NSI IMPACT Kick-Off! MONDAY, APRIL 14

NSI IMPACT Kick-Off! MONDAY, APRIL 14

IMPACT KEYNOTE

American Industry Under Siege: Unmasking the Strategy and Tactics of Foreign Espionage Operations

Foreign Espionage is Costing the U.S. Defense Industry

Alan Kohler, former Assistant Director of FBI Counterintelligence; President, Pamir Consulting 

As someone responsible for protecting classified information, controlled unclassified information (CUI), and other sensitive assets, staying ahead of foreign espionage tactics is critical. The people who rely on you need accurate, up-to-date intelligence on these threats. This keynote gives you firsthand insight from a former FBI Counterintelligence Assistant Director, equipping you with the knowledge to strengthen your organization’s defenses. Foreign espionage operations are accelerating, becoming more aggressive and sophisticated, and no organization—large or small—is beyond their reach.

Foreign intelligence services are waging an aggressive campaign to steal classified information, strategic technologies, and intellectual property from U.S. defense contractors, research institutions, and government agencies. The financial and national security consequences are staggering—and security professionals are the first line of defense.

With decades of experience leading counterintelligence operations at the FBI, Alan Kohler brings rare, first-hand insights into how America’s adversaries infiltrate businesses and exploit vulnerabilities. In this intelligence-driven briefing, he will reveal the tradecraft, targets, and tactics behind modern espionage operations. You’ll leave with a sharper understanding of how America’s adversaries operate, what’s at stake for your organization, and how to bring this intelligence back to your team, SMO, and leadership.

As a Senior Security Leader

Ensuring your team is prepared to counteract sophisticated espionage threats is a top priority. The people who rely on them need clear, up-to-date intelligence to recognize and respond to these risks. By sending your staff to this keynote, they will gain firsthand insight from a former FBI Counterintelligence Assistant Director, equipping them with the knowledge to strengthen your organization’s defenses. Foreign espionage operations are accelerating, becoming more aggressive and sophisticated, and no organization—large or small—is beyond their reach.

As a Business Leader

Protecting your company’s intellectual property and sensitive information is vital to maintaining a competitive edge and fulfilling contractual obligations. The people who rely on your security team need accurate, up-to-date intelligence to stay ahead of evolving threats. Authorizing them to attend this keynote ensures they receive direct insights from a former FBI Counterintelligence leader, giving them the knowledge to safeguard your business interests effectively. Foreign espionage operations are accelerating, becoming more aggressive and sophisticated, and no organization—large or small—is beyond their reach.

  • Who’s targeting the U.S.? Understand the nation-state actors behind modern espionage operations.

  • How espionage actually works, from recruitment strategies to cyber-enabled threats.

  • The economic and security impact espionage has on U.S. industry, small businesses, and national defense.

  • Emerging threats, including how AI, cyber warfare, and supply chain infiltration are reshaping espionage operations.

  • Actionable intelligence you can bring back to your team and leadership to strengthen awareness and defense.

Threats and National Security

DCSA 2025 – Meeting New Security and Compliance Challenges Together with Industry

DCSA is in the middle of an historic transformation, which means whether you realize it or not you are too — Are you ready for it?

Daniel Lecce, Deputy Director, DCSA Invited

If you are responsible for staying ahead of compliance expectations, risk trends, and evolving security oversight, hearing directly from the DCSA Deputy Director gives you the latest insights on where DCSA is focused and how those priorities impact your role. This is your opportunity to get ahead of the curve—stay informed, stay prepared, and ensure your security program is in step with DCSA’s vision for 2025.

This session helps you anticipate challenges before they become issues, align your security program with DCSA’s expectations, and confidently communicate security priorities to your leadership, SMO, and workforce.

New priorities, policy updates, and shifting oversight strategies will directly impact how FSOs and security professionals manage compliance in 2025 and beyond.

In this keynote, Deputy Director Daniel Lecce will outline DCSA’s top compliance and security priorities for the year ahead, helping FSOs understand what’s changing, what’s staying the same, and what it means for cleared industry. Beyond compliance, this session will provide insight into DCSA’s broader focus areas, including counterintelligence, supply chain security, cybersecurity risk management, and industry engagement—ensuring FSOs understand both the regulatory requirements and the national security imperatives behind them.

As a senior security leader, you need your team to stay ahead of DCSA’s evolving compliance expectations and oversight priorities. This session ensures they hear directly from the DCSA Deputy Director—giving them the most up-to-date insight on where DCSA is focused, what risks are shaping security oversight, and how industry is expected to respond.By sending them to this session, you equip your security staff with the authoritative guidance they need to align your program with DCSA’s expectations and proactively manage emerging risks—helping your organization remain both compliant and secure.

As a business leader in a smaller defense contractor, DCSA oversight directly impacts your company’s ability to maintain security clearances and remain contract-ready. Ensuring your security personnel fully understand DCSA’s priorities and evolving expectations is critical to protecting your business.By approving their attendance, you are ensuring that your security team receives the latest insights from DCSA leadership—so they can implement the right compliance measures, reduce risk to the business, and maintain your company’s ability to meet security requirements efficiently.

