NSI’s 35th Annual

National Security Forum & Expo

Perfect Mix of Executive Briefings and Insightful Workshops

Designed for Security Leaders at Defense Contractors
and Government Agencies

APRIL 25-27 / Westfields Marriott
Chantilly, VA

Download the brochure

Use this pdf to share with your manager and colleagues for discussion and to secure approval. Click Image to Download.

Briefings, Analysis and Insights from
Top Government Officials and Industry Experts

The Rise of Insider Threats: Key Trends to Watch in 2022

Michael J. Orlando, Director, National Counterintelligence & Security Center

MikeOrlando

The Rise of Insider Threats: Key Trends to Watch in 2022

“The risks to government and industry from insider threats are severe. These threats can take many forms, whether it’s a federal employee coopted by a foreign adversary to steal sensitive information or a corporate employee clicking on a spear-phishing link that infects their company’s networks,” according to NCSC Acting Director Michael Orlando. 

The insider threat is evolving and organizations need to evolve with it.  Mitigating insider threats is best done proactively—before something bad happens. 

In this scene-setting keynote address, Mr. Orlando will discuss the current state of the insider threat and key strategies to defend against threats to classified and sensitive information.

You Will Learn:

  • Conditions that contribute to insider threats
  • Strategies for spotting insider threats
  • Best practices for insider threat mitigation

The Growing Espionage Threat to U.S. Businesses

Bill Priestap, Founder, Trenchcoat Advisors, (frmr Counterintelligence, FBI)

Trenchcoat Headshot Bill Priestap 2021 2

The Growing Espionage Threat to U.S. Businesses

As a former FBI assistant director of counterintelligence, Bill Priestap, is well-versed in the threats facing U.S. corporations from a host of bad actors including nation-state spy services tasked with obtaining a company’s vital intellectual property. 

Companies must determine all that needs protecting; anything that provides a business with a competitive edge may be targeted and exploited.  Spy services often look to employees as an entry point into a company.  Mitigating corporate espionage will chiefly depend on how well employees are trained in counterespionage. 

This presentation will address the tools, techniques and knowledge needed to safeguard your company’s secrets.

You Will Learn:

  • Prepare and assist employees being targeted
  • Identification of critical assets
  • Effective and practical countermeasures

Understanding
Critical Threats to Classified Networks

Molly Moore, Director Adversary Defeat, NSA Cybersecurity Directorate

UNCLASSIFIED//FOR OFFICIAL USE ONLY: Senior portrait Molly Moore mamoor8

Defending Against Growing Threats to Classified Networks

Cyber threats against classified Pentagon and defense industry computers are increasing in frequency, sophistication and impact, opening up to attack vast amounts of critical data that is housed on government IT systems. These threats often pose a greater threat than physical attacks on our nation and are incredibly difficult to identify. 

Each day, the Department of Defense, which protects our national security and terabytes of some of the country’s most sensitive data, thwarts more than 36 million email breach attempts. With new threats every day and criminals who regularly diversify their attacks, experts predict cyberattacks will get worse before getting better.

You Will Learn:

  • Top cyber threats for 2022
  • How adversaries are targeting defense networks
  • Intelligence sharing initiatives

DCSA: Initiatives and Priorities for 2022

Michael Halter, Deputy Asst. Dir. National Operations, Critical Technology Protection Directorate

Michael Halter

DCSA: Initiatives and Priorities for 2022 

The Defense Counterintelligence and Security Agency is now responsible for conducting 95% of the government’s background investigations.

DCSA is also rolling out improvements to the security clearance process; refining internal operations and IT systems; changing how it evaluates defense contractor security programs; updating requirements to better secure defense technology; adopting a risk-based approach to security; continuous vetting of cleared workers and much more.

Find out what’s in store for DCSA (and FSOs) in 2022 and how it will impact your security program.

You Will Learn:

  • New security requirements in the pipeline
  • Next phase of Trusted Workforce Initiative
  • Security policy changes and impacts

Defending Against Economic Espionage in the Digital Era

Alan E. Kohler, Jr., FBI Asst. Director, Counterintelligence Division

Alan Kohler, Jr

Defending Against Economic Espionage in the Digital Era

 

U.S. intelligence officials warn that the foreign spying threat is increasing in both scale and sophistication. Every day, U.S. government and defense contractors are targeted by hostile nations for espionage and theft, resulting in huge losses of national security information and technology secrets. Staying ahead of the threat requires constant vigilance.

