AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in...

12

Transcript of AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in...

Page 1: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security
Page 2: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

REGISTER BY

MARCH 1AND

SAVE$50!

MARCH 1

SAVE$50!

IMPACT 2008: A New Roadmap for Security

“Theconferencewaswellworthattending.TheJPAS/JCAVS&e-QIPtrainingalonewasworththecost.”

JeffreyQualkenbush,EG&GTechnicalServices2

Be Informed

Be Aware

Be Prepared

Be Informed

Be Aware

Be Prepared

Security clearance processing, JPAS, espionage, cyberterrorism, security awareness, mobile device threats, AIS security, OPSEC, insider threats and changing NISPOM requirements.

Welcome to the world of government and defense contractor security for 2008.

Organizations today must anticipate and plan for threats from within and without — whether they be from employees who deliberately or unwittingly leak sensitive data, foreign intelligence agents targeting U.S. secrets, assaults on government and corporate computer systems or from global terrorists waging jihad against Americans.

While there is no security system in the world that could protect against all these threats, there is plenty security managers can do to lessen risk and protect themselves against economic espionage, cyber-terror-ism, social engineering, illicit technology transfer, information theft, computer crime, and classified information loss.

Learn strategies and best practices for solving daily challenges.

Join the best minds in government and industry security for three innovative days at NSI’s 23rd Annual IMPACT ’08 Confer-ence: “A New Roadmap for Security” at the HiltonTysons Corner, McLean, Virginia. With another outstanding agenda of the latest issues and innovative solutions, the conference offers you the exposure to top experts and cutting-edge techniques for securing critical information.

Intensive JPAS Workshops, Solution Clinic and Help Desk

Got questions about JPAS, JCAVS and e-Qip? Get answers at NSI IMPACT ’08!

Learn everything you need to know about the Joint Personnel Security Adjudication System (JPAS) from government and indus-try experts in over seven hours of hands-on training and instruction.

Help Desk LIVE!This is where you go to get your JPAS ques-tions answered — one-on-one — directly from the JPAS instructors themselves. Led by JPAS Industry Steering Committee members Help Desk LIVE is open all three days during IMPACT ’08. This is an incredible opportu-nity to get the JPAS help you need from the people who really have the answers and it’s free and open to all conference attendees.

JPAS Solution ClinicThis general session is part of the regular conference program and will provide en-hanced understanding and best practices for using JPAS, JCAVS and e-QIP.

Pre-Conference JPAS Boot CampSunday, April 6 2:00 pm — 5:00 pmThis workshop will review the basics of JPAS and its related interfaces. Participants will have the opportunity to build skills and de-velop a working knowledge of the system.

Post-Conference Advanced User TrainingWednesday, April 9 1:00 pm — 4:00 pmThis workshop builds on the previous JPAS sessions and helps users maximize their abil-ity to navigate the system and take their skills to the next level.

Your once-a-year opportunity to recharge, refocus and reenergize

Why does the security community look for-ward to NSI IMPACT so eagerly every year?

Agenda. The agenda is targeted to your needs. IMPACT 2008 is programmed by security professionals who know the respon-sibilities of your job and the kind of pressures you face. They organize the schedule to make effective use of your valuable — and limited — time by focusing on the issues you face both day-to-day and long-term.

Focus. The participants are your peers. IMPACT 2008 draws its audience exclusively from government and industry security man-agers and professionals — the people who are doing the same job you’re doing… the people you want to meet and share with.

Environment. Why get lost in a giant convention center or wait in long lines after a session to meet the speaker? IMPACT 2008 offers small, more intimate sessions that bring you closer to the experts and the speakers as well as your peers.

Page 3: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

IMPACT 2008 Extras!IMPACT 2008 Extras!

Valuable Take-Home Resources

Every IMPACT 2008 registrant goes home with a comprehensive binder of conference materials and handouts and a CD containing

the 2008 Edition of NSI’s Reference Library.

This remarkable CD is packed with articles, white papers, checklists,

glossaries, reports, statutes, executive orders, manuals, surveys, and primary sources. It is the most comprehensive collection of security-re-lated information available, and it’s all organized in a user-friendly format in categories that are meaningful to security professionals. If you ever need to write policies, prepare reports, plan strategy, forecast trends, or justify procedures… you’ll appreciate having all this information at your fingertips.

We also will update you after the conference by e-mail with additional session handouts and presentations as they become available.