  • DCSA’s 2025 Strategic Priorities – What they mean for FSOs, cleared industry, and security professionals.

  • Evolving Compliance & Oversight Expectations – What’s changing, what’s staying the same, and what’s next.

  • Beyond Compliance: The National Security Mission – How DCSA’s role extends beyond audits to counterintelligence, supply chain security, and emerging threats.

  • Cyber & Technology Risk in 2025 – DCSA’s evolving expectations for industry-led security in an era of AI, cyber espionage, and digital vulnerabilities.

  • The Future of Compliance & Collaboration – What to expect from inspections, industry-led compliance, and DCSA’s engagement strategy.

DCSA leadership sets the tone for how security professionals should prioritize their efforts. This session ensures you walk away with clarity on expectations, insight into regulatory trends, and the knowledge to keep your security program aligned and audit-ready—while also strengthening your role in the national security ecosystem.

Compliance and Audit Readiness 

Spark a Security Culture That Energizes Everyone Around You

Learn How to Turn Security from a ‘Compliance Burden’ into a Shared Mission

James Kennedy – Executive Director, Government Security, Boeing

As a security professional, you play a pivotal role in shaping your organization’s security culture. When security is embraced as a shared value rather than just a compliance requirement, you face fewer roadblocks, gain stronger leadership support, and see employees proactively contributing to security rather than resisting it. A strong security culture also enhances your ability to influence, reduces frustration with policy enforcement, and makes security a more natural, integrated part of the workplace. This session provides actionable insights from a proven leader on how to inspire and energize those around you, equipping you with techniques to engage colleagues, promote security awareness, and foster an environment where security is everyone’s responsibility.

Security culture is contagious—it can either be an uninspired checklist exercise or a dynamic, team-driven force that gets real results. The difference? It starts with how security professionals lead the charge. Whether you’re a team of one or leading a security department, you have the power to create an engaged, security-first mindset across your organization.

Join James Kennedy, Executive Director of Government Security at Boeing, as he breaks down how to spark a lasting security culture shift, gain leadership buy-in, and transform security from an obligation into a shared mission that employees embrace.

As a Senior Security Leader

A security program is only as effective as the culture that supports it. Without strong cultural buy-in, policies become harder to enforce, employees disengage, and security risks increase. By sending your team to this session, you ensure they gain proven strategies from Boeing’s security leadership on how to make security an integrated, everyday priority in your organization. A stronger security culture reduces compliance resistance, improves collaboration between security and business functions, and leads to a more resilient workforce—making your job easier and your security program more effective.

As a Business Leader

A strong security culture does more than just protect classified information—it creates a more efficient, compliant, and risk-aware workforce. When security is seen as a shared responsibility rather than a burden, incidents decrease, compliance friction is reduced, and employees work more seamlessly within security expectations. Approving your security personnel’s attendance at this session ensures they gain proven methods from Boeing’s security leadership on how to embed security awareness into daily operations, creating an environment where security actively supports your company’s business goals rather than disrupting them.

  • Catalyzing a Security Culture Shift – Practical ways to inspire engagement, even if you’re the only security professional in your organization.

  • The Ripple Effect – How an energized security approach influences teams, leadership, and company-wide awareness.

  • Bridging Security & Business Priorities – Turning compliance-driven mandates into collaborative security initiatives.

  • Leadership Buy-In Strategies – Positioning security as a business advantage that executives champion and employees value.

  • Sustaining Long-Term Culture Change – Actionable techniques to keep security awareness strong beyond initial rollouts.

This session delivers clear, real-world strategies to build a security culture that employees rally behind—without needing a massive budget or dedicated security team. Walk away with a plan to engage leadership, inspire employees, and make security a natural part of how your business operates.

Stakeholder Skills • Continuous Improvement

Adversary Briefing: Russia’s Evolving Security and Intelligence Threats

Russia’s Intelligence Operations Are a Persistent Threat—Here’s What Security Professionals Need to Know

Glenn Corn – former Senior Executive, Central Intelligence Agency

Understanding the dynamic nature of Russia’s security and intelligence operations is crucial for effectively safeguarding your organization’s sensitive information. Russian intelligence threats are constantly evolving, and staying ahead of their tactics is critical to protecting classified information, controlled unclassified information (CUI), and emerging technologies. This session provides direct insights from Glenn Corn, a former CIA Senior Executive, giving you a clearer picture of Russia’s intelligence priorities, methods, and areas of focus. You’ll leave with a better understanding of the risks your organization faces and how to ensure security measures align with today’s threat landscape.

Russia’s intelligence operations remain one of the most aggressive and sophisticated threats to U.S. national security, targeting defense contractors, critical infrastructure, and research institutions to steal sensitive information and undermine U.S. strategic capabilities. Understanding the bigger picture—who is behind these efforts, what their ultimate goals are, and how they operate—is critical for FSOs and security professionals responsible for protecting classified and sensitive information.

Glenn Corn, a former senior executive with the CIA, will provide an inside look at Russian intelligence operations, breaking down real-world espionage cases, evolving tactics, and key vulnerabilities that adversaries exploit. This session will equip you with the intelligence needed to communicate risks to leadership, engage employees, and strengthen security awareness across your organization.

