12

R MAR 1 - Security Awareness Training & Education Programs ... · 1 attack vector for cybercriminals. These attacks are not only becom-ing more common against defense contractors

  • Upload
    hadang

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

RegisteR by

MAR 1and

SAVE$50!

MAR 1

SAVE$50!

Security 360° — New Threats,Challenges, Solutions

“I definitely got my money’s worth and thoroughly enjoyed the forum. The information and topics are always timely and informative. This is an event all security professionals should attend.”

Jeff Caddy MarkLogic Corporation2

GAIN KNOWLEDGE,

INSIGHTS AND

EXPERTISE

GAIN KNOWLEDGE,

INSIGHTS AND

EXPERTISE

There are big changes taking place in the National Industrial Security Program and NOW is the time to prepare for what lies ahead. From security clearance reforms and insider threat initiatives to the transition from JPAS to DISS and the new Risk Management Framework, there are a host of new challenges that you have to contend with.

To keep pace, your security program must evolve while at the same time countering a growing array of threats — both inside and outside — as corporate and government secrets become more vulnerable than ever. This is a critical time for government security and you cannot afford to be sidelined. Prepare yourself and your security team for all the challenges you’ll face in 2018. Get the training you need to advance your career at NSI’s IMPACT ’18 on April 30-May 2 at the Westfields Marriott in Chantilly, VA. IMPACT ’18 will provide you with a front-row seat for the most important discussions on the changing security landscape, featuring some of the most prominent government and industry leaders.

360-Degree Approach to SecurityAt IMPACT ’18, you’ll gain a comprehensive, 360-degree view of changing security threats, new compliance strategies and best-in-class solutions. Led by a top-flight faculty of speakers and trainers, IMPACT ’18 features an impres-sive line-up of security threat briefings, training workshops, case studies and practical take-home tools to improve your security program.

Whether you’re new to security or a seasoned practitioner, you’re guaranteed to get real-world information you can apply immediately.

Learn the How-to at IMPACT Join the best minds in government and industry security for three innovative days at NSI’s 33rd An-nual IMPACT ’18 Seminar and Expo on April 30-May 2 at the Westfields Marriott in Chantilly, VA.

Expert presentations, group discussions, case stud-ies, and practical workshops look beyond the sur-face, giving you real and proven solutions that will work in your organization and prepare you for the security challenges ahead.

Whether you’re new to the profession or an industry veteran, there’s no better training opportunity than IMPACT to equip you with the skills and resources needed to make you indispensable at your job.

Informative Sessions, PracticalWorkshops and NetworkingGot questions about the revisions to the NISP Operating Manual, Insider Threat Program Requirements, Security Clearance Processing Issues, and Classified Information Systems Security? Get answers at NSI IMPACT ’18.

Learn everything you need-to-know from over 21 leading government and industry security experts at IMPACT ’18 — the one seminar you and your security team can’t afford to miss this year.

FREE BONUS WORKSHOP:Pre-Seminar DISS TrainingSunday, April 29, 2:00 pm — 5:00 pm

Open to seminar attendees only, this three-hour bonus workshop will help you to successfully navigate the transition to the new Defense Infor-mation System for Security (DISS). This practical training session provides a hands-on demonstra-tion of the new clearance data system that replaces JPAS. This complimentary workshop is available to three-day registrants only.

Your Once-a-Year Opportunity to Recharge, Refocus and Re-Energize

Why does the security community look for-ward to NSI IMPACT so eagerly every year?

Agenda. The agenda is targeted to your needs. IMPACT 2018 is programmed by security professionals who know the respon-sibilities of your job and the kind of pressures you face. They organize the schedule to make effective use of your valuable — and limited — time by focusing on the issues you face both day-to-day and long-term.

Focus. The participants are your peers. IMPACT 2018 draws its audience exclusively from government and industry security man-agers and professionals — the people who are doing the same job you’re doing… the people you want to meet and share with.

Environment. Why get lost in a giant convention center or wait in long lines after a session to meet the speaker? IMPACT 2018 offers small, more intimate sessions that bring you closer to the action and the speakers as well as your peers.

Valuable Take-Home Resources

Every IMPACT 2018 registrant goes home with a comprehensive binder of seminar ma-terials and handouts and a DVD containing

the 2018 Edition of NSI’s Refer-ence Library.

This remark-able DVD is packed with articles, white papers, check-lists, glossaries,

reports, statutes, executive orders, manuals, surveys, and primary sources. It’s the most comprehensive collection of security-related information available, and it’s all organized in a user-friendly format in categories that are meaningful to security professionals. If you ever need to write policies, prepare reports, plan strategy, forecast trends, or justify proce-dures… you’ll appreciate having all this infor-mation at your fingertips.