Heading into 2022, we should expect nation-state actors to continue their multi-pronged espionage efforts against the United States. The FBI has over a 1,000 open cases of attempted theft of U.S. intellectual property, across a range of industries. The FBI estimates that Beijing steals $200 billion to $600 billion worth of military and economic secrets from the U.S. every year.

You Will Learn:

  • Paradigm shift in the threat landscape
  • Whole-of-society approach to counter threats
  • Spy tactics and exploitation methods

“NSI’s Impact conference continues to hit the mark in addressing the relevant issues security professionals deal with on a daily basis. Re-energizing our security program is what it’s all about.”
- Leighton Quick, Immarsat Government

Practical Workshops & Info Sessions Led by
Top Government Officials and Industry Experts

Cybersecurity Essentials for FSOs

Robby Ann Carter, CEO, SASSI and National Security Training Institute

Robby Ann Carter2

Cybersecurity Essentials for FSOs

 

In the modern workplace, there are many challenges that security teams need to be prepared for — whether it’s phishing, BYOD, IoT, the list is long.  

Complicating matters? The growing use of unauthorized apps and the added obstacle of Shadow IT.  While today’s workforce is increasingly technology savvy, their understanding of the risks they introduce has not kept pace. 

Keeping your organization safe from cyber risk is everyone’s job, not just the IT Department. 

You Will Learn:

  • How to identify and mitigate the risk of Shadow IT
  • Actionable recommendations to address vulnerabilities
  • Cybersecurity awareness best practices

NISPPAC: 2022 Hot Button Issues

David Tender, SVP, Chief Security
Officer, ASRC Federal 

David Tender

NISPPAC: 2022 Hot Button Issues 

The National Industrial Security Program Policy Advisory Committee (NISPPAC), comprised of both Government and industry representatives, is responsible for recommending changes in industrial security policy. 

The group also advises the Information Security Oversight Office on all matters related to the National Industrial Security Program (NISP). In 2022 they’ll be working to create a new path forward on a number of security fronts.  

Attend this workshop to find out what’s on the NISPPAC agenda and how you can help shape the future of the NISP.

You Will Learn:

  • Security policy changes on their radar
  • Risk based industrial security oversight
  • Industry engagement and top issues

How to Build an Effective Insider Threat Program

Dr. Shawn Murray, President, Murray Security Services 

Sean Murray2

How to Build an Effective Insider Threat Program 

Insider threats can come in many forms, and federal agencies and contractors should double down on continuous monitoring for early detection of individuals under pressure or stress, as well as misconduct, high-risk behaviors, and digital anomalies. There is a high probability the next attack on our government will come from a vetted, trusted insider — someone who doesn’t need to find the key to unlock our defenses because they are already inside. If there is any chance of preventing that eventuality, we need to continually evaluate and strengthen our insider threat programs and challenge our current assumptions and processes.

You Will Learn:

  • Steps to building an insider threat program
  • How to gain buy-in from key stakeholders
  • Lessons learned from the experts

Clearance Innovation: VROC & CAF

Charis Lyon, Div. Chief, DCSA 
Michael Ray, DCSA
Tracy Thornton, DCSA

Charis Lyon

Personnel Clearance Innovation: VROC & CAF 

DCSA’s Vetting Risk Operations Center (VROC) has achieved a milestone in enrolling 100% of DoD cleared population  into its continuous vetting program. The VROC currently oversees personnel security within the National Industrial Security Program as well as Continuous Evaluation (CE) across the entire Department of Defense. 

Along with the DoD’s Consolidated Adjudication Facility, the VROC acts as the central nervous system for the security clearance process where initial applications pass through all phases of the vetting process to final eligibility approval at the CAF. Find  out how these two vital clearance processes intersect and how automation will improve quality and timeliness of clearance decisions.

You Will Learn:

  • Common VROC e-Qip reject reasons
  • Industry’s average timeliness trends
  • Clearance reciprocity initiatives

DCSA Industrial Security Program: Issues & Answers

Gus Greene, Director, Industrial Security, DCSA

Gus Greene

DCSA Industrial Security Program: Issues & Answers 

DCSA’s vision to change the way it oversees industrial security is being ramped up for 2022. The agency wants to move from a compliance-based “check the box” inspection mentality to one that prioritizes cleared industry’s most important technology first.  The agency is implementing a new methodology that is based on knowing the assets at each facility, analyzing threats to those assets, identifying vulnerabilities, and applying appropriate countermeasures. This new methodology couples NISPOM compliance with an intelligence-led, asset-focused, and threat-driven approach. Keeping up with changing requirements is critical to avoid security compliance issues and safeguard classified information.