Security Awareness Fair and Expo

Your registration includes admission to NSI’s 2008 Security Awareness Fair and Expo. The major government security agencies will be there offering a broad array of complementary materials and media through their security-outreach programs. These complementary resources are ready to take back home with you to implement at your company or agency.

NSI’s exclusive vendor expo brings you up-close to the hottest technologies, and products designed to help you handle ever-changing security challenges.

DCIS

DTRA

NSA

DSS

DIA

FBI

DOE

NAVYNRO

3

Welcome ReceptionMONDAY, APRIL 7, 5:00-6:30PM

The Attendee Welcome Reception is one of the social highlights of the conference. On Monday come meet your colleagues in a fun and relaxed setting, making contacts that will enhance your conference experi-ence — and extend beyond.

A sampling of the2008 Exhibitors

Reasons to Attend

1. Top speakersEvery speaker at IMPACT 2008 is renowned for the topic they will address. Expert instruc-tors from government and industry will arm you with the skills and solutions necessary to successfully implement changing NISP requirements.

2. Targeted TopicsParticipate in top-notch education. IMPACT 2008 is packed with sessions and workshops targeted to your specific needs so your time is always spent productively.

3. It’s What You Asked forWe extensively surveyed hundreds of top secu-rity professionals to deliver the exact solutions to the most important challenges you face right now… and well into 2008.

4. Come away with SolutionsNo other conference reveals proven tactics to guarantee enhanced security solutions you can take back with you and implement. You’ll get the right balance between government and industry security issues, sessions for beginners through veteran security practitioners.

5. Optional, In-Depth WorkshopsInteractive workshops provide extended train-ing in critical security areas like JPAS; AIS security; counterintelligence awareness; inter-national security; OPSEC; physical security; vulnerability assessment; security case studies, and valued lessons learned.

6. Professional DevelopmentYou’ll get career-building strategies and a personalized road map for your professional growth while participating in sessions that you need to advance to the next level.

Page 4: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Keynote Address:

Threat Forecast: The Top SecurityChallenges for 2008 Dr. Joel F. BrennerNational Counterintelligence Executive, Office of the Director of National Intelligence

With America engaged in a high-stakes war against jihad, ef-fective counterintelligence – the process of identifying and catch-ing foreign spies – is more im-portant than at any time since the Cold War. In this timely keynote address, America’s top counterintelligence official will reveal how foreign governments and terrorist organizations are actively spying within the Unit-ed States and stealing our most vital secrets.

A key player in the U.S. coun-terintelligence community, Dr. Brenner answers these compel-ling questions: Where will the greatest security threats come from in 2008? What is on the horizon? How can government and the private sector come to-gether to implement safeguards? What steps can—and must—be taken to counter the threats?

Monday

April 7Monday

April 7Educational

SessionsEducational

Sessions

“IattendedmyfirstIMPACT17yearsagoandIcontinuetogainawealthofinformationeverytimeIattend.”

AdrienneCrelinU.S.ArmyCELCMC

4

Monday, April 7 8:45am-9:40am

The Right Stuff:Achieving Excellence in Security Deedee Collins, Executive DirectorNational Security Training Institute

The government/industry secu-rity field has come a long way from “gates, guns and guards,” and 21st century practitioners need 21st century skills to be effective as strategic partners in their organizations. In this highly demanding climate, what are the skills needed to become a security standout? What separates an exceptional security manager from a merely compe-tent security manager? What is the right stuff? Noted security motivational speaker Dee Dee Collins will show you what steps you can take toward a more ful-filling career by redirecting your-self to a few core principles: an ongoing commitment to learn-ing, a willingness to improve your interpersonal and business skills, and a deliberate effort to establish yourself as a leader.

You Will Learn:

Key skills needed to per-form in this new era of security

Tools and techniques for becoming a security standout

Monday, April 7 10:40am-11:25am

Cyber-Security: Emerging Threatsand CountermeasuresEddie Schwartz, VP/Chief Security Officer, NetWitness Corp.

Cyber threats against the U.S. are growing with more than 100 countries developing cyber-war techniques, using the Internet for military or economic espionage. U.S. officials and security experts warn that cybercriminals are using increasingly sophisticated methods to attack military and government computers. U.S. Department of Homeland Security statistics reveal that 37,000 attempted breaches of government and private computer systems were reported in fiscal 2007. Against this backdrop, a Government Accountability Office report said terrorists may become a larger threat on the cyberbattleground as younger, more tech-savvy recruits join the organizations. This session will explore growing threats on the virtual horizon and how to defend against them.