As a senior security leader, you need your team to stay ahead of evolving security threats, including the persistent and adaptive tactics used by Russian intelligence. This session provides them with expert insights into Russia’s current intelligence operations, helping them better assess risks, anticipate potential vulnerabilities, and ensure security policies reflect the latest threat intelligence. By sending your team, you give them access to critical knowledge that will help them reinforce your security posture and make more informed decisions in countering foreign intelligence risks.

As a business leader, you know that protecting your company’s sensitive information isn’t just a compliance requirement—it’s essential to maintaining contract eligibility and business stability. Russian intelligence services and affiliated actors continue to target defense contractors, supply chains, and critical technologies. Approving your security personnel’s attendance at this session ensures they gain a broader understanding of the risks Russia poses, helping them align security strategies with evolving threats and communicate these risks effectively to leadership. A well-informed security team reduces blind spots, strengthens compliance, and reinforces your company’s commitment to protecting national security interests.

  • How Russia’s intelligence operations have evolved—their strategic objectives and how they align with broader geopolitical goals.
  • The sectors and programs most at risk—who they’re targeting and why.
  • Real-world espionage cases that illustrate the impact of Russian intelligence on U.S. national security.
  • How FSOs and security professionals can translate intelligence insights into organizational vigilance.

Seats are limited—register now to gain a clearer understanding of Russia’s evolving security threats and their impact on industrial security.

Threats and National Security

DCSA’s 2025 Industrial Security Priorities & Expectations – What’s Changing and How to Adapt

DCSA’s oversight is evolving—are you up to speed and ready to adapt?

Matthew Redding, Assistant Director, Industrial Security, DCSA

If you are responsible for implementing security policies, preparing for compliance inspections, and managing industrial security programs, this session provides a direct update on DCSA’s evolving oversight priorities. You will leave with a clear understanding of what’s changing in industrial security, how to adapt proactively, and what DCSA expects from your security program.

DCSA’s industrial security priorities continue to evolve, shaping how cleared industry must approach compliance, insider threat programs, and facility security. But as oversight shifts and new initiatives roll out, how can FSOs effectively implement these requirements while balancing operational realities?

In this session, Assistant Director Matthew Redding will break down DCSA’s 2025 priorities and enforcement trends, providing security professionals with a clearer picture of what’s changing, what’s staying the same, and how industry can stay ahead of evolving expectations. Beyond compliance, this session will also highlight the real-world execution challenges FSOs face—offering guidance on how to maintain security effectiveness without unnecessary operational friction.

As a senior security leader your team is responsible for implementing DCSA’s evolving security requirements—are they prepared for what’s changing? This session provides direct updates from DCSA’s leadership on industrial security oversight, compliance shifts, and risk-based security priorities. By sending your team to this session, you ensure they gain the knowledge needed to proactively adjust security policies, prepare for evolving compliance requirements, and strengthen their ability to support your organization’s security objectives.

As a business leader your ability to maintain DoD contracts depends on meeting DCSA’s evolving security oversight requirements. If your security team isn’t fully aligned with DCSA’s latest priorities, you risk compliance gaps that could affect your business. By approving their attendance at this session, you ensure your security staff receives firsthand guidance from DCSA leadership—helping them implement security measures that protect your company’s contract eligibility while minimizing operational disruption.

  • DCSA’s 2025 Industrial Security Priorities – What’s driving oversight changes and how they impact FSOs.
  • Policy Updates & Implementation Challenges – How new and evolving policies will affect compliance processes, inspections, and security program management.
  • Beyond Compliance: Understanding the Risk Factors – Why DCSA is shifting focus in key areas such as insider threats, supply chain security, and counterintelligence risks.
  • Where Industry Must Lead vs. Where Oversight is Tightening – Clarity on where FSOs need to take greater initiative and where DCSA is increasing its enforcement role.
  • Best Practices for Compliance Execution – How FSOs can integrate new requirements efficiently, ensure smooth inspections, and keep security programs both effective and audit-ready.

DCSA’s industrial security mission is critical to protecting national security, but compliance doesn’t have to mean inefficiency. This session provides clear, actionable guidance on aligning with evolving DCSA expectations while maintaining operational effectiveness.

Compliance and Audit Readiness 

Insightful Ways to Measure the Security Program’s Impact

Create More Support and Engagement by Speaking the Language of Your Boss 

Latoya Coleman – Executive Director, Enterprise Security Risk Management, ManTech

If you want stronger leadership support for security, the key isn’t just collecting data—it’s knowing how to frame it in a way that decision-makers understand and value. Security professionals often struggle to justify investments or influence priorities because they’re speaking a different language than their boss. This session gives you practical ways to translate security efforts into meaningful insights, even if you don’t have sophisticated tools or a mature reporting structure. You’ll leave with actionable strategies to frame security metrics in ways that resonate, helping you secure buy-in, drive engagement, and demonstrate the real impact of your program.

Measuring security program effectiveness isn’t just about compliance—it’s about communicating impact in a way that resonates with decision-makers. Whether you report to security leadership or business executives, your ability to justify investments, influence priorities, and drive action depends on how well you translate security data into meaningful insights. But what if your organization lacks sophisticated reporting tools? How do you track and present meaningful metrics with limited resources?