We also will update you after the conference by e-mail with additional session handouts and presentations as they become available.

Security Awareness Fair and Expo

Your registration includes admission to NSI’s 2018 Security Awareness Fair and Expo. The major government security agencies will be there offering a broad array of complimentary materials and media through their security outreach programs. These complimentary re-sources are ready to take home to implement in your organization.

NSI’s exclusive vendor expo brings you up-close to the hottest technologies, and products de-signed to help you handle today’s ever-changing security challenges.

DCIS

NSA

FBI

3

Champagne ReceptionMONDAY, APRIL 30, 5:00 - 6:30PMPlease join us for complimentary hors d’oeuvres and champagne. On Monday come meet your colleagues in a fun and relaxed setting, making contacts that will enhance your conference experience — and extend beyond.

A Sampling of the2018 Exhibitors

Reasons to Attend

1. Top SpeakersAll speakers at IMPACT 2018 are renowned for the topic they will address. Expert instruc-tors from government and industry will arm you with the skills and solutions necessary to successfully implement changing security requirements.

2. Targeted TopicsParticipate in top-notch education. IMPACT 2018 is packed with sessions and workshops targeted to your specific needs so your time is always spent productively.

3. It’s What You Asked forWe extensively surveyed hundreds of top secu-rity professionals to deliver the tailored solu-tions to the most important challenges you face now… and throughout 2018.

4. Come Away with SolutionsNo other conference reveals proven tactics to guarantee enhanced security solutions you can take back with you and implement. You’ll get the right balance between government and in-dustry security issues, and sessions for beginners through veteran security practitioners.

5. Practical, In-Depth WorkshopsInteractive workshops provide extended training in critical security areas like NISP compliance; communication skills; clearance processing; counterintelligence; cyber security; insider threat programs; security awareness; vulnerability assessment; security case studies, and real-world lessons learned.

6. Professional DevelopmentYou’ll get career-building strategies and a personalized road map for your professional growth while participating in sessions that you need to advance to the next level.

IMPACT 2018 Extras!IMPACT 2018 Extras!

CI Centre

ISOO

DSS

“As the FSO of a small business; this forum provides an excellent source of information. I found the format and presenters to be very informative.”

Robert Lando Advantage Consulting

Top National Security Threats to Watch in 2018Lt. Gen. Robert P. Ashley, Jr. Director,Defense Intelligence Agency

The U.S. will face a complex, global intelligence threat environment in 2018 with the targeting of national security information from a host of adversaries. The information technology revolution has allowed even smaller nations—and even terrorist groups—to compete in the intelligence game. The insider threat posed by trusted insiders will remain a significant threat in 2018 and beyond. Developing and implement-ing effective mitigation strategies for these issues is critical to reducing the threat to an acceptable level. The threats we face as a nation have never been greater or more diverse and the expectations placed on security professionals have never been higher. In this scene-setting keynote address, DIA Director Lt. General Robert Ashley, will discuss the changing landscape of threats to American security and offer recommendations for meaningful protections against growing risks. He will examine the clear and present dangers to national security and actionable strategies to counter them.

Monday

April 30Monday

April 30Educational

SessionsEducational

Sessions

4

Monday, April 30 8:45am-9:30am

Combating Economic Espionage: Staying Ahead of the ThreatE.W. “Bill” Priestep, Asst. Director,FBI Counterintelligence Division

As industry has shifted from the physical to the digital, so too has the world of economic espionage. It’s increasingly a digital battle-ground. From foreign intelligence services to company insiders, gov-ernment and corporate secrets are at risk from a number of threats on a number of fronts. Officials and experts believe more foreign spies than ever are targeting U.S. secrets. While the U.S. focus has been primarily on protecting mili-tary and state secrets from spying, a new battle is being waged in which corporate computers and the valuable intellectual property they hold have become as much a target of foreign governments as those run by the Pentagon. Counterintelligence experts expect no decline in foreign demand for sensitive U.S. technologies in 2018 and beyond.