You Will Learn:

What the government is doing to prevent a cyber 9/11

How government and in-dustry can work together to combat cyber threats

Monday, April 7 11:25am-12:25pm

Security Clearance Panel: What’s Work-ing, What’s NotKathy L. Dillaman, Assoc. Director OPM Fed. Investigative ServicesPerregrine Russell-Hunter, Dep. Director, DOHAJohn Faulkner, Director, DISCO

Still waiting for security clear-ances in the pipeline? Well, there’s good news and bad news. Good news first: The Office of Person-nel Management and Budget is continuing to shave days off the protracted security clearance process. The bad news: adequate funding and broader use of tech-nology will be needed to continue improving the background inves-tigation screening process. In this informative panel Q&A session you’ll hear from all of the key players in the security clearance re-gime—from OPM to DISCO to DOHA— and what each agency is doing to streamline the security clearance process. This is your chance to get up to speed on one of the most critical aspects of your personnel security program.

You Will Learn:

Where bottlenecks in the process are occurring

How to ensure timely clearance processing for your employees

Page 5: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Track 1 — Understanding and ImplementingAIS Best PracticesTBD

Navigating the AIS security landscape can be dizzying. Simply identi-fying the vast array of requirements can be time consuming and over-whelming—never mind determining which plan or procedure best fits your needs. With technology continually spurring changes to the rules, how do you protect classified information in AIS systems? This session will guide you through the complex implementation issues and help you navigate the maze of AIS security requirements for process-ing classified data at various protection levels. In this workshop, you’ll learn how to effectively manage and implement NISPOM chapter 8 requirements and get your automated systems accredited with minimal hassle.

Key Benefits:

Tips to avoid the biggest AIS security landmines

Best practices for implementing NISPOM requirements

Heads up on changes to AIS security

Afternoon

WorkshopsAfternoon

Workshops

5

Monday, April 7 2:00pm-3:15pm Track 2

Track 2 — Security Presentation Skills Workshop William R. Kotapish, ProfessorNational Security Training Institute

As a security manager, much of your work involves interacting with oth-ers and putting your best foot forward. How we communicate and get our security message out to our constituents is vital to the success of our security programs. In this session, you’ll be given practical instruction and guidance on preparing and delivering security presentations. You’ll hear from an expert on best practices in communications and presenta-tion skills. You’ll learn how to get your message across, whether you’re presenting a security proposal to top management, training your staff or conducting a security briefing for your employees. This power-packed workshop will stimulate your interest and motivate you to seek new paths to improve your communications skills.

You Will Learn:

Tips for developing and delivering a speech Techniques to motivate your audience

How to overcome anxiety

Monday, April 7 3:45pm-5:00pm Track 1

Track 1 — JPAS Solution Clinic for Government

and IndustryJoseph J. Jessop, JPAS Corp. Acct. Mgr.,Lockheed Martin Corp.Quinton Wilkes, Corporate Security Manager, L-3 Communications Corp

Successfully navigating your way around the Joint Personnel Adjudica-tion System (JPAS) and its related interfaces can be a time consuming and oftentimes stressful experience. It is, however, one of the most important tasks you will undertake as the government’s e-Clearance initiative advanc-es. Bring your questions, first-hand experiences and frustrations to this problem-solving workshop where you can get answers from knowledgeable security experts who understand the ins and outs of JPAS. An expert secu-rity panel comprised of both government and industry JPAS Program Of-ficers will lead you in this highly interactive session. You’ll receive practical instructions for effectively using the system; avoid timely errors that can slow the clearance process down; and get a heads up on where the glitches are occurring and what to do about it.

You Will Leave With:

Working knowledge of current JPAS operating procedures

Best practices for using JPAS, JCAVS and e-QIP

Steps to minimize problems and where to get help

Monday, April 7 3:45pm-5:00pm Track 2

Track 2 — OPSEC 360°: How to Conduct a Vulnerability Assessment Wesley H. Latchford, LCDR, U.S. Navy, Chief of SecurityGlobal Innovation and Strategy Center

An increasingly popular approach to vulnerability assessment is to think like the bad guys. Unfortunately, many security practitioners are often far less creative in identifying vulnerabilities than are the individuals who exploit them. An adversarial vulnerability assessment can help overcome these limitations, but it requires a completely dif-ferent mindset. This workshop, taught by a leading operations secu-rity expert, provides you with a methodical and practical approach in identifying assets most attractive to attack by an adversary. This session will guide you in the analysis and examination of the interrelationships between assets, threats, vulnerabilities and countermeasures that pro-tect a facility.