This session is designed for security professionals at all levels, especially those in organizations with immature reporting structures, fewer resources, or minimal experience using security metrics. Learn how to collect, analyze, and frame security data in a way that aligns with leadership priorities—without needing advanced tools or analytics expertise. Walk away with strategies to communicate your program’s value effectively, secure leadership buy-in, and drive stronger engagement across your organization.

As a senior security leader, you know that leadership support for security initiatives often depends on how well your team translates security efforts into measurable business impact. Without clear, compelling metrics, securing resources and influencing priorities can be a challenge. By sending your team to this session, you ensure they gain practical methods for collecting and presenting security data in ways that resonate with both security and business leadership—helping you justify investments, align security with organizational priorities, and drive stronger engagement at the executive level.

As a business leader, you need confidence that security investments are delivering real value—but security teams don’t always speak in terms that align with business priorities. Approving your security personnel’s attendance at this session ensures they gain the skills to measure and communicate security impact in ways that support data-driven decision-making. A security program that tracks its effectiveness and presents meaningful insights strengthens leadership alignment, improves resource allocation, and ensures security supports—not disrupts—your organization’s strategic objectives.

  • Choosing the Right Metrics – Which security performance indicators actually matter, even if you’re just starting out?

  • Beyond Compliance Numbers – How to measure the real impact of security initiatives with limited resources.

  • Turning Data into Action – How to present security metrics in a way that resonates with leadership and stakeholders.

  • Driving Continuous Improvement – How to interpret trends, identify weaknesses, and refine security programs over time.

If you’re looking to build confidence in your security metrics, communicate program effectiveness, and secure leadership buy-in, this session will give you the practical strategies to start measuring and improving your security program—immediately.

Continuous Improvement • Stakeholder Skills

IMPACT INDUSTRY PANEL

Communicating Espionage Risks: Turning Skeptics into Advocates

Break Through Skepticism—Make Espionage Threats Real

Kevin Clifton – Head of Intelligence, RAND Corp

Effectively communicating the reality of espionage threats is essential to transforming skepticism into proactive security engagement. This session offers strategic messaging techniques to help you convey espionage risks compellingly, fostering a culture of vigilance and advocacy within your organization.

Many employees and even some leaders believe espionage is a distant threat—something that happens to someone else. But the reality is different: intelligence threats are evolving, targeting organizations of all sizes, and require proactive defense. How do you communicate these risks in a way that resonates, builds trust, and turns skeptics into active participants in security?

In this session you’ll learn strategic messaging techniques that security professionals can use to drive awareness, engagement, and action. Learn how to shift perceptions, avoid common messaging pitfalls, and integrate espionage risk awareness into everyday business conversations.

As a senior security leader, you recognize that organizational buy-in is crucial for effective espionage risk mitigation. By sending your team to this session, they will acquire advanced communication strategies to articulate espionage threats convincingly, transforming skepticism into active support. This investment enhances your team’s ability to foster a security-conscious culture, aligning with your strategic objectives and strengthening your organization’s defenses against intelligence threats.

As a business leader you know protecting your company’s sensitive information requires more than just robust security measures; it demands a workforce that understands and supports security initiatives. Approving your security personnel’s attendance at this session ensures they gain the skills to communicate espionage risks effectively, turning potential skepticism into advocacy. This proactive approach not only safeguards your business interests but also promotes a culture of trust and collaboration, reinforcing your organization’s commitment to security excellence.

  • Breaking Through Skepticism – How to communicate espionage risks in a way that connects with employees and leadership.

  • Messaging Pitfalls to Avoid – Common mistakes security professionals make—and how to fix them.

  • Adapting to Your Audience – Tailoring your message for executives, frontline staff, and key stakeholders.

  • The Power of Storytelling – Why real-world case studies are your most effective engagement tool.

  • Building Allies, Not Just Awareness – Strategies to foster trust and create security advocates across your organization.

  • Sustaining Long-Term Engagement – Balancing urgency without creating fear, fatigue, or resistance.

This session is designed to equip you with practical, field-tested strategies to make espionage risks feel real, drive engagement, and build a culture where employees actively support security’s mission.

Stakeholder Skills • Threats & National Security

Better SETA: Strategies to Improve Your Security Awareness Program

Spend Less Time Fighting Disengagement, More Time on Making Progress

Martin McNair – Security & Emergency Planning, Department of Justice

If you want a security-aware workforce, the challenge isn’t just delivering training—it’s making sure employees engage with it. A great Security Education, Training, and Awareness (SETA) program doesn’t have to be complicated or time-consuming to manage. This session provides you with practical, proven strategies to create awareness initiatives that are more effective while requiring less effort. You’ll learn how to streamline security education, make messaging resonate with employees, and increase engagement without adding more to your plate.

Security awareness training is required—but that doesn’t mean it has to be repetitive, time-consuming, or ineffective. A well-designed Security Education, Training, and Awareness (SETA) program drives real behavior change while reducing workload on security professionals. The challenge? Many SETA programs struggle with engagement, sustainability, and leadership buy-in.

This session delivers practical, field-tested strategies to modernize and streamline SETA programs, ensuring better security awareness, improved compliance, and less effort for security teams.

