Print Page   |   Contact Us   |   Your Cart   |   Sign In   |   Join Now
How Will Your Company Handle an Insider Threat? (Columbia, MD)
Tell a Friend About This EventTell a Friend
How Will Your Company Handle an Insider Threat? (Columbia, MD)

This briefing and panel discussion will address the proposed changes to the NISPOM from the perspective of Insider Threat and Industrial Security experts, and the current and anticipated impact on company resources as viewed by business leaders operating under the NISPOM.

11/7/2014
When: Friday, November 7, 2014
Breakfast and check-in begin at 8:00AM - Program start at 8:30AM - Event ends at Noon.
Where: Loyola University Maryland (Columbia Graduate Center)
8890 McGaw Road
((See monitors for room number)
Columbia, Maryland  21046
United States
Presenter: Insider Threat and Industrial Security Experts
Contact: Events Team
410.381.7378 x2

« Go to Upcoming Event List  

How Will Your Company Handle an Insider Threat?
A discussion with experts on the proposed changes to the NISPOM
and the bottom line impact to cleared industry.

On October 7, 2011, the President signed Executive Order 13587, "Structural Reforms to Improve Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information.” which directs the heads of agencies that operate or access classified computer networks to have responsibility for appropriately sharing and safeguarding classified information.

In November 2012, the White House issued National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs that provides Departments and Agencies with the minimum elements necessary to establish effective insider threat programs.  For cleared industry, implementation of the National Insider Threat Policy will be outlined in the not yet issued Conforming Change 2 of the National Industrial Security Operating Manual (NISPOM).

The industry minimum standards will include:

  • establishing an insider threat program
  • designating an insider threat senior official who is cleared in connection with the facility clearance
  • self-assessments of insider threat programs

  • insider threat training for insider threat program personnel and awareness for employees
  • monitoring network activity

This briefing and panel discussion will address the proposed changes to the NISPOM (Conforming Change 2) from the perspective of Insider Threat and Industrial Security experts, as well as the current and anticipated impact on company resources from the perspective of business leaders currently operating under the NISPOM.

Agenda:

  • Registration/Guest Check-In, Breakfast and Networking (7:30AM to 8:30AM)
  • Welcome and Program Start (8:30AM)
  • Attendee Introductions
  • What is an Insider Threat?
  • What is 'Conforming Change 2'?
  • Achieving and Sustaining Compliance.
  • Panel Discussion: Bottom Line Impact on Industry

Speakers/Panelists:

Broderick Franklin, ISP, (Microsoft CSSO)
InfoTek Corporation (ITK)

Diane Griffin,
Security First & Associates

Special Agent Michael T. Brown, Strategic Partnership Coordinator
FBI, Counterintelligence Strategic Partnerships

Jacky Kimmel, CEO
InfoTek Corporation (ITK)

Steven Mackie, President
Storage Strategies, Inc. (SSI)


IMPORTANT: Participation in this event is limited to U.S Citizens representing organizations with no Foreign Ownership, Control or Influence (FOCI). The American Small Business Coalition, LLC reserves the right to refuse access to any individual and/or organization.

Pre-registration is required. Onsite registration not available. No substitutions permitted after online registration closes on November 4, 2014. Other than these exceptions, all registrations are subject to our Guest/Fail/Cancellation/Substitution and Event Refund Policies.

Registration includes a light breakfast.

There are sponsorship opportunities for this event that may qualify for NISP Enhancement points.  Sponsorships do not include event tickets.

NISP ENHANCEMENTS:

  • Attendees: Possessing and non-possessing facilities attending this event are eligible to be awarded 'NISP Enhancement' points in Category 7a: Threat Identification and Management.

  • Presenters: Possessing and non-possessing facilities presenting at this event are eligible to be awarded 'NISP Enhancement' points in Category 4: Information & Product Sharing within Security Community.

  • Sponsors: Possessing and non-possessing facilities sponsoring this event are eligible to be awarded 'NISP Enhancement' points in Category 1: Company Sponsored Events.

Visit http://www.dss.mil/isp/fac_clear/security-rating-matrix.html for information on  'NISP Enhancements.' (Reference: 2014 DSS Vulnerability Assessment Rating Matrix - Vulnerabilities and NISP Enhancement Categories)

Pre-Registration Fees:

$75/CORE Small Business and Business Growth Partners; $100/Individual and Associate; $150/Not Yet Members

  

http://www.theasbc.org/event/NISPOM_CC2

Presented by

    

Cyber and Intelligence Community Working Group (CYBINT) and InfoTek Corporation (ITK)

 

Supporting Sponsors

SSI       Cloudburst Security       Kinnear Cundari Associates LLC

  


Association Management Software Powered by YourMembership.com®  ::  Legal