You Will Learn:

Vital intelligence about latest trends in espionage

Espionage actors, tactics and targets

Effective and practical countermeasures

Monday, April 30 10:30am-11:30am

Phishing, Social Engineering: Inside the New AttacksIra Winkler, PresidentSecure Mentem

Phishing and Social Engineering attacks have now become the no. 1 attack vector for cybercriminals. These attacks are not only becom-ing more common against defense contractors and government agen-cies, but they’re also increasingly sophisticated. With hackers devising ever-more clever methods for fool-ing your employees into handing over valuable data, security profes-sionals must redouble their efforts to stay one step ahead of cyber crimi-nals. With the understanding that technology alone cannot fix social engineering issues, organizations should know how to identify cur-rent social engineering attacks, what to do if an attack occurs, what to do when someone is let in, why mali-cious people use these types of at-tacks and the best ways of commu-nicating risk to your organization. This session will provide a deep dive into the latest phishing trends and social engineering threats. You Will Learn:

Real life examples of socially engineered attacks

How to mobilize your em-ployees as first line of defense

Proactive measures to fend off attacks

Monday, April 30 11:30am-12:30pm

DSS: Leading a 360° Security TransitionDaniel E. Payne, Director, Defense Security Service

The world is rapidly changing and DSS is changing too. Where the agency once concentrated on schedule-driven National Industrial Security Program Operating Manual (NISPOM) compliance, DSS is now moving to an intelligence-led, asset-focused, and threat-driven approach to industrial security over-sight. This comes at a time when DSS is poised to take on a bigger role in security clearance background investigations. Find out what’s in store for DSS (and FSOs) in 2018, and how it will impact the changing compliance requirements of the Na-tional Industrial Security Program. In this annual state of the DSS brief-ing, you’ll get a chance to hear about important plans and priorities that will affect the way DSS continues to accomplish its industrial security mission. Highlights include such vital topics as: security vulnerability assessments; insider threat program requirements; security clearance processing time lines; CI reporting; FOCI and critical NISPOM revi-sions. You Will Learn:

Security policy and pro-gram initiatives for 2018

New NISPOM imple-mentation requirements

Keynote Address:

Ellen BertuccelliNorthrop Grumman

Track 1 — Rethinking Your Approach to Security Awareness TrainingSteven Rients, Mgr., Security Training, BAE Systems

Security awareness training is a reliable way to reduce the insider threat and alter employee behaviors. It’s not a silver bullet, but it will help re-duce organizational risk, which-—after all — should always be the goal of security defenses. If you’ve come to the realization that your security awareness program just isn’t doing its job, it may be time to rethink your approach. Changing employee behavior to do the right thing is one of the key factors for an organization to improve their security posture. An effec-tive approach is to provide targeted awareness training, where employees at every level — from the top down — understand the potential negative impact that their actions can have on their employer and how it relates to their day to day activities. You Will Learn:

Keys to make awareness training relevant and motivational

How to fine-tune your security awareness program

Ways to empower your employees to practice good security

5

Monday, April 30 2:00pm-3:15pm

Track 2 — Defense Information System for Security: Issues and Answers Quinton Wilkes, Corp. Security Mgr., L-3 ComNick Levasseur, Dep. Prog. Mgr. for DISS, DMDC

The Pentagon’s new Defense Information System for Security (DISS), promises to transform how personnel security, and clearance suitability data are collected, reviewed, and shared. It replaces the legacy Joint Personnel Adjudication System (JPAS) system with a more secure, end-to-end IT system. DISS is designed to meet several requirements of security clearance reform efforts, including reciprocity, automated record checks, and continuous evaluation. DISS is undergoing a phased deployment and is set to launch for Industry in May 2018. Once DISS has been fully deployed, there will be a 90-day period before JPAS is shut down and DISS becomes the official system of record. Successfully navigating your way around the DISS will not come without some growing pains. This comprehensive workshop will explore problems and resolutions and provide an extended opportunity for you to have all of your questions answered.

You Will Learn:

Rules of the road to navigate the new DISS

Steps to minimize problems and get help

How to obtain timely access to automated records

Monday, April 30 2:00pm-3:15pm

Afternoon

WorkshopsAfternoon

Workshops

Monday, April 30 3:35pm-4:50pm

Track 2 — CUI Compliance: Bridging the GapBetween Govt. and Industry Devin Casey, Program Analyst, ISOOVicki Michetti, Dir., DIB Cybersecurity Program, DoD

The CUI Program is a Government-wide program that standardizes the way the executive branch manages unclassified information that requires safeguarding or dissemination controls required by law, Federal regulation, and Government-wide policy. This Program replaces existing agency programs like For Official Use Only (FOUO), Sensitive But Unclassified (SBU), Official Use Only (OUO), and others. The CUI Program addresses the current inefficient and confusing patchwork of over 100 agency-specific policies throughout the executive branch that lead to inconsistent marking and safeguarding as well as restrictive dissemination policies. Companies supporting the defense industry are scrambling to understand how to classify and protect unclassified information. This workshop will help you get out in front of this compliance issue and develop a baseline of knowledge to create a plan to properly protect controlled, unclassified information.