As a senior security leader, you need security education programs that drive real behavioral change—not just check the compliance box. If security training is disengaging or seen as a burden, it’s not doing its job. This session provides your team with innovative strategies to deliver SETA programs that require less effort to manage but achieve greater impact—helping you reduce compliance risk, improve security culture, and create lasting awareness that strengthens your organization.

As a business leader, you know that a well-informed workforce is one of the strongest defenses against security threats. But security training that is poorly received or resource-intensive can disrupt productivity and waste time. Approving your security team’s attendance at this session ensures they learn how to design and implement SETA programs that engage employees without creating unnecessary operational friction. A more engaged workforce means fewer security incidents, stronger compliance, and a smoother integration of security into daily business operations.

  • Building a High-Impact Awareness Program – Practical engagement strategies that actually change security behaviors.

  • Automation & Pre-Built Resources – How to reduce manual workload while keeping training effective.

  • Common Pitfalls to Avoid – Why many SETA programs fail to engage employees—and how to fix it.

  • Proving Impact with Metrics – How to measure success, demonstrate effectiveness to leadership, and secure ongoing support.

Security professionals don’t just need another compliance-driven training program—they need a sustainable, effective approach that reinforces security behaviors without overloading security teams. This session provides exactly that.

Continuous Improvement • Compliance & Audit Readiness

NSI IMPACT DAY 2 TUESDAY, APRIL 15

NSI IMPACT DAY 2 Tuesday, April 15

IMPACT KEYNOTE

Defending American Innovation: Countering China's Espionage and Economic Manipulation

China’s relentless pursuit of American innovation and industry isn’t a distant threat—it’s happening now. Stay connected to your role in the national security mission. 

William Evanina, former Director of the National Counterintelligence and Security Center, CEO of Evanina Group

The United States faces an unprecedented threat from the Chinese Communist Party (CCP), which employs a comprehensive and aggressive approach to infiltrate and exploit American industries and innovations. This multifaceted strategy includes cyber intrusions, intellectual property theft, and leveraging non-traditional collectors such as business professionals and academics. The economic impact is staggering, with estimated losses ranging from $300 billion to $600 billion annually due to intellectual property theft alone. Beyond economic damage, these actions pose significant risks to national security by compromising critical infrastructure and technological superiority. Understanding and countering these threats are imperative to maintaining America’s global leadership and safeguarding its future.

In this briefing, William Evanina will delve into the intricate tactics employed by China to expand its influence over American innovation and industry. Drawing from his extensive experience in counterintelligence, Evanina will provide a comprehensive analysis of China’s methods, including cyber espionage, insider threats, and the strategic use of economic investments to gain access to sensitive technologies. He will also discuss the vulnerabilities within U.S. infrastructure, such as the widespread use of Chinese-manufactured ZPMC cranes in American ports, which may serve as potential intelligence collection platforms. Evanina will outline actionable strategies for both the public and private sectors to strengthen defenses, protect intellectual property, and ensure the resilience of critical industries against foreign exploitation.

As a security executive you know China’s influence operations pose a direct threat to your organization’s intellectual property, workforce, and supply chain security. Sending your team to this session ensures they gain critical counterintelligence insights from William Evanina—insights that will help them detect, disrupt, and defend against economic espionage, insider threats, and foreign influence efforts targeting your industry. This session arms them with actionable strategies to strengthen your security posture and prevent adversaries from exploiting your vulnerabilities

As a business leader, your company’s competitive edge—and national security—depends on protecting proprietary innovations from foreign exploitation. China’s coordinated efforts to acquire U.S. technology and economic influence put your business at risk through supply chain vulnerabilities, insider threats, and strategic investment tactics. This session equips your team with intelligence-driven strategies to mitigate these risks, ensuring your organization remains resilient against foreign adversaries seeking to undermine America’s economic and technological leadership.

  • Comprehensive Understanding of the Threat Landscape: Gain insights into the sophisticated and persistent strategies utilized by China to infiltrate and influence American industries and innovation.
  • Economic and National Security Implications: Recognize the profound impact of intellectual property theft and industrial espionage on the U.S. economy and national security, with losses amounting to hundreds of billions annually.
  • Identifying Vulnerabilities: Learn about specific areas of concern, such as the integration of Chinese technology in critical infrastructure, which may serve as conduits for intelligence gathering and potential disruption.
  • Strategic Countermeasures: Acquire actionable strategies for government entities, private sector leaders, and academic institutions to protect intellectual property, enhance cybersecurity measures, and fortify supply chains against foreign interference.
  • Collaborative Defense Framework: Understand the necessity of a unified approach that combines efforts from federal agencies, state and local governments, industry stakeholders, and academia to effectively counteract and deter China’s expansive influence operations.

