NSI IMPACT Session Summaries

Monday, April 15 — 8:00am - 8:45am
Keynote Address:
Countering Evolving Threats to National Security
Charles (Chuck) Durant, Deputy Director for Counterintelligence, DOE

The ever-evolving threat landscape creates new and unexpected challenges for even the most-seasoned security professionals. From nation-state espionage to cyber terrorism and insider threats, the security risks we face as a nation have never been greater or more diverse.  As today’s threat-intensive environment becomes more hostile with each passing day, it is vital for you to be equipped with the tools, techniques and knowledge needed to safeguard national security information from damaging breaches.  In this scene-setting keynote address, find out what threats are on the horizon for 2019 and how to safeguard your organization’s critical information.

Monday, April 15 8:45am - 9:30am
Terrorism and Security: Mapping The Risks in 2019
Peter Bergen, VP, Global Studies & Fellows, New America

Today’s terrorist threats are more complex, fluid, and fast-moving than ever. The foreign terrorist threat from al-Qaeda has metastasized as groups like ISIS have stepped up their game. Self- radicalized terrorists have sprouted up both at home and abroad, taking advantage of changes in technology and social media. Just as the threat increases and diversifies so must our ability to detect, react and stop the plans of terrorists from becoming deadly actions. This timely threat briefing will examine the changing face of terrorism and offer recommendations for meaningful protections against growing dangers.

You Will Learn:
➢ Latest intel, strategies to combat terrorism
➢ U.S. counterterrorism policy and efforts
➢ Threat forecast for 2019


Monday, April 15 10:30am - 11:30am
Changing Nature of Cyber Threats: What FSOs Need to Know
Ira Winkler, President, Secure Mentem

Adversaries are becoming even more assertive and capable of using cyberspace to threaten the United States. The number of adversaries mounting attacks on the U.S. will continue to grow in 2019, as nation-states, terrorist groups and cyber criminals persist in the development of cyber warfare capabilities. As billions more Internet of Things (IoT)-related devices come online, the barrage of cyber threats will not only continue but will target cleared workers in new ways.

You Will Learn:
➢ How adversaries are targeting DoD networks
➢ Protecting against the most common cyber - attacks
➢ Best practices to prevent attacks


Monday, April 15 11:30am - 12:30am
DSS: Developing a Risk-Based Approach To Industrial Security
Daniel E. Payne, Director, Defense Security Service

The Defense Security Service is shifting to an intelligence- led, asset-focused, and threat- driven approach to industrial security oversight. This comes at a time when DSS is poised to take on a bigger role in security clearance background investigations.  Find out what’s in store for DSS (and FSOs) in 2019, and how it will impact the changing compliance requirements of the National Industrial Security Program. Highlights include: security vulnerability assessments; insider threat program requirements; CI reporting; and more. 

You Will Learn:
➢ What FSO’s can expect during their security reviews
➢ New NISPOM implementation requirements
➢ DSS in transition and what’s ahead


Monday, April 15 2:00 - 3:15pm
Track I — Security Awareness: Keeping Your Program Relevant and Engaging
Tom Brown, Director, Govt. Security AECOM

Awareness is a powerful tool in creating a strong security culture and influencing organizational behavior. But few awareness programs are delivering on their intended impact as employee missteps and insider threats continue to dominate the headlines. So how do you change employee behavior and empower your workforce with the security know-how to help protect government and company secrets? This workshop will offer insights on how to create relevant awareness content that keeps your employees engaged.

You Will Learn:
➢ How to create awareness programs that people won’t hate
➢ Critical factors that lead to high-impact awareness
➢ Marketing techniques that get employee buy-in


Track II — Navigating the NBIS and the NISS
Dr. Chuck Barber, Dir., Enterprise Bus. Support Office, Defense Vetting Directorate Heather Green, Dir., Vetting Risk Operations, Defense Vetting Directorate  Ryan Deloney, Asst. Deputy Director, Industrial Security Field Ops., DSS

There are many changes on the horizon in the Personnel Security Vetting mission space. The National Background Investigation Services (NBIS) is the enterprise infrastructure that encompasses all of the Personnel Security Vetting systems. Initiatives are underway to transform how personnel security clearance and suitability data are collected, processed, reviewed, and shared. The Defense Vetting Directorate of the Defense Security Service is leading this change with the establishment of their Enterprise Business Support Office and the Vetting Risk Operations Center. This comprehensive workshop will address the issues associated with successfully navigating these new security systems, organizations and processes.

You Will Learn:
➢ Rules of the road to navigate the NBIS and the NISS
➢ How centralized vetting operations will achieve efficiencies

Monday, April 15 3:35pm - 4:50pm
Track I —Creating an Effective Travel Security Program
Mathew Bradley, Reg. Security Dir., Americas International SOS

In a world where international travel is growing faster than ever before and the risk landscape for travelers continues to change, having a robust travel risk management program in place is key in order to fulfil your duty of care to employees, and to maintain organizational resilience. Without a clearly defined and communicated travel risk management program in place, you’re potentially putting traveling employees in harm’s way, which can have serious operational, reputational, financial and legal repercussions for your organization. The threats today can affect anyone, anywhere.