You Will Learn:

  • Strategies for keeping your program in compliance
  • Industrial security program oversight priorities
  • New Security Rating Score model

“Excellent Seminar. Timely topics, knowledgeable speakers and great staff.”
- Tiffany Coleman, Defense Intelligence Agency

Who Should Attend IMPACT?

A Powerful Program

“As always, I leave with a list of action items and new ideas to make my program better.”
- Kristen Mosuch, Unisys

This Year's IMPACT Theme:

Protecting Classified Information in the Cyber Age

IMPACT Gets You Ready

Prepare yourself and your team to meet growing requirements and rapidly evolving  security challenges. 

Get Ready for What’s Next

Cybersecurity is security. Today’s security professional has to take a holistic approach to protect classified and sensitive  information and this year’s IMPACT program will help you do that. 

There are big changes taking place in the National Industrial Security Program and now is the time to prepare for what lies ahead. From the transition to Trusted Workforce 2.0 to the transformation of the security clearance process, there are a host of new challenges and compliance issues you’ll have to contend with. To keep pace, your security program must evolve while at the same time counter a growing array of threats — both inside and outside — as corporate and government secrets become more vulnerable than ever.

“The quality of speakers and their experience far outreached my expectations. I’ll be back every year.” 
- John Lybarger, Aurora Flight Sciences

Big Picture Insights, Practical Knowledge:
You'll Need Both in 2022

Top Speakers, Targeted Topics
All speakers are renowned for the topic they will address. Expert instructors from government and industry will arm you with the skills and solutions necessary to successfully implement changing security requirements.

 

 It’s What You Asked For
We extensively surveyed hundreds of top security professionals to deliver the tailored solutions to the most important challenges you face now and throughout 2022.

Come Away with Solutions
No other conference reveals proven tactics to guarantee enhanced security solutions you can take back with you and implement. You’ll get the right balance between government and industry security issues, and sessions for beginners through veteran security practitioners.

Practical, In-Depth Workshops
Interactive workshops provide extended training in critical security areas like NISP compliance; clearance processing; counter- intelligence; cyber security; insider threat programs; security awareness; case studies, and real-world lessons learned.

Professional Development
You’ll get career-building strategies and a personalized road map for your professional growth while participating in sessions that you need to advance to the next level.

 

Get Ready for What’s Next

“The information provided at this seminar comes from top agencies and is directly relevant to
my security job responsibilities. I have enjoyed the Impact seminar for the past several years.
The networking at this forum has been fantastic!”
- Mary Albrecht, Oshkosh Defense

“The information provided is invaluable to industry. Keeping us current and informed, but also keeping us abreast of upcoming policies and procedures, as well as future trends.”
- Mia Haynes, Alion Science and Technology

“I enjoy attending the Impact seminar each year. Presenters, material and venue was excellent! I always
take back good information to my organization each year. I’m looking forward to attending next year.”
- Pam Spilman, SAIC

“As always, a great seminar.  My third consecutive attendance. Speakers were awesome and networking very successful.”
-David Cummings, Harris Corporation