Threats and National Security

IMPACT INDUSTRY PANEL

Mastering SMO Engagement and Cross-Functional Relationships

Improve Your Ability to Successfully Engage Business Leaders and Colleagues

Moderator: Jim Kennedy, Boeing

Panelist: Pat Gould, Director Enterprise Threat Awareness, Peraton

Panelist: Kari Phillips, Security Director, SAIC 

Panelist: Amanda Ward, Group Supervisor Compartmented Security, Johns Hopkins University, APL 

A disengaged SMO can leave you navigating security challenges alone—but an engaged SMO can be a force multiplier for your program. Getting leadership buy-in isn’t just about compliance; it’s about ensuring security is positioned as a business priority. This session provides you with practical, field-tested strategies for working with an SMO who may not be fully engaged, documenting interaction for DCSA expectations, and ensuring security remains on leadership’s radar. You’ll also learn how to expand your influence beyond the SMO—building stronger collaboration with HR, IT, legal, and other key business functions.

Your Senior Management Official (SMO) is responsible for your facility’s industrial security program under NISPOM, but that doesn’t guarantee meaningful engagement. Security professionals must bridge the gap—proactively driving conversations, making security relevant to leadership, and securing buy-in.

But SMO engagement is just one piece of the puzzle. Security leaders also need cross-functional collaboration to integrate security into legal, HR, IT, and operations—ensuring it’s embedded in business decisions, not just a compliance afterthought.

Join this session to hear from security professionals who have successfully navigated leadership dynamics, strengthened SMO engagement, and built productive cross-functional relationships. Learn what works, what doesn’t, and how to document engagement in ways that meet DCSA expectations.

As a senior security leader, you know that meaningful SMO engagement isn’t automatic—it requires proactive effort to make security relevant and actionable for leadership. A strong SMO relationship can lead to better resourcing, stronger program credibility, and smoother DCSA interactions. This session gives your team the tools to work more effectively with leadership, ensure SMO responsibilities under NISPOM are fully met, and document engagement in ways that align with compliance requirements. It also provides insight into expanding security’s role beyond leadership, building partnerships across HR, IT, and legal to integrate security into broader business decisions.

As a business leader, you rely on your security team to protect classified information and maintain compliance—but security shouldn’t operate in a silo. A security team that effectively engages with leadership and other business functions strengthens your organization’s ability to manage risk, avoid compliance pitfalls, and operate efficiently. Approving your security team’s attendance at this session ensures they gain practical strategies for engaging SMOs, securing leadership buy-in, and embedding security into business decision-making. The result? A security function that is not just meeting compliance obligations but actively contributing to business success.

  • Lessons from the Field – Real-world insights from security professionals on engaging SMOs and cross-functional teams.

  • Managing Up for Impact – How to work with an SMO who is passive or disengaged—and apply the same principles to other functions.

  • Tailoring Security Messaging – Making security relevant and actionable for leadership and cross-functional colleagues.

  • Documenting Engagement for DCSA – Creative ways to show consistent interaction and compliance readiness.

  • Optimizing Leadership Briefings – The right cadence, topics, and strategies to keep leadership informed and prepared for audits.

This session delivers practical, experience-driven strategies that you can implement immediately to build SMO relationships, strengthen cross-functional engagement, and position security as a business priority.

Stakeholder Skills • Compliance & Audit Readiness

Clearing the Path: Insider Advice on Solving Security Clearance Challenges

Clearance roadblocks can stall critical work—what should you be doing to prevent delays? What should you expect from the process? What should you tell your leadership?

Perry Russell-Hunter, Director, Defense Office of Hearings and Appeals (DOHA)

Navigating the complexities of the security clearance process can be daunting, with challenges that may delay or jeopardize your eligibility. This session offers direct insights from Perry Russell-Hunter, Director of DOHA, providing you with expert advice on overcoming common obstacles in security clearance applications and renewals. By attending, you’ll gain a deeper understanding of the adjudication process, learn strategies to address potential issues proactively, and enhance your ability to maintain or obtain the necessary clearances for your role.

Security clearance challenges can delay or derail mission-critical work, but proactively guiding personnel through the process can prevent unnecessary setbacks. FSOs don’t just need to understand why clearances get denied or delayed—they need to know what to tell employees about self-reporting, financial concerns, foreign contacts, and appeals before these become clearance issues.

In this session, DOHA Director Perry Russell-Hunter will provide insider insights into the most common clearance challenges, trends in adjudications, and practical steps FSOs can take to ensure personnel understand how to protect their eligibility and avoid clearance delays.

As a senior security leader, ensuring that your team maintains the necessary security clearances is vital for operational continuity and mission success. This session provides your staff with authoritative guidance on navigating the clearance process, identifying common pitfalls, and implementing best practices to prevent denials or revocations. By participating, your team will be better equipped to manage clearance-related challenges, thereby reducing risks to your projects and maintaining compliance with security requirements.

As a business leader, the ability of your organization to secure and retain contracts often hinges on employees possessing the appropriate security clearances. Delays or issues in the clearance process can lead to project setbacks and financial implications. Approving your security personnel’s attendance at this session ensures they acquire the knowledge to effectively manage and expedite clearance processes, minimizing disruptions and safeguarding your organization’s reputation and contractual obligations.

