Day 1 - Tuesday, July 14, 2020

8:45
Co-Chair’s Opening Remarks

Chris Griner
Partner
Stroock & Stroock & Lavan LLP

9:00
DCSA Keynote Address
9:45
The Shifting Landscape of Expectations for Outside Directors and Proxy Holders

Drew Winneberger
Proxy Holder – Trustwave
Outside Director – Amec Foster Wheeler

John Kabealo
Founder
Kabealo PLLC

Matthew Kitzman_Headshot

Matthew Kitzman
Operations Officer,
Business Analysis and Mitigation Strategy

Defense Counterintelligence and Security Agency (DCSA)

  • Examining the evolving requirements related to the roles and qualifications of Outside Directors/Proxy Holders in the National Industrial Security Program
  • Making sense of the proposed forms related to the nomination and evaluation of OD/PHs
  • What is newly required of OD/PH’s in terms of post-appointment DCSA training programs related to their duties as directors or proxy holders?
  • Best practices for complying with the new requirements and overcoming potential disclosure concerns

10:45
Break
11:15
Oversight of DoD Cybersecurity Requirements for Industry
blank-headshot

Casey Getz
Head of Cyber Strategies
Rolls Royce

  • Analyzing the Cybersecurity Maturity Model certification for contractors
  • Understanding the steps necessary to achieve each level of the new certification program
  • How DCSA intends to integrate the Cybersecurity Maturity Model with the other IT security requirements for unclassified systems (including Electronic Communications Plans and NIST SP 800-171)?

12:00
Risk-Based FOCI Mitigation: What Has and Hasn’t Worked?

Stanley J. Borgia
Vice President Corporate & Defense Program Security
Rolls-Royce North America Inc.

Gerard F. Amann
General Counsel & Secretary Chief Ethics & Compliance Officer
Accenture Federal Services

Dustin Dwyer_Headshot

Dustin D. Dwyer
Chief
Mitigation Strategy Unit

Defense Counterintelligence and Security Agency (DCSA)

  • The current usage and outlook for the future use of Tailored Security Plans (“TSP”)
  • Best practices and potential pitfalls for drafting and implementing TSPs
  • Strategies for identifying FOCI and other risks that must be addressed in a TSP
  • The future of TSPs: Will ancillary FOCI mitigation plans (e.g., ECP, AOP) continue to be required or will they be rolled into the TSP framework

1:00
Break
2:00
The Interplay of FOCI and the New Proposed CFIUS Regulations

Shannon Reaves
Special Counsel
Stroock & Stroock & Lavan LLP

Matthew Kitzman_Headshot

Matthew Kitzman
Operations Officer,
Business Analysis and Mitigation Strategy

Defense Counterintelligence and Security Agency (DCSA)

blank-headshot

Beau Richardson
Associate Director, Government Team
Bureau Van Dijk

  • Assessing how the new FIRRMA regulations and FOCI mitigation will coexist going forward – how can the two regimes work together?
  • Developing a strategy for managing the FOCI and CFIUS review processes concurrently
  • Analyzing the effects that FIRRMA has on companies at varying points in the FOCI mitigation and CFIUS approval processes
  • Best practices for coordinating with the U.S. government, transaction parties, and outside counsel

3:00
Affiliated Operations Plans (“AOP”): Employing Best Practices and Avoiding Common Pitfalls
Dustin Dwyer_Headshot

Dustin D. Dwyer
Chief
Mitigation Strategy Unit

Defense Counterintelligence and Security Agency (DCSA)

Jennifer Brown
Director of Security & FSO/TCO
iDirect Government LLC

  • Identifying potential affiliated operations that make sense, or whether you are already engaging in affiliated operations
  • Best practices and pitfalls to avoid when drafting and submitting an AOP
  • Key strategies for mitigating and managing affiliated operations
  • Developing internal steps to ensure you are properly mitigating potential risks

3:45
Conference Ends