Day 1 - Monday, April 6, 2020

Registration and Continental Breakfast
Co-Chair’s Opening Remarks

Chris Griner
Stroock & Stroock & Lavan LLP

DCSA Keynote Address

Ben Richardson
Deputy Director, Information and Industrial Base Protection
Defense Counterintelligence and Security Agency (DCSA), Department of Defense

The Shifting Landscape of Expectations for Outside Directors and Proxy Holders

Drew Winneberger
Proxy Holder – Trustwave
Outside Director – Amec Foster Wheeler

John Kabealo
Kabealo PLLC

  • Examining the evolving requirements related to the roles and qualifications of Outside Directors/Proxy Holders in the National Industrial Security Program
  • Making sense of the proposed forms related to the nomination and evaluation of OD/PHs
  • What is newly required of OD/PH’s in terms of post-appointment DCSA training programs related to their duties as directors or proxy holders?
  • Best practices for complying with the new requirements and overcoming potential disclosure concerns

Morning Coffee Break
Oversight of DoD Cybersecurity Requirements for Industry

  • Analyzing the Cybersecurity Maturity Model certification for contractors
  • Understanding the steps necessary to achieve each level of the new certification program
  • How DCSA intends to integrate the Cybersecurity Maturity Model with the other IT security requirements for unclassified systems (including Electronic Communications Plans and NIST SP 800-171)?

Networking Luncheon
The Current State of National Interest Determinations (“NID”): Understanding the Requirements and Navigating the Procurement Process

Chad A. Nix
Corporate Security Officer
Ultra Electronics Defense, Inc. (UEDI)

Rick Ramsey
Director of Security

Mick Tuesley
Simpson Thacher & Bartlett LLP

  • Understanding when a NID is required and for which entities
  • Navigating the NID process and best practices for contractors that require NIDs
  • Analyzing the most recent NID policy changes and what their implications are
  • Assessing the most common challenges in procuring a NID

Risk-Based FOCI Mitigation: What Has and Hasn’t Worked?

Stanley J. Borgia
Vice President Corporate & Defense Program Security
Rolls-Royce North America Inc.

Gerard F. Amann
General Counsel & Secretary Chief Ethics & Compliance Officer
Accenture Federal Services

  • The current usage and outlook for the future use of Tailored Security Plans (“TSP”)
  • Best practices and potential pitfalls for drafting and implementing TSPs
  • Strategies for identifying FOCI and other risks that must be addressed in a TSP
  • The future of TSPs: Will ancillary FOCI mitigation plans (e.g., ECP, AOP) continue to be required or will they be rolled into the TSP framework

Networking Break
The Interplay of FOCI and the New Proposed CFIUS Regulations

Shannon Reaves
Special Counsel
Stroock & Stroock & Lavan LLP

  • Assessing how the new FIRRMA regulations and FOCI mitigation will coexist going forward – how can the two regimes work together?
  • Developing a strategy for managing the FOCI and CFIUS review processes concurrently
  • Analyzing the effects that FIRRMA has on companies at varying points in the FOCI mitigation and CFIUS approval processes
  • Best practices for coordinating with the U.S. government, transaction parties, and outside counsel

Affiliated Operations Plans (“AOP”): Employing Best Practices and Avoiding Common Pitfalls

Jennifer Brown
Director of Security & FSO/TCO
iDirect Government LLC

  • Identifying potential affiliated operations that make sense, or whether you are already engaging in affiliated operations
  • Best practices and pitfalls to avoid when drafting and submitting an AOP
  • Key strategies for mitigating and managing affiliated operations
  • Developing internal steps to ensure you are properly mitigating potential risks

Conference Ends – Champagne Roundtables