You Will Learn:

How to identify critical assets, single points of failure

Essential steps to securing sensitive unclassified information

How to prepare a Vulnerability Assessment report

Monday, April 7 2:00pm-3:15pm Track 1

Page 6: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Tuesday, April 8 8:10am-8:55am

Economic Espionage: Meeting the ThreatThomas Mahlik, Domain Section

Chief, Counterintelligence Div., FBI

The United States is a prime target of foreign spies seeking to steal away critical information — not only military plans and national security secrets but also valuable technological and busi-ness trade secrets. At last count, businesses, scientists, students and intelligence agents from nearly 100 countries were trying to get this information. The FBI is pursuing 143 economic espionage cases, up from 122 the previous year, according to its most recent statistics. As part of its drive to boost corporate awareness, the FBI is spearheading efforts to help businesses and universities assess their vulnerability to intellectual property theft and then take ac-tion to plug any potential leaks. In this timely briefing, the FBI’s espionage chief provides an over-view and assessment of the state of economic espionage activities directed against the U.S. and how to defend against it.

You Will Learn:

Up to date analysis of foreign spying capabili-ties and targets

Better understanding of your role in counterintel-ligence

Heightened awareness of your potential vulner-abilities

Tuesday, April 8 10:00am-10:45am

Defense Security Service — Moving Forward Together Kathleen Watson, DirectorDefense Security Service

Defense Security Service Di-rector Kathleen Watson will present the annual State of the DSS address. Find out how the agency plans to carry out its mission in 2008 as it adminis-ters and implements the defense portion of the National Indus-trial Security Program. Discus-sion will cover key changes tak-ing place in the industrial secu-rity program and its impact on cleared defense contractors. In this informative session, you’ll hear about DSS’ plans for the year ahead and how they affect your security program. Receive important updates in all areas of DSS coverage including: se-curity inspections, automation/modernization efforts, counter-intelligence awareness, security training, personnel security investigation projections, and foreign ownership, control and influence countermeasures.

You Will Learn:

What security discrepan-cies are being cited by IS reps

How to best resolve NISP-related issues with DSS

Tuesday

April 8Tuesday

April 8Educational

SessionsEducational

Sessions

“Ireceivedatremendousamountofinformationandresolutionstoproblemsatthisseminar.”

KathleenSherwoodEngineering&Environment,Inc.

6

Tuesday, April 8 8:55am-9:40am

Preventing Insider Threats: Lessons Learned from Actual Attacks Dawn Cappelli, Senior Member, CERT Technical StaffCarnegie Mellon University

An unhappy systems administrator who may want to teach a seem-ingly unappreciative boss a lesson. An employee who is passed over for a promotion or a raise. A dis-gruntled worker who, for the right price, is willing to sabotage his employer or country. Each of these nightmare scenarios represents a situation in which an employee has privileged access to informa-tion and the ability to thwart an organization’s weak internal securi-ty controls. While most employees are trustworthy, insiders are often at the center of security breaches and incidents of data theft. Pro-tecting your organization against insider threats requires careful planning and foresight to develop a layered defense that reduces the scope of the risk.

You Will Learn:

Best practices for com-bating the insider threat

Latest research in ongo-ing insider threats

Key elements of the in-sider risk profile

Tuesday, April 8 10:45am-11:45am

Spy Wars ’08: China Poses ‘Single Greatest Risk’Larry M. Wortzel, Chairman, United States-China Economic and Security Review Commission

China’s aggressive spying, tech-nology theft and computer at-tacks pose the most significant threats to U.S. national security, a congressional panel warns. Security experts say that there’s little doubt that the Chinese government has mounted a non-stop, well-financed attack to breach key national security and industry databases. The Chinese intelligence services use a variety of methods to spy, in-cluding traditional intelligence operations targeting U.S. gov-ernment agencies and defense contractors. This session will examine the growing threat from Chinese spying and why 2008 may be the year of cyberespionage.

Key Benefits:

Valuable lessons from the security trenches

Scope of Chinese spying activities in the U.S.

