threats, security awareness, terrorism, insider threats.

You’ll return to your office with an entire reference library that will put the information you need at your fingertips: binder, DVD, follow-up e-mails!

You’ll gain networking contacts you can call on all through the year: make friends; get to know the major figures in your profession.

You’ll learn about key developments of the past year — and what to expect in the year ahead — in a relaxed atmosphere conducive to education!

You’ll be prepared to handle the transition of JPAS to DISS, with four hours of in-depth training offered.

You’ll learn security’s latest best practices… and return to your office prepared to implement solutions before they are needed and eliminate security vulnerabilities before they happen!

You’ll spend 3 days with people who understand and care about what you do every day because they do it, too!

Why IMPACT 2017 Will be Your Most Critical Professional Experience of the Year

165 Main Street, Suite 215Medway, MA 02053

“I’ve attended NCMS, ISAC, etc. — Impact is by far the best! Best speakers, best topics, best organization. I like the smaller, more accessible networking environment!”

12

12 Special Features of IMPACT 2017 In-depth, practical workshops, not PowerPoint snooze-a-thons!

Briefings with important heads of government agencies

2017 Edition of NSI’s Reference Data Library on DVD

Sessions targeted to personal and professional development, will help you become better at your job

Comprehensive pre-conference JPAS Transition to the Defense Information System for Security (DISS) workshop

NSI’s 2017 Security Awareness Fair and Expo

Reception, luncheons, and refreshment breaks with your colleagues

Outstanding speakers and session presenters

Post-conference session updates via e-mail

Sessions new for 2017 to address the hottest security topics

Excellent, business-class hotel, minutes from major airports

Take-away binder of conference program materials

First ClassPresort

US PostagePAID

N. Reading, MAPermit No. 140

Linda Ramsey BAE Systems