Organizations That Attend NSI's IMPACT

A
ACF Technologies
Acorn Science & Innovation
ActOne Group of Companies
ADDX
ADS
Advanced Onion
Advanced Product Transitions
Advantage SCI
Aerospace Corporation
AECOM
Aegis Technologies Group
AEM Corporation
Aerojet Rocketdyne
AETC
AFC
Agile Defense
Air Center Helicopters
Air Force Research Institute
Air Mobility Command
Airbus Defense and Space
AKAMAI Technologies
Alban Tractor Co
Alion Science and Technology Corp
AllCom Global Services
Allied Associates International
Altamira
American Systems
AMPS
Anduril Industries
Anniston Army Depot
ANSER
ANVIL Systems Group
Applied Engineering Management 
Applied Fundamentals Consulting
Applied Information Sciences
Applied Physics Laboratory
Applied Research Laboratories
Architect of the Capitol
ARCTEC Alaska JV
Arete Associates
ARIES Systems International
Arkansas Air National Guard
Artis, LLC
Association of American Railroads
Assurance Technology Corporation
AT&T
ATF
ATI Specialty Alloys and Components
Auburn University
Aurora Flight Sciences
AVENGE
AVIAN, Inc.
Avnet Government Solutions
Axios Technologies
B
B.L. Harbert International
B3GLOBALCON
BAE Systems
Ball Aerospace
Banneker Industries
Basis Technology
BATF&E
Bath Iron Works
Battelle
Battlespace, Inc.
BBN Technologies
BC Consulting
BCANetwork
BCI
BCT 
Bechtel Marine Propulsion Corp
Bechtel Plant Machinery, Inc.
Bevilacqua Research Corporation
Big Sky Associates
Blue Cross and Blue Shield of Louisiana
BMC Software Federal
BMPC
BNL
Board of Governors, Federal Reserve
Boeing
Booz Allen Hamilton
Bureau of Environmental Enforcement
Bushido Associates
BWX Technologies
C
CACI
Caesar Creek Software
CALIBRE
Canadian Armed Forces
Carnegie Mellon University 
Caterpillar 
CCDC Data and Analysis Center
CDC
CDSE
CDW Government
CECOM ILSC
CENTECH Group
Center for Army Analysis
Center for Development of Security Excellence
Centers for Medicare & Medicaid Services
CenturyLink
CGI Federal
Charles River Analytics
Chemring Sensors & Electronic Systems 
Chenega Corporation
Clark Construction Group
ClearanceJobs
Cleared Solutions
CMS
CNA
Coleman Group,
Collins Aerospace
COMNAVAIRLANT
Compass
Computer Systems Center 
Computing Technologies
Comtech EF Data
Communications Electronic Command
Conti Federal Services
Corvid Technologies
Cotton & Company
Counter Explosive Hazards Center
Creative Information Technology 
CSCI
CSES
CSI
CTSI
Curtiss-Wright
D
Dae Sung
Dalcom Engineering
DARPA
DCSA
Deep Learning Analytics
Defense Advanced Research Projects Agency
Defense Intelligence Agency
Defense Office of Hearings and Appeals
DEFTEC Corporation
Delex Systems
Deloitte
Dept of Defense
Defense Intelligence Agency
Dept of Energy
Dept of Homeland Security
Dept of Justice
Dept of Justice/FBI
Dept of Justice/DEA
Dept Justice/Security Division

DOJ/SEPS/PERSG
Dept of Labor /OASAM 
Dept of State
Dept of the Army
Dept of the Army – Fort McCoy
Dept of the Army, G-3 Special Operations Div
Dept of the Interior
Dept of the Treasury
Dept of the Navy
Dept of the Air Force
DigiFlight, Inc.
Digital Reasoning
DISA Global Field Command
DITMAC
DNFSB
DoD CECOM
DoD Consolidated Adjudication Facility
DoD, Office of Inspector General
DoD/DARPA
DOHA
DOI – BSEE
DSS/CDSE
DTRA
Dynamic Aviation
E
E.K. Fox
Eastman Chemical Company
EBL Engineers
Elbit Systems of America
Electric Boat Corp
Electrico
EMC Corporation
Engility
ENSCO Avionics
Envisioneering, IncEPS Corporation
Equifax Government Services
Espy Corporation
Esri
Evaltek 
Excet
Excivity
Expert FSO
ExxonMobil
F
FAAC Incorporated
Fairbanks Morse
Falken Industries
Favor TechConsulting
FDA/OIMT/ISS
Federal Aviation Administration
Federal Bureau of Investigation
Federal Energy Regulatory Commission
Federal Housing Finance Agency
Federal Network Systems
Federal Protective Service
Federal Reserve Bank of NY
Federal Reserve Board
Federal Trade Commission
Fibertek
Fluor Federal Petroleum Operations
FOCI Outside Director
Foreign Language Services Simulation
FORSCOM G2
Fulcrum IT Services
G
Gannett Fleming
GDIT
General Dynamics
General Dynamics Bath Iron Works
General Dynamics Electric Boat
General Dynamics Land Systems
General Dynamics Mission Systems
General Services Administration
Gensler
George J. Kostas Research Institute
Georgia Tech Research Institute
GKN Aerospace
Government Secure Solutions CGI Inc
GSA
H
Harris Corporation
Haystax Technology
HEBCO
Henry M Jackson Foundation
Hexagon US Federal
HHS
HLM Associates, LLC
Honeywell
HPE
HPE Federal Security
HPI Federal LLC
HQ AETC/A2OS
HQ Air Mobility Command
HQ AMC/A10N
HQ R&D and Engineering Command
HQDA OACSIM
HQDAG3 Special Ops.
Hughes Network Systems
Human Resources Research Org
Huntington Ingalls Industries
Ian Evan Alexander
I
IBM
ICF Consulting Group
IDA
IDA/CCRL
Idaho National Lab
Ideal Innovations, Inc.
IERUS Technologies, Inc.
IMTAS
InCadence Strategic Solutions
Infinity Systems Engineering
InfoReliance
Inmarsat Government
Innovative Management & Technology Approaches
Institute for Defense Analyses
Integrity Applications
IntelliDyne
Intertek Laboratories
Iridium Satellite
Iron Bow Technologies
ISHPI Information Technologies
Island Creek Associates
iWorks Corporation
J
Jacobs Engineering Group
Javelin Joint Venture/Raytheon
Johns Hopkins – Applied Physics Lab
JPI
Juniper Networks
K
Kalijarvi, Chuzi, Newman & Fitch
Kaman Precision Products
Kansas State University
KBM Enterprises
KBR
KCCT Architects
Kegman
Kelly Services
Kenific Group
Keysight Technologies
KeyW Corp
Kforce Inc
Kinetics, Inc.
Kitty Hawk Technologies
Kitware
Klas Telecom Government
Koniag Government Services
KPMG
Kratos Defense