Lessons learned from recent spy cases

Page 7: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Afternoon

WorkshopsAfternoon

Workshops

7

Tuesday, April 8 1:45-3:00pm Track 1

Track 1 — Security Awareness: Overcoming Complacency in Your OrganizationMartin D. McNair, Corporate Security SpecialistScience Applications International Corporation

What does it mean when 90% of employees can remember the name of the performer from the last Super Bowl half-time show, but only 60% know the rules for protecting sensitive or classified information? Security awareness is not where it should be. With today’s concerns about budgets, resources, and visibility, organizations cannot let their security awareness programs be ineffective (or fail altogether). This session presents a com-mon-sense approach to building — or enhancing — a first class security awareness program and mastering the art of persuasion. At the completion of this session attendees will have an understanding of how to motivate people to perform the security-related aspects of their jobs.

You Will Learn How To:

Identify the key ingredients in a successful security awareness and training program

Gather and organize a wide variety of techniques and materials for maximum impact

Tuesday, April 8 3:20–4:35pm Track 2

Track 2 — Best Practices for Protecting Your Employees OverseasDavid S. Katz, Founder/CEOGlobal Security Group

As more U.S. corporations enter the global business arena and face increas-ing security threats as a result of terrorist activities, theft of intellectual property and natural disasters, security managers are taking a closer look at their responsibilities to employees who work or travel in hot spots around the world. This timely session addresses key corporate security concerns in international operations, focusing on threat assessment, prevention, and in-tervention. It will also provide real-life case examples, personal insights and practical advice on how to protect your company’s assets and operations in an increasingly dangerous world. You’ll learn the proven techniques and principles for helping your employees survive in high-threat areas.

You Will Learn:

Recent trends, hot spots, and emerging threats

Key elements of a defensive foreign travel briefing

Best practices for mitigating risks

Tuesday, April 8 3:20–4:35pm Track 1

Track 1 — How Not to Have Your Information Systems Control Plan RejectedMichael Farley, Deputy Director ODAADefense Security Service

Navigating your way through the DSS certification and accreditation pro-cess for classified systems can be a challenging experience. A written plan may not strike security managers as the first weapon for countering the threat to classified data, but it is the same as having a well-planned strategy for an army. A good systems security plan will provide a number of ben-efits to the security staff, including improved operational effectiveness and management controls. In this interactive workshop, you’ll learn about the best practices in preparing your information systems control plan. DSS’ Michael Farley will walk you through the ODAA process and provide criti-cal implementation rules of the road for 2008.

What You’ll Learn:

Common pitfalls and problem areas to avoid when preparing security plans

Key tips for an effective systems security plan

Update on eFAST pilot program and ODAA plans

Tuesday, April 8 1:45-3:00pm Track 2

Track 2 — How to Steer Clear of Export Con-trol Security ViolationsDeed L. Vest, Director Security and Technology ProtectionUnited Space Alliance

Export analysts predict a record year of monetary penalties this year and even criminal prosecutions for various U.S. export violations. Given the ease with which controlled technical data may be improperly exported, as well as the possible consequences for violating export controls, it’s criti-cal that security managers know and comply with the rules for protecting export-controlled technology and information. Failure to comply, even unintentionally, can be costly both to your company and national security. Learning the ropes is difficult because the various U.S. agencies and depart-ments that administer export controls have different laws and regulations. This workshop will provide you with a working knowledge of your security obligations and bring you up to speed on export compliance issues.

Key Benefits:

Export control primer on “Deemed Exports” FOCI, foreign nationals at U.S. facilities, and dual-use technologies

Security resources, contacts and where to go for help

Page 8: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Wednesday, April 9 8:10am-8:55am

Future Directions in Terrorism and CounterterrorismRussell E. Travers, Deputy Director Information Sharing & Knowledge Development, National Counter-terrorism Center

Experts warn that the threat of ter-rorism and its related groups will persist throughout 2008. As we develop and implement strategies and systems to address the threats of today, terrorists are planning the threats of tomorrow. To cope with this new reality, security managers must take greater care in planning and protecting their people, information and physical assets from the direct and indirect impact of the heightened ter-rorist threat. This timely threat briefing will discuss the changing landscape of the terrorist threat to American security and offer recommendations for meaning-ful protections against growing dangers.

Key Issues:

Changing face of terrorism and top threats for 2008

Effective and practical counterterrorism measures

New threats from high-tech terrorism and e-Jihad

Wednesday, April 9 10:45am-11:45am

D*I*C*E 2008: The Path to Heightened Security Ray Semko, ProfessorThe Centre for Counterintelligence and Security Studies

As the nation faces a continued and more far-reaching threat from espionage, terrorism and informa-tion warfare, the need for security vigilance at all levels of the organi-zation is greater than ever before. Ray Semko (a.k.a. The D*I*C*E Man), nationally known for his motivational presentations, will provide a guided tour of the latest risks and advice to help protect your organization and strengthen your security program. From the threats beyond our borders, to those festering within, Mr. Sem-ko’s objective is to help you rec-ognize America’s adversaries, their targets and methods of operation and how to prevent these adver-saries from exploiting our nation’s security by effectively protecting classified, proprietary and sensitive information. The D*I*C*E Man’s goal is to raise your awareness level and give you the tools you need to get your employees on the road to improved security.