You Will Learn:

Develop a CUI compliance plan

Special marking and handling requirements

Monday, April 30 3:35pm-4:50pm

Track 1 — Cybersecurity 101: What You Absolutely Must Know Robby Ann Carter, National Security Training Institute

Organizations need security professionals at all levels—not just in the IT department—who understand the technical, legal, and compliance aspects of cybersecurity, as well as how to safeguard classified and sensitive information that increasingly resides on government and corporate networks. Acquiring a basic cybersecurity literacy should be high on your list of things to learn in 2018. In this workshop, you’ll be introduced to the variety of cyber threats that exists within the cleared defense contractor environment. It will include an outline of the role of the security professional in protecting information in the cyber environment and an overview of the specific IT issues/tasks you are responsible for complying with. You’ll also gain a basic knowledge of information systems and their security requirements along with the tools you need to perform your job.

You Will Learn:

Fundamental cybersecurity concepts and principles

Identify required physical, personnel, and procedural security

Security countermeasures to minimize vulnerabilities

Tuesday, May 1 8:00am-8:45am

Assessing the Risk to Classified Information in a Changing WorldWilliam Evanina, National CI ExecutiveDirector, NCSC

It’s alarming, but no exaggeration, to say the nation is facing the most challenging and significant foreign intelligence entity threat in its history. The foreign spying threat is increasing in both scale and sophistication, according to intelligence experts. Meanwhile, the insider threat is growing, with more than half (53%) of organiza-tions confirming insider attacks in the past 12 months and 27% stat-ing they have become more fre-quent, according to a new study. Today’s spy threat includes both cyber operations and influence activities, in addition to traditional spying by nations such as China and Russia. Every day U.S. gov-ernment and defense contractors are targeted by nation-state actors for espionage and theft, resulting in huge losses of national security information and technology se-crets. Staying ahead of the threat requires constant vigilance. In this presentation from the nation’s top counterintelligence official, you’ll gain valuable advice on how your organization can better prepare for, defend against, and respond to the changing security threat landscape. You Will Learn:

CI Initiatives to counter the threat

Countermeasures to protect secrets

Current exploitation

methods being used

Tuesday, May 1 9:50am-10:50am

Security Clearance Reform: What You Need to KnowCharles Phalen, Director, NBIBPerry Russell-Hunter, Director, DOHA

There are seismic changes tak-ing place in the security clearance regime. The National Background Investigations Bureau is barely a year old, but already the agency charged with background checks govern-mentwide is losing the bulk of its responsibilities to the U.S. Depart-ment of Defense, and contractors are sure to feel the fallout. President Trump ensured the shakeup when he signed the National Defense Authorization Act for Fiscal Year 2018. Section 925 of that legislation requires the Defense Security Ser-vice to eventually take over all DoD-related background checks. Amidst this backdrop, personnel security investigation and adjudication are being strengthened to ensure that clearance processing addresses in-sider threats. In this informative Q&A panel session, you’ll hear from two of the key government players involved in the security clearance process and ongoing reform efforts.

You Will Learn:

Current reforms underway and what they mean to you

Best practices to resolve clearance problems

Plans to alleviate the clear-ance backlog

Tuesday

May 1Tuesday

May 1Educational

SessionsEducational

Sessions

“Outstanding! Kudos to all presenters and staff. The materials distributed will be very beneficial in enhancing my organization’s secu-rity program.” Karen Wilkins

Booz Allen Hamilton 6

Tuesday, May 1 8:45am-9:30am

Cybersecurity: Pro-active Defenses for Today’s Threats Curtis W. Dukes, Exec. VPCenter for Internet Security

Cyber threats are growing more complex, and the stakes are higher than ever. The bad guys are bigger, badder and better organized than ever. Cyberspace has become the new battlefield for modern warfare, providing state-sponsored malicious actors with an inexpensive, highly effective and globally accessible plat-form to steal sensitive data and wreak havoc. In the year ahead, organiza-tions of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact cybersecurity threats. While your organization utilizes more mo-bile IoT and emerging technologies, attackers simply focus on more ways to exploit them. In this presentation, Curtis Dukes, the former Director of Information Assurance at NSA will examine the constantly changing cybersecurity threat landscape includ-ing proven methods to stop a new era of cyber attacks.

You Will Learn:

Biggest cyber security threats in 2018

Attack vectors and how to mitigate them

Cyber threats every em-ployee should understand

Tuesday, May 1 10:50am-11:50pm

How Does Your Insider Threat Program Stack Up?Dennis Keith, VP, Global Security, Harris Corp.Keith Minard, Asst. Dir. NISP Policy & Admin., DSS

An insider threat is one of the great-est dangers you can face at your company or agency. Yet, knowing whether your insider threat program is strong enough to mitigate and manage so many evolving threats is difficult to determine, especially if you don’t have any successful mod-els to compare your own program against. Although technology can play an important role in identify-ing potential insider threats, it is not just an IT issue. It takes an enterprise-wide approach — includ-ing many human elements — to plan for, prevent, detect, respond to and recover from insider threats. Managing insider threat risk should be part of a holistic 360º corporate security program, from both infor-mation security and physical secu-rity perspectives. This session offers a behind-the-scenes look at what it takes to build a successful insider threat program.