 

L
L3 Advanced Programs
L3 Flight International

L3 Harris TechnologiesLawrence Livermore National Lab
Leidos
LexisNexis Special Services
LGS Innovations
Linquest Corporation
Lockheed Martin
Lockheed Martin Aeronautics
Lockheed Martin Corporate HQ
Lockheed Martin Logistic Services, Inc.
Lockheed Martin RMS
Lockheed Martin Space
Lockheed Martin SSC
LogiCore Corporation
LongView International Technology Solutions
LTM 
LTS
M
Macro Solutions
Maersk Line
MAG Aerospace
ManpowerGroup Public Sector
ManTech
Mark G. Anderson Consultants
MarkLogic Corporation
Marotta Controls
Marzen Group
Mass. Electric Construction Co.
Matrix Research
Matthews Group
Mayvin Consulting Group
Mayvin
McKinsey & Company
MCRD ERR
Mercer Transportation Co.
Metronome 
MetroStar Systems
MGAC
MHM Innovations
Michael Baker International
Millennium Corporation
Ministry of Defence
Mirion Technologies (IST) Corporation
Mister Kleen Maintenance 
MIT Lincoln Laboratory
MITRE Corp
Moog 
Motorola Solutions
MSM Security Services
MTSI
MVM
N
NAL Research Corporation
NARA
National Academies of Sciences, Engineering
National Archives
National Background Investigations Bureau
National Credit Union Administration
National Geospatial Intelligence Agency
Naval Medical Logistics Command
Naval Special Warfare Command
NAVIOCOM Whidbey Island
NAWC WD
NAWCWD
NBIB
NDI Engineering Company
NEANY
NETSAFA
Newport News Shipbuilding
Next Century Corp.
NGA
nLogic (Boeing)
Noblis
Northrop Grumman
Northrop Grumman Defense Systems
Northrop Grumman Innovation Systems
Northrop Grumman Mission Systems
Northrop Grumman, Aerospace Systems
NSM WDC
NSWC Crane Division
NSWC-PCD
NT Concepts
NV5
O
OAA, Directorate Mission Assurance
OAA/SSD
OACSIM MSD
Oak Ridge National Lab/ U.T. Battelle
Office of Naval Intelligence
ONI/U.S. Navy
OnPoint Consulting
OPM/NBIB
Orbis Operations 
OSD/AT&L
Oshkosh Corporation
Oshkosh Defense
Overlook Systems Technologies
Owens Corning
P
P E Systems, Inc.
PA Aerospace & Defense
PAE
PAE ISR
PAE/DHS
PAL Technologies
Parker Tide / BSEE
Patrona Corporation
PE Systems, Inc.
Penobscot Bay Media 
PERSEC Services
PerSecPros
Personnel Security Professionals
Perspecta Engineering
PESystems, Inc.
Pherson Associates
PlanetRisk
Planned Systems International
Plexis Services
Plexus Corp.
PNNL
Polar Star Consulting
Polaris Alpha
Powertek Corporation
PricewaterhouseCoopers
Privacy & Civil Liberties Oversight Board
Procon Consulting
ProSol Associates
Public Health Agency of Canada
Public Health Institute
Purdue University
PwC Public Sector
Q
QTS
QTS Federal
Quality Support
Quest Software Public Sector
R
Radio Reconnaissance Technologies
Radix MetasystemsRAND Corporation
Rapid Response MonitoringRaytheon
Raytheon – IIS
Raytheon Applied Signal Technology
Raytheon AST
Raytheon BBN Technologies
Raytheon Missile Systems
RDM Engineering
Reallaer
Red River Technology 
Richard S Carson & Associates