Wednesday

April 9Wednesday

April 9Educational

SessionsEducational

Sessions

LynneO’HareBoeingSatelliteDevelopmentCtr.

“Greatlearningopportunity.Igainedalotofinformationandideastotakebacktomycompany.”

8

Building a Dynamic and Viable Security ProgramRobert W. Rogalski, Corporate Director of Security & SafetyRand Corporation

In the rapidly evolving world of business, what is true today may not have been true yesterday. So even the most carefully considered security strategies may be based on a foundation that no longer ex-ists. As a result, it’s pretty easy for security operations – even the best ones – to go astray without ever changing course. Meeting these challenges requires new thinking; a new model for security manage-ment that aligns security with business needs. Rob Rogalski, who has seen security from both the government side as director of security at the Pentagon and the private sector, as current security director with Rand Corp., will provide key strategies and building blocks needed to develop a success-ful 21st century security program.

You Will Learn:

How to present security as a business enabler

How to keep pace with expanding responsibilities

Proven practices for managing security

Wednesday, April 9 10:00am-10:45am

Securing the Mobile Workforce: Closing the Virtual Barn DoorJames P. Litchko, President/CEO Litchko & Associates

As today’s workforce becomes increasingly mobile, the risk to sensitive information has never been greater. Laptop and mobile gadgets like cell phones, PDAs, and USB flash drives have become a necessity in many business settings. And such equipment now spends more time than ever outside the office, as employees work at home or in the nearest Starbucks—creating a huge op-portunity for information theft or loss. This informative session will bring emerging security vulner-ability and liability issues to light in a manner that is easy to com-prehend, even for those having less-technical subject knowledge. Topics addressed include: security considerations regarding Blogs, Instant Messaging, wireless and remote server access, as well as protection of sensitive data.

Key Issues:

Security implications of corporate vs. employee handhelds

How to tackle the threat from portable storage devices

Wednesday, April 9 8:55am-9:40am

Page 9: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

At-A-Glance Three Days of

Career-Critical Information

At-A-Glance Three Days of

Career-Critical Information

Tuesday, April 8 7:00 — 8:00 am. Coffee and Pastry 8:00 — 8:10 am. Opening Remarks 8:10 — 8:55 am. Economic Espionage: Meeting the reat omas Mahlik, Domain Section Chief, Counterintelligence Div., FBI 8:55 — 9:40 am. Preventing Insider reats: Lessons Learned from Actual Attacks Dawn Cappelli, CERT Technical Staff, Carnegie Mellon University 9:40 — 10:00 am. Refreshment/Networking Break 10:00 — 10:45 am. Defense Security Service — Moving Forward Together Kathleen Watson, Director, Defense Security Service 10:45 — 11:45 pm. Spy Wars ’08: China Poses ‘Single Greatest Risk’ Larry M. Wortzel, Chairman, U.S.-China Economic and Security Review Commission 12:00 — 1:45 pm. Host Networking Luncheon Luncheon Address: Pinkerton Government Services 1:45 — 3:00 pm. Track 1: Security Awareness: Overcoming Complacency in Your Organization Martin D. McNair, Corporate Security Specialist, SAIC Track 2: How to Steer Clear of Export Control Security Violations Deed L. Vest, Director of Security, United Space Alliance 3:00 — 3:20 pm. Refreshment/Networking Break 3:20 — 4:35 pm. Track 1: How Not to Have Your Information Systems Control Plan Rejected Michael Farley, Deputy Director ODAA, Defense Security Service Track 2: Best Practices for Protecting Your Employees Overseas David S. Katz, Founder/CEO, Global Security Group