You Will Learn:

Identify the steps to building an insider threat

program

How to obtain buy-in from key stakeholders

Afternoon

WorkshopsAfternoon

Workshops

7

Tuesday, May 1 1:30pm-2:45pm Track 1

Track 1 — Navigating the New RiskManagement Framework ProcessKarl Hellman, Asst. Dep. Director, NISP Authorization Office, DSS

Beginning this year, all newly accredited information systems will be re-quired to use the NIST Risk Management Framework system controls. A new DSS Assessment and Authorization (A&A) process is an integral part of RMF and represents a major shift in the way System Security Plans (SSPs) are processed at DSS. This new accreditation process provides a complex challenge to industry through new approaches to system catego-rization, assessment and continuous monitoring. Understanding these requirements along with the RMF process is key to getting your informa-tion systems approved. This timely workshop will help you successfully navigate the requirements of the Risk Management Framework and en-sure that you’re in compliance with the new standards. If your organiza-tion is struggling with getting through the process of obtaining approval of your classified information systems, then this session is for you.

You Will Learn:

How to obtain timely authorizations

Key missteps to avoid

Steps and tools in the RMF process

Tuesday, May 1 3:05pm–4:20pm Track 2

Track 2 — Preparing for an Active Shooter EmergencyPeter J. Lapp, Special Agent, Wash. Field Office Federal Bureau of Investigation

Given today’s ever-changing threat environment, preparing for and training employees to cope with active threats and workplace violence should be a key piece of an organization’s incidence response plan. The FBI’s “Study of Active Shooter Incidents in the United States Between 2000 and 2013” report shows that 160 active shooter incidents occurred in that 14-year period, resulting in 1,043 casualties. Since then, incidents such as the Las Vegas massacre and the Texas church shootings combined to make 2017 the deadliest year of mass shootings in modern U.S. history. It’s a simple truth that today, security man-agers and others need a game plan for dealing with active shooters —including those bent on acts of domestic terrorism. In this workshop, you’ll learn how to compose an action plan and the importance of preparedness which could make all the difference. What You’ll Learn:

Ways to prevent and survive an attack

Lessons learned from previous attacks

Preparedness, response and recovery

Tuesday, May 1 3:05pm–4:20pm Track 1

Track 1 — Inside DSS’ Changing Approach to Industrial Security Gus E. Green, Director, Industrial Security, Defense Security Service

Sweeping changes in the National Industrial Security Program mean that FSOs will have more compliance issues to contend with in 2018. DSS vulner-ability assessments will broaden their scope to include insider threat programs and new information system security mandates. Keeping up with changing requirements and knowing where potential problems lie is critical to avoid security compliance issues and safeguard classified information. Maintaining an effective security program and achieving a “superior” rating should be a key element of your security strategy. This interactive Q&A session features key personnel from the Defense Security Service who will guide you through the compliance issues you face in meeting NISPOM requirements. You’ll also find out what red flags IS reps are encountering during their contractor assessment visits so you can avoid any potential problems in your security program and help you on your path to compliance. What You’ll Learn:

Hands-on advice for keeping your program in compliance

Industrial security program initiatives for 2018

How to achieve security excellence

Tuesday, May 1 1:30pm-2:45pm Track 2

Track 2 — Communications: The Must-Have Skills for Security ProsMitchell Lawrence, Instructor, National Security Training Institute Of all the qualities that a security professional must possess, effective communication is hands down one of the most important. It’s one of those “soft skills” that is critical to both personal and professional suc-cess. As a security professional, much of your work involves interacting with others and putting your best foot forward. How you communicate and get your message across is vital to your success — whether you’re presenting a security proposal to top management, training your staff or conducting security briefings for employees. In this session, you’ll be given practical instruction and guidance on preparing and delivering effective security presentations. This power-packed workshop will stimulate your interest and motivate you to seek new paths to improve your communica-tions skills.