Rockwell Collins
Rosendin Electric
RPI Group
RSI
S
SAFE Inc.
SafeNet Assured Technologies
SAIC
Sandia National Laboratories
Satcom Direct
SC&A, Inc.
Scaled Composites
Schafer
Schweitzer Engineering Laboratories
Science and Technology Corp.
SCIS
SCRA
SDA
SDNG
Seagate Federal
Seagate Government Solutions
Sechan Electronics
Securitas Critical Infrastructure Services
Security Walls
SES Government Solutions
Sev1tech 
SHINE Systems
ShorePoint
Simulyze
SimVentions 
Six3/CACI
SMC/IN
Software Engineering Carnegie Mellon
Sonalysts
SOS International
Sotera Defense Solutions 
South Dakota National Guard
Southern California Edison
SP Global
SpaceX
Spartan Management
SPAWAR
Spear Research
Spirent Federal Systems
Squadron Defense Group
SRC
SSC-PAC
SSO Navy
System High Corporation / DARPA
Systematic
Systems Development and Analysis
Systems Engineering
Systems Planning and Analysis
T
T-Kartor USA
TACOM
Tailored Solutions and Consulting
Tau Technologies
TCAA-USA
TE SubCom
Technica Corporation
Teleconsultant
Teledyne Scientific & Imaging
Telephonics
Tetracore
Texstars
Thomson Reuters Special Services
TIO
TMG Construction
TransUnion
TRAX International/TSSC
Trident Systems
Trinity Technology Group
Trisept Corporation
Trowbridge & Trowbridge
TRSS
TrueTandem
Trustwave Government Solutions 
TSC Advantage
TSCM Security Services
University of Alabama
Electronics Subsea Communications 
U
URS Federal Services
U.S. Agency for International Development
U.S. Air Force
U.S. Army
U.S. Army Garrison Stuttgart
U.S. Army Material Systems 
U.S. COAST GUARD
U.S. Department of the Interior
U.S. Dept of Defense
U.S. Defense Intelligence Agency
U.S. Dept of Energy
U.S. Dept of Homeland Security
U.S. Dept of Justice
U.S. Dept of Justice/FBI
U.S. Dept of Justice/DEA
U.S. Dept Justice/Security Division 
U.S. Navy
U.S. Navy – NSWC
U.S. Nuclear Regulatory Commission
U.S. Postal Service
U.S. Secret Service
U.S. Special Ops Command
U.S. Treasury
Ultra Electronics – USSI
Ultra Electronics Ocean Systems
Unisys
United States Military Academy
University of Alabama at Huntsville
University of Michigan
URS FS
URS/AECOM
U.S. Army Edgewood Chemical Biological Center
U.S. Army Forces Command
U.S. Army Medical Dept 
U.S. Army Military District of Washington
USAF / 388th FW
USAF 5th Ops Group
USAF Air Mobility Command
USAF Civilian
USAFMSA
USAFRICOM
USAFRICOM/J2 SSO
USAG Fort McCoy
USAG Italy DPTMS (S2)
USARAF/ G2
USG
USINDOPACOM
USPACOM JIOC
USSOCOM
USSS
USU Research Foundation
UT-Battelle, Oak Ridge National Laboratory
V
Vectra Co
Vencore
Veritas Technologies
Verizon
Versability Resources
Vertex Aerospace Flight International
ViaSat, Inc.
VRL
VT Halter Marine
VT Milcom Inc.
Vulnerability Research Labs
W
Weston Solution
WilmerHale
Woolpert
X
X Technologies
Xcelerate Solutions
Z
Zeiders Enterprises
Zenetex
Zimmerman Associates