What FSOs Need to Tell Their People Proactively:

  • Financial Issues & Debt Risks – How personnel can avoid financial red flags that jeopardize clearances and what FSOs should tell them before financial issues escalate.
  • Marijuana & Drug Use – What FSOs should be explaining about drug policies, changing state laws, and how past use vs. current use is evaluated.
  • Foreign Influence & Social Media – How FSOs should guide personnel on foreign contacts, social media activity, and travel disclosures to prevent clearance risks.
  • Self-Reporting vs. Discovery – What FSOs should be telling employees about self-reporting issues (e.g., financial hardship, foreign ties) and how DOHA views self-reporting vs. undisclosed concerns.
  • How Adjudicators View Clearance Decisions – What FSOs should explain to employees about how cases are evaluated, what common denial reasons are, and what happens if a clearance is challenged.

What FSOs Need to Know & Do:

  • Where FSOs Can Prevent Clearance Issues Before They Start – Identifying patterns that lead to clearance delays and denials.
  • Key Trends in Adjudications & Risk Areas for 2025 – What DOHA is prioritizing and what’s changing in the clearance landscape.
  • How FSOs Can Keep the Clearance Process Moving – Practical actions to minimize delays and ensure smooth adjudications.

Compliance & Audit Readiness

Cybersecurity 2025: Defending Against Cyber Attacks on the Defense Sector

Prepare for the Cyber Threats of Tomorrow—Today

Christina Walter – Chief, NSA Cybersecurity Collaboration Center invited

In 2025, cyber threats are becoming more sophisticated, with adversaries leveraging advanced technologies like artificial intelligence to breach defenses. Understanding these evolving threats is crucial for protecting your organization’s sensitive information. This session offers insights into the latest cyber threat landscape, providing you with strategies to anticipate and counteract these challenges effectively. By staying informed, you can enhance your security measures and safeguard your organization’s critical assets.

The landscape of cyber threats is evolving rapidly, with adversaries constantly refining their tactics to breach defense sector networks. From AI-powered intrusions to sophisticated supply chain attacks, defense contractors and critical infrastructure are increasingly vulnerable. How can you prepare for the unprecedented challenges ahead?

Join Christina Walter, Chief of NSA’s Cybersecurity Collaboration Center, for an exclusive, intelligence-driven session. Gain an insider’s view of the evolving cyber threats set to target defense contractors in 2025 and learn what you can do to fortify your organization now.

As a senior security leader, it’s imperative to ensure your team is prepared to face the rapidly evolving cyber threat landscape. This session provides them with up-to-date knowledge on emerging threats and effective defense mechanisms. By attending, your team will be better equipped to develop and implement strategies that protect your organization’s critical information and infrastructure, aligning with your overarching security objectives

As a business leader, protecting your company’s intellectual property and sensitive data is essential for maintaining a competitive edge and fulfilling contractual obligations. Authorizing your security personnel to attend this session ensures they are informed about the latest cyber threats and defense strategies. This knowledge empowers them to implement robust security measures, minimizing the risk of cyber incidents that could disrupt business operations and damage your organization’s reputation.

  • 2025 Cyber Threat Landscape – Discover the top emerging threats targeting defense contractors and critical infrastructure, and why you should care today.
  • Adversary Tactics Uncovered – Learn how nation-state actors and cybercriminal groups are adapting their tactics to bypass traditional defenses.
  • NSA’s Insight for FSOs – Understand NSA’s latest guidance and how it helps security professionals navigate these advanced threats.
  • Fortify Your Cyber Defense – Practical, actionable steps to improve your organization’s cybersecurity posture, from securing your supply chain to implementing zero-trust architectures.
  • AI in Cyber Warfare – Explore the role of AI in the next generation of cyberattacks and the steps you can take to stay ahead.

This session is a must-attend for FSOs and security professionals who are committed to securing their organizations and staying ahead of the latest cyber threats.

Threats and National Security

IMPACT CSO PANEL

Pride of Work: Leadership, Influence and Career Growth

Don’t Miss this Rare Opportunity to Hear Top Industry CSOs Share Their Best Advice

Bob Trono, CSO, Lockheed Martin

Sharon Claridge, VP, Security Services, Booz Allen Hamilton 

Scott King, CSO, Invictus 

Moderator: Mitch Lawrence, Lawrence Solutions

Security professionals do work that is critical to national security and business success, yet their impact is often misunderstood or undervalued. If you want to increase your influence, gain buy-in for security initiatives, and position yourself for career growth, you need to know how top security leaders do it. This exclusive panel of CSOs will provide real-world insights on what separates high-impact security professionals from those who struggle to be heard. You’ll leave with strategies for building executive relationships, demonstrating security’s value in ways that resonate, and developing the leadership skills that open doors to new opportunities.

Security professionals do work that matters—not just to their organizations, but to national security and the stability of the defense industrial base. Yet despite its significance, security is often misunderstood or undervalued, requiring professionals to build influence, secure buy-in, and communicate security’s impact in ways that resonate across the business.

Not every security professional aspires to be a CSO, but all want to be effective, strengthen their influence, and ensure their contributions are recognized. Whether your goal is to advance into leadership, build a high-performing security program, or elevate security’s role within your organization, this exclusive panel of senior security leaders will provide insights and strategies from professionals who have successfully done it.

As a senior security leader, you know that security’s success isn’t just about technical expertise—it’s about influence, executive alignment, and the ability to position security as a strategic enabler. This panel gives your team direct access to the leadership insights of top CSOs, providing them with real-world strategies for gaining buy-in, communicating priorities effectively, and demonstrating security’s value to senior leadership. By attending, your team will be better equipped to drive impact, strengthen cross-functional relationships, and elevate security’s role within the organization.