You Will Learn:
➢ Global emerging travel threats
➢ Risk analysis and sources of information
➢ Practical risk mitigation strategies


Track II —How to Comply with the DSS Risk Management Framework
Karl Hellmann, Asst. Dep. Dir., NISP Authorization Office, DSS

The Risk Management Framework is a significant undertaking for most organizations and all defense contractors with classified information systems must comply with the six-step RMF process in order to receive or maintain their system authorization. This new accreditation process provides a complex challenge to industry through new approaches to system categorization, assessment and continuous monitoring. Understanding these requirements along with the RMF process is key to getting your information systems approved. Navigating the complex Risk Management Framework requirements can be daunting. Learn best practices and gain a better understanding of RMF.

You Will Learn:
➢ How to obtain timely authorizations
➢ Key missteps to avoid
➢ Steps and tools in the RMF process

Tuesday, April 16 8:00am - 8:45am
U.S. Secrets Under Siege from Nation- State Hackers, Spies
Mark Kelton, Former Dep. Dir. , National Clandestine Service & CI, CIA

It’s alarming, but no exaggeration, to say the nation is facing the most challenging and significant foreign intelligence entity threat in its history. The foreign spying threat is increasing in both scale and sophistication. Today’s spy threat includes both cyber operations and influence activities, in addition to traditional spying by nations such as China and Russia. Every day U.S. government and defense contractors are targeted by nation-state actors for espionage and theft, resulting in huge losses of national security information and technology secrets. Staying ahead of the threat requires constant vigilance.

You Will Learn:
➢ How to defend against growing threats
➢ Countermeasures to protect secrets
➢ Current exploitation methods being used


Tuesday, April 16 8:45am - 9:30am
DoD Security Program Policy Update
Garry P. Reid, Director for Defense Intelligence, DoD Intelligence and Security, OUSD

The rapid and substantive changes in the nation’s security program have major impacts on the way security professionals implement and plan for these requirements. Within the Department of Defense the schedules for implementation of various elements of these requirements as well as new policies and procedures are included in the mission of the Director of Defense Intelligence ( DoD Intelligence and Security). The mission includes collaboratively developing innovative
methods for assessing risk in the workforce and crafting mitigation strategies to protect people, information and programs from insider and outsider threats.

You Will Learn:
➢ New DoD security initiative
➢ Policy plans and phased implementation
➢ Key challenges ahead

Tuesday, April 16 9:50am - 10:50 am
Security Clearance Program Transition: What to Expect
Charles Phalen, Director, NBIB
Perry Russell-Hunter, Director, DOHA

The National Background Investigations Bureau (NBIB) is in the midst of planning to transition their facilities, workloads and 2,000 employees to the Defense Security Service by Oct. 1, 2019, pending a presidential executive order. The consolidation will help ensure the continuing progress being made to reduce the security clearance backlog. Several transformation initiatives are in the works including new initiatives to implement continuous evaluation, reducing the need for periodic reinvestigations.

You Will Learn:
➢ Current reforms underway and what they mean to you
➢ Best practices to resolve clearance problems
➢ Plans to alleviate the clearance backlog


Tuesday, April 16 11:50am - 12:50pm
Insider Threat Prevention, Detection, Mitigation and Deterrence
Dr. Michael Gelles, Managing Director, Deloitte Consulting

Organizations continue to face a variety of insider threats, as demonstrated by a string of high profile cases where employees have used their knowledge and access to physical and/or information systems to cause significant damage. These cases highlight vulnerabilities and underscore a historical perception that insider threat mitigation is predominately a cyber-security challenge, and categorized as a strictly information technology responsibility. This approach unfortunately can leave your organization vulnerable to existing and emerging insider threats. Effective risk mitigation requires a different approach where insider threats are addressed as part of a holistic and risk-based program.

You Will Learn:
➢ Analysis of behavioral indicators
➢ Elements of effective insider threat program


Tuesday, April 16 1:30pm - 2:45pm
Track I — CUI Compliance: How to Get It Right
Mark Riddle, Senior Program Analyst Information Security Oversight Office

Classified information usually gets all the attention, but “Controlled, Unclassified Information” or CUI addresses the way controlled information is marked and disseminated in non-classified documents. The CUI Program addresses the current inefficient and confusing patchwork of over 100 agency- specific policies throughout the executive branch that lead to inconsistent marking and safeguarding as well as restrictive dissemination policies. This workshop will help you get out in front of this compliance issue and develop a baseline of knowledge to create a plan to properly protect controlled, unclassified information.

You Will Learn:
➢ Develop a CUI compliance plan
➢ Special marking and handling requirements
➢ CUI milestones and timeline


Tuesday, April 16 1:30pm - 2:45pm
Track II — Assessing Your Insider Threat Program
Daniel McGarvey, Sr. Principal Bus. Process Analyst Alion Science & Technology

The Director of National Intelligence’s (DNI) “National Insider Threat Task Force” (NITTF) has issued their maturity framework to help NISP program managers ensure their insider threat programs meet certain baseline criteria. Six areas of focus within the maturity framework include: Senior Official/Insider Threat Program Leadership; Program Personnel; Employee Training and Awareness; Access to Information; Monitoring User Activity; and Information Integration, Analysis, & Response. This workshop provides a benchmark against which your organization can evaluate the capability of its insider threat program and set goals and priorities for improvement.