You Will Learn:

How to improve your communications skills

How to gain buy-in for your ideas

Ensure your presentations don’t miss the mark

Wednesday, May 2 8:00am-8:45am

Counterterrorism 2018: Mitigating Domestic and Global ThreatsNational Counterterrorism Center

The terrorist threat to the United States remains persistent and acute. Terror attacks are likely to increase in 2018, as the destruction of the Islamic State’s physical stronghold in Iraq and Syria will strengthen its will to strike out abroad, experts say. The FBI has designated the Islamic State of Iraq and ash-Sham (ISIS) and homegrown violent extremists as the main terrorism threats to the homeland. Given the loss of its safe havens, ISIS has shifted its atten-tion toward cyberspace to recruit, radicalize, and provide guidance and instructions for carrying out attacks. Currently, the FBI is investigating about 1,000 ISIS-related threats across the nation. This timely threat briefing will examine the changing face of terrorism and offer recom-mendations for meaningful protec-tions against growing dangers.

You Will Learn:

Latest intel, strategies to combat terrorism

How terrorists use social media to recruit

Threat forecast for 2018

Wednesday, May 2 10:35am-11:35am

DICE 2018: We’re All in This TogetherRay Semko – The DICE Man

It’s alarming, but no exaggeration, to say the nation is facing the most chal-lenging and significant foreign intelli-gence entity threat in its history. To-day’s adversaries continue to find new ways to operate. They move with speed and agility to evade detection and continually evolve their strate-gies. Attacks have increased, and odds are things will get worse, not better, in the foreseeable future. So, security professionals and employees at all levels must be more vigilant than ever. After all, we’re all in this together. Ray Semko, security expert and creator of the well-known DICE Program, will wrap up IMPACT with a high-energy briefing on the 2018 threat environment and advice to help protect your organization and strengthen your security culture. This security consciousness-raising session will equip you with tools to educate your workforce on the grow-ing threats to national security.

You Will Learn:

Understanding the role of the individual

Why security is more vital than ever

How to go from awareness to action

Wednesday

May 2Wednesday

May 2Educational

SessionsEducational

Sessions

Ellen BertuccelliNorthrop Grumman

“Knowledgeable and passionate pre-senters. Great case studies which made the topics more ‘real’ and useful.”

8

The Psychology of Espionage and Leaking in the Digital AgeStephanie L. Jaros, Project Dir., PERSEREC Office of People Analytics

Technology is turning government and industry — long a safe box for information — into something more like a sieve, unable to contain all its data. As America has shifted from the physical to the digital, so too has the world of espionage. It is a digital battleground. The scope of the threat is only likely to grow as the pace of technology continues to advance making it even harder to suppress leaks of classified informa-tion. As long as there are govern-ment secrets there will always be the risk of leaks–whether inadvertently or purposefully with intent to harm the United States. Understanding the psychology behind those who would commit espionage or leak classified information provides a critical window into the mind-set of a spy or leaker and an invaluable weapon when fighting back.

You Will Learn:

What causes someone to spy or leak?

Warning signs that a per-son might be vulnerable

Proactive measures to reduce the risk

Wednesday, May 2 9:50am-10:35am

State of the NISP: Changes,Challenges and CollaborationMark Bradley, Director, Information Security Oversight Office

The National Industrial Security Program (NISP) is undergoing sig-nificant changes in several key areas that will dictate future requirements for the protection of classified and sensitive unclassified information. The Information Security Oversight Office (ISOO), which oversees the government-wide security clas-sification system and the National Industrial Security Program, is at the forefront of these efforts. As changes to industrial security policy advance, security practitioners can take a num-ber of steps now to address changing requirements and stay ahead of com-ing reforms. This timely presentation will bring you up to speed on key areas of government security that will affect the way you do your job. Among the issues to be examined are: NISPOM re-write, classification management; Insider Threat program requirements; new reporting require-ments; and much more.

You Will Learn:

Understand changing security policies

NISPOM revision and update

What’s on the NISPPAC agenda for 2018

Wednesday, May 2 8:45am-9:30am

Tuesday, May 1 7:00 — 7:50 am. Coffee and Pastry 7:50 — 8:00 am. Opening Remarks 8:00 — 8:45 am. Assessing the Risk to Classified Information in a Changing World William Evanina, National CI Executive Director, NCSC 8:45 — 9:30 am. Cybersecurity: Proactive Defenses for Today’s Threats Curtis W. Dukes, Exec. VP, Center for Internet Security 9:30 — 9:50 am. Refreshment/Networking Break 9:50 — 10:50 am. Security Clearance Reform: What You Need to Know Charles Phalen, Director, NBIB & Perry Russell-Hunter, Director, DOHA 10:50 — 11:50 pm. How Does Your Insider Threat Program Stack Up? Dennis Keith, VP, Global Security, Harris Corp. Keith Minard, Asst. Dir. NISP Policy & Admin., DSS 12:00 — 1:30 pm. Host Networking Luncheon 1:30 — 2:45 pm. Track 1 – Navigating the New Risk Management Framework Process Karl Hellman, Asst. Dep. Director, NISP Authorization Office, DSS Track 2 – Communications: The Must-Have Skills for Security Pros Mitchell Lawrence, Instructor, National Security Training Institute 2:45 — 3:05 pm. Refreshment/Networking Break 3:05 — 4:20 pm. Track 1 – Inside DSS’ Changing Approach to Industrial Security Gus E. Green, Director, Industrial Security, Defense Security Service Track 2 – Preparing for an Active Shooter Emergency Peter J. Lapp, Special Agent, Federal Bureau of Investigation