Monday, April 7 7:00 — 7:50 am. Registration. Coffee and pastry will be served during registration 7:50 — 8:00 am. Welcome and Opening Remarks 8:00 — 8:45 am. reat Forecast: e Top Security Challenges for 2008 Dr. Joel F. Brenner, National Counterintelligence Executive, Office of the DNI 8:45 — 9:40 am. e Right Stuff: Achieving Excellence in Security Management Deedee Collins, Executive Director, National Security Training Institute, Inc. 9:40 — 10:40 am. Refreshment Break , Security Awarenesss Fair and Expo10:40 — 11:25 am. Cyber-Security: Emerging reats And Countermeasures Eddie Schwartz, VP/Chief Security Officer, NetWitness Corp.11:25 — 12:25 pm. Security Clearance Panel: What’s Working, What’s Not Kathy L. Dillaman, OPM; Perregrine Russell-Hunter, DOHA; John Faulkner, DISCO12:30 — 2:00 pm. Host Networking Luncheon, Security Awarenesss Fair and Expo 2:00 — 3:15 pm. Track 1: Understanding and Implementing AIS Best Practices (TBD) Track 2: Security Presentation Skills Workshop William R. Kotapish, Professor, National Security Training Institute 3:15 — 3:45 pm. Refreshment Break , Security Awarenesss Fair and Expo 3:45 — 5:00 pm. Track 1: JPAS Solution Clinic for Government and Industry Joseph J. Jessop, Lockheed Martin Corp.; Quinton Wilkes, L-3 Communications Corp Track 2: OPSEC 360°: How to Conduct a Vulnerability Assessment Wesley H. Latchford, LCDR, U.S. Navy, Global Innovation and Strategy Center

9

MarcieLoya,U.S.Army,DPTMS

“Excellentopportunityfornet-workingwithothersecurityprofessionals.”

Wednesday, April 9 7:00 — 8:00 am. Coffee and Pastry 8:00 — 8:10 am. Opening Remarks 8:10 — 8:55 am. Future Directions in Terrorism and Counterterrorism Russell E. Travers, Deputy Director Information Sharing, National Counterterrorism Center 8:55 — 9:40 am. Building a Dynamic and Viable Security Program Robert W. Rogalski, Corporate Director of Security & Safety, RAND Corporation 9:40 — 10:00 am. Refreshment/Networking Break10:00 — 10:45 am. Securing the Mobile Workforce: Closing the Virtual Barn Door James P. Litchko, President/CEO, Litchko & Associates 10:45 — 11:45 am. D*I*C*E 2008: e Path to Heightened Security Ray Semko, e Centre for Counterintelligence and Security Studies 11:45 — 11:55 am. Closing Remarks

Page 10: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

Conference Hours Monday, April 7 Registration 7:00 am. – 7:50 am. Conference 7:50 am. – 5:00 pm. Networking Reception 5:00 pm. – 6:30 pm. Tuesday, April 8 Conference 8:00 am. – 4:35 pm. Wednesday, April 9 Conference 8:00 am. – 11:55 am.

Pre/Post Conference Workshops Sunday, April 6, 2:00 pm. – 5:00 pm.

Wednesday, April 9, 1:00 pm. – 4:00 pm.

Security Awareness Fair and Expo Monday, April 7, 9:40 am. – 3:45 pm.

Meeting Attire Attire for the National Security Institute Conference and Exhibition is business casual.

Hotel Reservations To reserve your room call Hilton reservations at 1-703-847-5000 or reserve your room on-line at http://www.hilton.com/en/hi/groups/personalized/MCLMHHH-NSI-20080405/index.jhtml. Click on the “Book a Room” link and insert the group code “NSI”. When

calling, please ask for the NSI IMPACT 2008 rate at the Hilton Mclean Tysons Corner in order to receive the discounted group rate of $219. The group rate will be available until March 10th or until the group block is sold-out, whichever comes first. Please be aware the room block fills quick-ly, so we suggest you make your hotel and travel plans early.

The Hilton McLean Tysons Corner is located at 7920 Jones Branch Drive, McLean, Virginia, 22102. This world-class atrium style hotel offers luxury service, elegant surroundings, exceptional dining and complimentary parking.

Register

early & SaveRegister

early & Save

FOUR EASY WAYS TO REGISTER

1. Register online at : http://nsi.org/Impact08.html

2. Fax the registration form with payment information, to (508) 533-3761

3. Mail the registration form and payment to: National Security Institute 116 Main St., Ste 200 Medway, MA 02053

4. Call (508) 533-9099

REGISTER EARLY AND SAVE

Earlybird Discount RateA special rate of $845 is being offered to all attendees whose payment is received by March 1, 2008. The registration fee covers all program materials, admission to pre- and post-conference workshops, host re-ception, luncheons and refreshment breaks.

Regular RateThe fee for registrations received after March 1, 2008 is $895. All registrations must be accompanied by a check made payable to the National Security Institute, a Purchase Order or Government Train-ing Form. You may also charge your MasterCard, Visa or American Express.