You Will Learn:
➢ Steps to building an insider threat program
➢ How to gain buy-in from key stakeholders
➢ Lessons learned from the experts


Tuesday, April 16 3:05pm - 4:20pm
Track I —DSS Industrial Security Program Issues and Answers
Gus E. Green, Director, Industrial Security, Defense Security Service

Ongoing changes in the National Industrial Security Program mean that FSOs will have more compliance issues to contend with in 2019. DSS vulnerability assessments have broadened their scope

to include insider threat programs and new information system security mandates. Keeping up with changing requirements and knowing where potential problems lie is critical to avoid security compliance issues and safeguard classified information. This interactive Q&A session will guide you through the compliance issues you face in meeting NISPOM requirements. You’ll also find out what red flags IS reps are encountering during their contractor assessment visits.

What You'll Learn:
➢ Hands-on advice for keeping your program in compliance
➢ Industrial security program initiatives for 2019
➢ How to achieve a superior security rating

Tuesday, April 16 3:05pm - 4:20pm
Track II — Preparing for an Active Shooter Emergency in the Workplace
Capt. Douglas Watson, Winchester Police Dept. SWAT Team Coordinator

According to a recent FBI study, nearly half of all active shooter situations happen in the workplace. While it’s never pleasant to think about these things, it is imperative that all businesses and organizations have an emergency action plan (EAP) in place. An EAP not only outlines the responsibilities and what to do in a high- stress situation, but also results in faster response times and gives employees a level of security because they know what to do and how to respond. This workshop will help you prepare for a worst-case scenario at your facility or organization.

You Will Learn:
➢ Ways to prevent and survive an attack
➢ Key elements of an action plan
➢ Best practices for success


Wednesday, April 17 8:00am - 8:45am
Chinese Espionage: Growing Risks to U.S. Defense Companies
John Brown, Assistant Director FBI, Counterintelligence Division
Matt Gorham, Assistant Director FBI, Cyber Division

Chinese economic espionage as well as efforts to steal U.S. research and technology amount to the most severe counterintelligence threat facing the United States today, according to the FBI. In fact, China was involved in 90% of all economic espionage cases handled by the Department of Justice over the last seven years. Counterintelligence officials believe China’s espionage activity has been increasing over the past few years and see no decline in the foreseeable future.

You Will Learn:
➢ Latest trends in China’s spying activities
➢ What (and who) is being targeted
➢ Effective and practical countermeasures


Wednesday, April 17 8:45am - 9:30am
Low-Tech Threats: Protecting the People Side of Security
Ryan Kalember, Sr. VP of Cybersecurity Strategy Proofpoint, Inc.

Low-tech threats often lead to high-profile breaches. Many of the most recent, notable cyber attacks were not caused by high-tech espionage. Rather, they were the product of low-tech social engineering targeting the most vulnerable aspect of security — people. For the foreseeable future, low-tech social engineering hacking will continue to be a dominant cyber risk. If anything, it is likely to proliferate across growing and emerging technology platforms – mobile and other Internet-enabled devices (Internet of Things) and social media. This session focuses on everyday hacks and insider threats that, while simple in nature, actually add up to the most significant losses.

You Will Learn:
➢ Common techniques and how to prevent an attack
➢ How to defend against common low-tech attacks


Wednesday, April 17 9:50am - 10:35am
Annual State of the National Industrial Security Program
Mark Bradley, Director, Information Security Oversight Office

The National Industrial Security Program (NISP) is undergoing significant changes in several key areas that will dictate future requirements for the protection of classified and sensitive unclassified information. The Information Security Oversight Office (ISOO), which oversees the government-wide security classification system and the National Industrial Security Program, is at the forefront of these efforts. As changes to industrial security policy advance, security practitioners can take a number of steps now to address changing requirements and stay ahead of coming reforms. This timely presentation will bring you up to speed on key areas of government security that will affect the way you do your job.

Key Issues:
➢ Understand changing security requirements
➢ NISPOM revision and update
➢ What’s on the NISPPAC agenda for 2019

Wednesday, April 17 10:35am - 11:35am
Showing How Security Is a Value-Add to Your Organization
Mitchell Lawrence, National Security Training Institute; CEO, Lawrence Solutions

The role of security professionals has become increasingly complex—and is likely to become even more complicated in the foreseeable future. The biggest challenge security teams face in their organization is one of perception and how to communicate value. Effectively communicating value to your stakeholders is critical for your organization to achieve its objectives, whether it’s to convince management to increase security funding
or change corporate culture to minimize costly, security- robbing behaviors. This session will show you how to create, communicate and achieve value in your role and at your organization.

You Will Learn:
➢ Understand the business case for security
➢ How to create and communicate value
➢ Showcase security’s positive impact