Monday, April 30 7:00 — 7:50 am. Registration. Coffee and pastry will be served during registration 7:50 — 8:00 am. Welcome and Opening Remarks 8:00 — 8:45 am. Top National Security Threats to Watch in 2018 Lt. Gen. Robert P. Ashley, Jr., Director, Defense Intelligence Agency 8:45 — 9:30 am. Combating Economic Espionage: Staying Ahead of the Threat E.W. “Bill” Priestep, Asst. Director, FBI Counterintelligence Division 9:30 — 10:30 am. Opening of Awareness Fair, Expo and Refreshment Break10:30 — 11:30am. Phishing, Social Engineering: Inside the New Attacks Ira Winkler, President, Secure Mentem 11:30 — 12:30 pm. DSS: Leading a 360° Security Transition Daniel E. Payne, Director, Defense Security Service 12:40 — 2:00 pm. Host Networking Luncheon, Security Awareness Fair and Expo 2:00 — 3:15 pm. Track 1 – Rethinking Your Approach to Security Awareness Training Steven Rients, Mgr., Security Training, BAE Systems Track 2 – Defense Information System for Security: Issues and Answers Quinton Wilkes, L-3 Com & Nick Levasseur, DMDC 3:15 — 3:35 pm. Refreshment Break, Security Awareness Fair and Expo 3:35 — 4:50 pm. Track 1 – Cybersecurity 101: What You Absolutely Must Know Robby Ann Carter, National Security Training Institute Track 2 – CUI Compliance: Bridging the Gap Between Govt. and Industry Devin Casey, ISOO & Vicki Michetti, DIB Cybersecurity Program, DoD

9

Susan SaucierADS, Inc.

“Best seminar I’ve attended yet! Extremely knowledgeable speakers.”

Wednesday, May 2 7:00 — 7:50 am. Coffee and Pastry 7:50 — 8:00 am. Opening Remarks 8:00 — 8:45 am. Counterterrorism 2018: Mitigating Domestic and Global Threats National Counterterrorism Center 8:45 — 9:30 am. The Psychology of Espionage and Leaking in the Digital Age Stephanie L. Jaros, Project Dir., PERSEREC, Office of People Analytics 9:30 — 9:50 am. Refreshment/Networking Break 9:50 — 10:35 am. State of the NISP: Changes, Challenges and Collaboration Mark Bradley, Director, Information Security Oversight Office10:35 — 11:35 am. DICE 2018: We’re All in This Together Ray Semko – The DICE Man 11:35 — 11:45 am. Closing Remarks

At-A-Glance Three Days of

Career-Critical Information

At-A-Glance Three Days of

Career-Critical Information

Seminar Hours Monday, April 30 Registration 7:00 am. – 7:50 am. Conference 7:50 am. – 4:50 pm. Networking Reception 5:00 pm. – 6:30 pm. Tuesday, May 1 Conference 7:50 am. – 4:20 pm. Wednesday, May 2 Conference 7:50 am. – 11:45 am.

Pre-Conference Workshop Sunday, April 29, 2:00 pm. – 5:00 pm.

Security Awareness Fair and Expo Monday, April 30, 9:30 am. – 3:35 pm.

Meeting Attire Attire for the National Security Institute’s Impact Forum and Exhibition is business casual.

Hotel Reservations To reserve your room call Marriott res-ervations at 1-877-212-5752 or reserve your room online at https://aws.passkey.com/event/49559459/owner/13564/home. When calling, please ask for the NSI

IMPACT 2018 rate at the Westfields Marriott in order to receive the dis-counted group rate of $234. The group rate will be available until April 7th or until the group block is sold-out, whichever comes first. Please be aware the room block fills quickly, so we suggest you make your hotel and travel plans early.

The Westfields Marriott is located at 14750 Conference Center Drive, Chantilly, Virginia, 20151. The Westfields Marriott hotel combines sophisticated meeting facilities with elegant hotel accommodations and also features access to the Westfields Signature Fred Couples Golf Club.