Cancellation PolicyCancellations must be made in writing to the National Security Institute. Refunds for cancellations received on or before March 17 will be subject to a $50 administrative fee. Cancellations received after March 17, 2008 will forfeit 100 percent of the total conference fee. Substitutions may be made at any time by calling NSI.

10

About NSIFounded in 1985, the National Security Institute (NSI) is a publisher and educator serving the needs of security professionals in government, the corporate sector, and defense contracting. We publish newsletters and special reports, we sponsor seminars and conferences, and we offer government and industry security professionals a FREE e-newsletter, delivering national and international news pertinent to the security profession. We produce the

Page 11: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

A New Roadmap for SecurityMcLean, Virginia, April 7 - 9, 2008

Please print, type or attach your business card and forward to: National Security Institute, 116 Main Street, Suite 200, Medway, MA 02053. Tel: 508-533-9099 Fax: 508-533-3761. Photocopy for additional registrations.

Registration Fees Rcvd. by 3/1/08 After 3/1/08

3-day Registration $845 $895

2-day Registration $745 $795

1-day Registration $495 $545

Name: Title:

Company/Agency:

Address:

City: State: Zip:

Phone: E-mail:

Priority Registration Form

Method of Payment Check Enclosed Purchase Order/1556 Form EnclosedCharge to Credit Card: VISA Mastercard AMEX

Card No. Exp. Date

Name on Card

Authorized Signature

Registration FormRegistration Form

REGISTER BYMARCH 1ANDSAVE$50!

MARCH 1SAVE$50!

Who Should Attend IMPACT 2008…

Facility Security Officers Government Personnel Security Managers Corporate Security Directors Information Security Managers Classification Management Specialists AIS Security Managers Security Education and Training Specialists Government Agency Security Specialists Classified Material Control Specialists Information System Security Managers OPSEC Managers Security Policy Adjudicators JPAS Account Managers

impact 2008

11

Enroll me in JPAS Boot Camp on Sunday, April 6, 2:00 - 5:00pm

Enroll me in JPAS Advanced workshop on Wednesday, April 9, 1:00 - 4:00pm

Note: Both workshops are included in

your registration fee.

Gold Sponsors

IMPACT 2008 Platinum Sponsor

Page 12: AND Be Prepared · terrorists waging jihad against Americans. While there is no security system in the world that could protect against all these threats, there is plenty security

REGISTER BY

MARCH 1AND

SAVE$50!

MARCH 1

SAVE$50!

You’ll get up to date on the hottest security issues: se-curity clearances, JPAS, NISP, AIS security, economic espionage, cyber security threats, security awareness, terrorism, OPSEC.

You’ll return to your office with an entire reference library that will put the information you need at your fingertips: binder, CD-ROM, follow-up e-mails!

You’ll gain networking contacts you can call on all through the year: make friends; get to know the major figures in your profession.

You’ll learn about key developments of the past year — and what to expect in the year ahead — in a re-laxed atmosphere conducive to education!

You’ll be prepared to handle all aspects of JPAS, with more than 7 hours plus of in-depth training offered.

You’ll learn security’s latest best practices… and return to your office prepared to implement solutions before they are needed and eliminate security vulnerabilities before they happen!

You’ll spend 3 days with people who understand and care about what you do every day because they do it, too!

Why IMPACT 2008 Will be Your Most Critical Professional Experience of the Year

116 Main Street, Suite 200Medway, MA 02053

“TheIMPACTconferencecontinuestochangeeachyear,providingsecurityprofessionalswiththemostcurrentawarenessinformationandtechnology.Itisoneofthemosteffectivetrainingtoolssecurityprofessionalscanreceive.”

JeanC.O’Hara,AVAYA

12

99.2%ofpolled2007attendeessaytheNSIIMPACTConferenceisvaluabletotheirjobs.

12 Special Features of IMPACT 2008

In-depth, practical workshops, not PowerPoint snooze-a-

thons!

Briefings with important heads of government agencies

2008 Edition of NSI’s Reference Data Library on CD-ROM

Sessions targeted to personal and professional development, will help you become better at your job

Comprehensive pre- and post conference JPAS workshops

NSI’s 2008 Security Awareness Fair and Expo

Reception, luncheons, and refreshment breaks with your colleagues

Outstanding speakers and session presenters

Post-conference session updates via e-mail

First ClassPresort

US PostagePAID

Ashland, MAPermit No. 7