Day 1

Conference Chair Opening Remarks

Robert Metzger
Rogers Joseph O’Donnell, PC



National Counterintelligence and Security Center (NCSC)
Joyce Corell

Joyce Corell
Assistant Director for Supply Chain and Cyber
National Counterintelligence and Security Center

Navigating Increased Security Concerns with Remote Workers

Richard Naylor
Senior Cyber Adviser & Deputy Director for Counterintelligence
Defense Counterintelligence and Security Agency

Giovanna Cinelli
Head, International Trade and National Security Practice
Morgan Lewis & Bockius LLP

  • New Threats: distinct risks to cleared personnel working outside customary secure environment
  • Technical: securing the remote workforce, enterprise challenges of personal devices, protecting the work, new resources to respond to new problems
  • Policy & Process: recommended new policies, workforce engagement, updated HR policies, specialized training, new reporting

Focus on Counterintelligence: Effective Strategies to Strengthen Industrial Intelligence in an increasingly Aggressive and Complex World

Charles Margiotta
National Insider Threat Task Force (NITTF)

Doug Thomas
Director, Counterintelligence Operations and Corporate Investigations
CHQ Lockheed Martin

  • Understanding the importance of integrating sound counterintelligence and security procedures into business practices
  • Developing techniques to strengthen networks against malicious insiders to steal or compromise our sensitive data, information, and assets
  • Exploring how the ever-changing technology landscape is likely to threaten the security to take competitive advantage

Security Clearance 2.0: Navigating Personnel Security Clearances During COVID-19

Jason Klitenic
Holland & Knight
Former General Counsel for the Office of the Director of National Intelligence (ODNI)

Charles Sowell
Chief Operating Officer
iWorks Corporation

  • Latest updates on Trusted Workforce 1.5 and expectations in Trusted Workforce 2.0
  • New developments in continuous evaluation forms
  • Overcoming the challenges of navigating between DISS (Defense Information System for Security) and JPAS (Joint Personnel Adjudication System)
  • Understanding the National Industrial Security Program (NISP) Contract Classification System (NCCS)
  • Security prescreening and the overall clearance process
  • Mobility of personnel clearances/reciprocity

Lunch Break


Defense Counterintelligence and Security Agency (DCSA)

William Stephens
Director, Counterintelligence
DCSA Critical Technology Protection

Practical Approach to Supply-Chain Risk Management for Cyber: Identification, Assessment and Mitigation

Chris Nissen
Director, Asymmetric Threat Response & Supply Chain Security, Special Concepts Group
The MITRE Corporation

Harvey Rishikof
Director of Policy and Cyber Security Research and Visiting Research Professor
The University of Maryland

  • Identify the key critical supply chain threats and vulnerabilities
  • Evaluating the latest developments in vendor management
  • Key strategies to promote the security and integrity of the cyber supply chain
  • Recognizing solutions for managing risks, promoting resiliency, and encouraging public-private collaboration
  • Update on the “Deliver Uncompromised” Initiative

Deciphering the New Requirements and Elements of an Effective Controlled Unclassified Information (CUI) Program

John A. Ellis
Director, Software Division
Defense Contract Management Agency

Devin Casey
Agency Implementation Lead, ISOO/CUI Oversight
National Archives

Jerry Howe
Executive Vice President & General Counsel

  • What are the requirements and standards for access for the CUI?
  • Clarifications of CUI in contracts?
  • Evaluating the flow down of CUI to subcontractors; managing obstacles
  • Technical solutions to supply chain CUI protection
  • The CMMC (Cybersecurity Maturity Model Certification (CMMC) Program – and CUI of Cleared Contractors & Their Suppliers
  • Reconciling different Government cyber regimes and requirements

Maintaining a Comprehensive Deterrence and Detection Plan to Combat Insider Threats: Obtaining Tools for Identifying, Controlling and Reducing Them

Leonard Moss, Jr.
Chief Security Officer
Insider Threat Program Senior Official & Security Services Department (SECD) Head

John Hopkins University Applied Physics Lab

Christopher A. Williams
Christopher A. Williams LLC

  • Latest developments in the Insider Threat Minimum Standards
  • Update on the new training programs by the government
  • Using technology such as AI/machine learning to identify and minimize insider threats
  • Understanding behavioral observation patterns
  • Identifying new risks affecting the insider threat program
  • Tools to measure the effectiveness of the program

Future Trends: What to Expect in the Months Ahead

George Kamis
Chief Technology Officer, Global Governments and Critical Infrastructure

Gary Nowlin
Delegated Authorizing Official Cross Domain Support Element Lead Cyber Security Office
NRO Communications System Directorate

  • Why DoD and other agencies are adopting cloud for secure access to separate domains
  • NSA’s “Raise the Bar” for “Cross Domain Solutions” and “Commercial Solutions for Classified Program” (CSfC)
  • Using Cross Domain Solutions (CDS) to access commercial innovation and accelerate solution development
  • Strategies, Policies and Process Needed to leverage CDS at cleared contractors

Virtual Cocktail Hour- Q & A with the Speakers