Classified Contracts Summit

Dec 5, 2017 8:30am – 4:30pm

Download Brochure 108L18_Classified_970px


Classified contracting has become increasingly complex and challenging for industry. In addition to a period of transition at the Defense Security Service, industry is confronting a mounting backlog, and obstacles to obtaining and maintaining personnel and facility security clearances. Further, a string of more recent changes to NISPOM, including its insider threat requirement, are posing challenges to businesses pursuing classified work. Moreover, new cyber security rules for controlled unclassified information (CUI) stipulated by DFARS and NIST SP 800-171 impel companies to take specific action by December 31, 2017.   ACI’s National Summit on Classified Contracts is uniquely designed to impart best practices and strategic insights for addressing the most pressing, complex challenges affecting classified contracting. With specific emphasis on how to weather the intricacies of security clearances, NISPOM, insider threat and cyber challenges, the event will assemble government, industry and private practice stakeholders for a productive, worthwhile meeting.  


Stanley J. Borgia
Vice President Corporate Security
Rolls-Royce North America Inc.

William F. Savarino

Cohen Mohr LLP


December 5, 2017


Registration Begins and Continental Breakfast



Conference Co-Chairs’ Opening Remarks

Stanley J. Borgia
Vice President Corporate Security
Rolls-Royce North America Inc.

William F. Savarino
Cohen Mohr LLP



Security Clearances for Individuals and Facilities



The Nuances of Personnel Security Clearances: How to Avoid Unintentional Missteps that Can Undermine Your Application

Heidi M. Fritzeen
Acting Assistant Director, Special Security Directorate, National Counterintelligence and Security Center
Office of the Director of National Intelligence (ODNI)

Mark R. Pekrul
Deputy Assistant Director Customer Service, Communications and Engagements
National Background Investigations Bureau, U.S. Office of Personnel Management

Dan Crosby
Vice President, Security
DRS Technologies

Cynthia Cromwell Wallace
Human Resources Manager & Facility Security Officer
OpenText Public Sector Solutions, Inc.

This panel will focus on the specific aspects and challenges with respect to the personnel security clearance process, and key factors affecting agencies’ decisions to grant clearance – or not. Topics of discussion will center on the most complex, pressing challenges that can arise during the application stage:

  • War Stories: The 5 biggest pitfalls to avoid at the application stage, and
    how seemingly small errors can lead to an unfavorable outcome
  • What role the lack of political appointments in key government agencies
    plays in the current clearance process
  • How to know when and what level of security clearance is required, from
    whom and in what order
  • Why fewer security clearances are being issued and what the government is doing about the backlog in clearance applications
  • Personnel security reform: What could be coming down the road
  • Recent changes in periodic reinvestigations: Tiers and timelines
  • Perspectives on the perceived deceleration in the issuance process of
    security clearances
  • “Corporate” aspects of bidding for a classified contract: Who requires
    security clearance in the HR, IT and sales departments



Refreshment Break



Facility Security Clearances in Practice: Concrete Examples of How to Successfully Navigate the Finer Points of Obtaining Clearance

Heather Sims
Industrial Security Specialist
General Dynamics Corporation
Former Assistant Deputy Director for Field Operations, DSS

Leonard Moss
Vice President & Chief Security Officer
DynCorp International

Richard L. Ray, Jr.
Facility Security Officer and Technology Control Officer
Eutelsat America Corp.

William F. Savarino
Cohen Mohr LLP

How to get your company and facility “off the ground” and eligible to bid
for classified work

  • Understanding the roles of the various agencies involved in the
    clearance process and what you can (proactively) do to increase your
    chances of obtaining clearance
  • What to expect of DSS’ automation of the process for DD Form 254,
    whether it will only apply to agencies following NISPOM or whether this
    tool will also be used in the DOE/NRC and DHS clearing processes
  • Common reasons why companies seek security clearance: Control of
    information flow/sharing (health care company), R&D hub (IT outfit), etc.
  • Exploring ways to “shorten” the security clearance process (e.g., via an


Refreshment Break



When Personnel and Facilities Could Lose their Security Clearances: Unexpected Obstacles to Maintaining Security Clearances

Stanley J. Borgia
Vice President Corporate Security
Rolls-Royce North America Inc.