Register

early & SaveRegister

early & Save

FOUR EASY WAYS TO REGISTER

1. Register online at: http://nsi.org/impact-2018.html

2. Fax the registration form with payment information to: (508) 507-3631

3. Mail the registration form and payment to: National Security Institute 165 Main St., Ste 215 Medway, MA 02053

4. Call (508) 533-9099

REGISTER EARLY AND SAVE $50Earlybird Discount A special rate of $895 is being offered to all attendees whose payment is received by March 1, 2018. The registration fee covers all program materials, admission to the pre-conference workshop, host reception, luncheons and refreshment breaks.

Regular RateThe fee for registrations received after March 1, 2018 is $945. All registrations must be accompanied by a check made payable to the National Security Institute, a Purchase Order or Government Train-ing Form. You may also charge your MasterCard, Visa or American Express.

Cancellation PolicyCancellations must be made in writing to the National Security Institute. Refunds for cancellations received on or before April 2nd will be subject to a $50 administrative fee. Cancellations received after April 2, 2018 will forfeit the conference fee. Substitutions may be made at any time by calling NSI.

10

About NSIFounded in 1985, the National Security Institute (NSI) is a veteran-owned publisher and educator serving the needs of security professionals in government, the corporate sector, and defense contracting. We publish newsletters and special reports, we sponsor seminars and conferences, and we offer government and industry security professionals a FREE e-newsletter, delivering national and international news pertinent to the security profession. We produce the industry’s most respected and cost-effective security awareness services. Visit us at http://nsi.org.

Registration FormRegistration Form

RegisteR byMAR 1andSAVE$50!

MAR 1SAVE$50!

Please print, type or attach your business card and forward to: National Security Institute, 165 Main Street, Suite 215, Medway, MA 02053. Tel: 508-533-9099 Fax: 508-507-3631. Photocopy for additional registrations.

Registration Fees Rcvd. by 3/1/18 After 3/1/18

3-day Registration $895 $945

2-day Registration $845 $845

1-day Registration $595 $595

Name: Title:

Company/Agency:

Address:

City: State: Zip:

Phone: E-mail:

Priority Registration Form

Method of Payment Check Enclosed Purchase Order/1556 Form EnclosedCharge to Credit Card: VISA Mastercard AMEX

Card No. Exp. Date

Name on Card

Authorized Signature

Who Should Attend IMPACT 2018… Facility Security Officers Information System Security Professionals Government Personnel Security Managers Corporate Security Directors Information Security Managers Classification Management Specialists Counterintelligence Professionals Security Education and Training Specialists Government Agency Security Specialists Classified Material Control Specialists OPSEC Managers Security Adjudicators DISS Account Managers

impact 2018

11

Enroll me in the JPAS Transition to the Defense Information System for Security (DISS) Workshop

Sunday, April 29, 2:00 - 5:00 pm Note: This complimentary workshop is available to all three-day Impact registrants.

Gold Sponsors

Security 360º - New Threats, Challenges, SolutionsChantilly, Virginia, April 30 - May 2, 2018

You’ll get up to date on the hottest security issues: security clearances, DISS, NISP, classified systems security, economic espionage, cyber security threats, security awareness, terrorism, insider threats.

You’ll return to your office with an entire reference library that will put the information you need at your fingertips: binder, DVD, follow-up e-mails.

You’ll gain networking contacts you can call on all through the year: make friends; get to know the major figures in your profession.

You’ll learn about key developments of the past year — and what to expect in the year ahead — in a relaxed atmosphere conducive to education.

You’ll be prepared to handle the transition of JPAS to DISS, with four hours of in-depth training offered.

You’ll learn security’s latest best practices… and return to your office prepared to implement solutions before they are needed and eliminate security vulnerabilities before they happen.

You’ll spend 3 days with people who understand and care about what you do every day because they do it, too!

Why IMPACT 2018 Will be Your Most Critical Professional Experience of the Year

165 Main Street, Suite 215Medway, MA 02053

“I’ve attended NCMS, ISAC, etc. — Impact is by far the best! Best speakers, best topics, best organization. I like the smaller, more accessible networking environment!”

12

12 Special Features of IMPACT 2018 In-depth, practical workshops, not PowerPoint snooze-a-thons!

Briefings with important heads of government agencies

2018 Edition of NSI’s Reference Data Library on DVD

Sessions targeted to personal and professional development, will help you become better at your job

Comprehensive pre-conference JPAS Transition to the Defense Information System for Security (DISS) workshop

NSI’s 2018 Security Awareness Fair and Expo

Reception, luncheons, and refreshment breaks with your colleagues

Outstanding speakers and session presenters

Post-conference session updates via e-mail

Sessions new for 2018 to address the hottest security topics

Excellent, business-class hotel, minutes from major airports

Take-away binder of conference program materials

First ClassPresort

US PostagePAID

N. Reading, MAPermit No. 140

Linda Ramsey BAE Systems