Mitchell Lawrence
Chairman, Industrial Security Council
National Defense Industrial Association, NDIA

Carmine Mele
Director, Facility Security Officer

Caroline Krass
Gibson, Dunn & Crutcher LLP
Former General Counsel, Central Intelligence Agency

This practical session will take you through numerous scenarios that underscore why the maintenance of personnel and facilities security clearances has become increasingly difficult. Each scenario will feature a step-by-step analysis of how to handle the given situation and resolve highly sensitive, complex issues. Topics will include:

  • What if your CSO is charged with an addiction problem?
  • What if it comes to your attention that your CEO has a gambling problem that may have left him with significant debts?
  • What if a cleared employee becomes engaged to a non-US national?
  • What if a foreign live-in nanny is employed?
  • What if your corporation decides to enter into a JV with a non-US entity?
  • What if you become aware that proprietary information related to your company is on WikiLeaks, mixed together with classified material, and the employees in your company who want to access that information have signed non-disclosure agreements in connection with their security clearances?
  • Similarly, what if your company believes that information is available on the Internet that relates to a particular cyber security vulnerability in your company’s IT system, and your company’s IT employees want to access that information to reverse-engineer the vulnerability and prevent its exploitation by bad actors? What if the information is not available to all equally but instead is being offered for sale on the Internet?


Networking Lunch



The Insider Threat Requirement Under NISPOM Change 2

William “Bill” R. Evanina
National Counterintelligence and Security Center (NCSC)
Office of the Director of National Intelligence



Overcoming the Real-Life Challenges to Fulfilling the Insider Threat Requirement

Thomas Langer
Vice President, Security
BAE Systems Inc.
Chair, DoD Insider Threat Management and Analysis Center, DITMAC

Stuart C. Mallory
Executive Director for Security, Facility Security Officer, Federal Services

Kirk Poulsen
Senior Vice President, Chief Security Officer
Leidos Inc.

John P. Carlin
Morrison & Foerster LLP
Former Assistant Attorney General, National Security Division, U.S. Department of Justice

  • How to interpret the most important new guidance and stipulations outlined in NISPOM Change 2
  • Managing the unknown risks affecting the establishment of an insider threat program
  • What the responsibilities of a newly appointed Insider Threat Program Senior Official (ITPSO) mean in practice
  • How to improve and optimize communication on insider threat challenges between the government and companies
  • Lessons learned on effective messaging to employees: How to reconcile potentially differing priorities and concerns between in-house teams, such as cyber/IT, legal and compliance
  • How to measure the effectiveness of an insider threat program
  • What to do about employees who are “off the grid” (i.e., not in company spaces or on company networks
  • In what respect the new insider threat rules might conflict with US and non-US privacy laws (such as the EU’s GDPR), and how to reconcile any conflicts


Refreshment Break



Status Update on CUI Program

Patrick Viscuso
Associate Director, Controlled Unclassified Information
Information Security Oversight Office, ISOO (National Archives & Records Administration, NARA)



Navigating the NISPOM Maze: Expectations, Challenges and Best Practices

Valerie L. Heil
Associate Director, Industrial Security OUSD(I) CI and Security Directorate
U.S. Department of Defense

Heather Sims
Industrial Security Specialist
General Dynamics Corporation
Former Assistant Deputy Director for Field Operations, DSS

Michelle J. Sutphin
Vice President, Security – Platforms & Services
BAE Systems, Inc.
NISPPAC Industry Spokesperson

Vincent L. Jarvie
Vice President, Corporate Security
L-3 Technologies, Inc.

Curtis H. Chappell
Director of Corporate Security
Thales Defense & Security, Inc.

Security risk assessments regarding classified government contracts for contractors under Department of Defense/Defense Security Service security cognizance are moving from the NISPOM to a more tailored, case-by-case approach – a transition that has significant implications for industry stakeholders. This expert panel will shed light on the intricacies of NISPOM from the perspectives of the government, industry and private practice. The conversation will also revolve around practical guidance for industry moving forward.


Co-Chairs’ Closing Remarks and Summit Concludes


* denotes invited speaker, check the event website for program updates.