As a business leader, you understand that security plays a vital role in protecting your company’s operations, reputation, and compliance obligations—but security’s effectiveness depends on how well it integrates with broader business priorities. Approving your security team’s attendance at this panel ensures they gain insights from experienced CSOs on how to align security with business goals, improve executive engagement, and demonstrate measurable value. A security function that is well-positioned within leadership circles strengthens decision-making, ensures resources are used effectively, and minimizes business disruptions.

  • From Security Expert to Strategic Enabler – Why shifting your mindset is critical for career growth.
  • The Leadership Traits That Drive Impact – What top security leaders do differently—and how to develop these skills at any career stage.
  • Executive Engagement Strategies – How to present security priorities in ways that secure buy-in and funding.
  • Building Influence Beyond Security – How to demonstrate value to cross-functional peers and gain stronger cooperation.
  • Soft Skills That Matter – The most important communication and leadership skills—and how to develop them.
  • Making an Impression on Executives – What works, what doesn’t, and what gets remembered in senior leadership discussions.

This insightful, real-world discussion will help you refine your leadership approach, increase your influence, and take pride in the critical role security plays in both business success and national security.

Continuous Improvement • Stakeholder Skills

CMMC '25: What’s Real, What’s Not & How to Keep Your Contracts

CMMC is no longer a future problem—it’s here. Cut down the high level noise and get clear, no-fluff answers.

Shayla Treadwell, Deputy CSO, Lumen Technologies

You’re on the front lines of navigating CMMC compliance, and the pressure is real. Audits are happening. Contracts are on the line. The rules keep shifting. You don’t have time for another high-level compliance discussion—you need clear, direct answers on what to do next.

  • This session will give you:
    The straight truth about CMMC enforcement—no fluff, no guesswork.
  • A tactical plan to get compliant—even if you’re behind.
  • Insights from C3PAO expectations—what they actually look for in an audit.
  • Ways to cut through leadership roadblocks and get the resources you need.

If you need to pass a CMMC audit, protect your contracts, and avoid wasting time on unnecessary compliance work, this session is for you.

CMMC is no longer a future problem—it’s here. Assessments have started, requirements are tightening, and contractors who aren’t prepared risk losing business. But with so much noise around CMMC, what actually matters right now? This session delivers clear, no-fluff answers on:

  • What’s real vs. what’s just hype in CMMC enforcement.
  • How to pass an audit—even if you’re not 100% ready.
  • What C3PAOs actually focus on during assessments.
  • How to prioritize compliance when time and budget are limited.
  • The best way to get leadership to take CMMC seriously.

If you’re tired of CMMC confusion and want a real, tactical plan to protect your contracts, this session is for you.

As a senior security leader, CMMC compliance is no longer a distant requirement—it’s here, and failure to meet the standard could mean losing DoD contracts. But with limited resources, shifting guidance, and increasing scrutiny from C3PAOs, managing compliance without overwhelming your team is critical. This session will help you prioritize high-impact actions, avoid unnecessary complexity, and ensure your organization remains eligible for government work.

As a business leader, DoD contracts are the lifeblood of your company—but without meeting CMMC requirements, your ability to compete is at risk. Compliance isn’t just an IT or security issue; it’s a business survival issue. This session will help you understand what’s really required, how to minimize compliance costs, and the smartest way to ensure your company passes an audit and keeps its contracts.

  • The reality of CMMC enforcement in 2025—what’s changing, what’s not, and what it means for your contracts.
    What C3PAOs actually care about in an audit and the common reasons companies fail.
  • How to implement a “minimum viable compliance” approach when time and budget are tight.
  • How to make executives see CMMC as a business risk and get them to fund compliance efforts.
  • The fastest way to document compliance properly—without getting buried in paperwork.

Compliance & Audit Readiness

IMPACT INDUSTRY PANEL

The Art of Compliance: Aligning NISPOM Requirements with Operational Realities

Leverage Gray Areas of NISPOM to Earn Trust and Cooperation for Your Program

Mitch Lawrence, Lawrence Solutions

Catherine Kaohi, CEO, C.S. Consulting 

Patricia Brokenik, Security Director, General Dynamics

Richard Ray, FSO, Eutelsat America Corp 

Compliance is non-negotiable—but how you implement it makes all the difference. Security professionals constantly balance the need to meet NISPOM requirements with the realities of their organization’s operations. A rigid, check-the-box approach can create inefficiencies, while a well-integrated compliance strategy can enhance both security and business performance. This session provides insights from experienced industry leaders on how to make compliance work for you, not against you. You’ll walk away with strategies for streamlining security processes, maintaining compliance, and ensuring security requirements align with your organization’s mission.

Compliance isn’t about checking boxes—it’s about integrating NISPOM requirements into the way your organization actually operates. But in reality, bridging the gap between regulatory expectations and day-to-day business needs isn’t always straightforward. Security professionals must navigate gray areas, competing priorities, and operational constraints that make strict rule-following impractical.

This session goes beyond theory, providing practical strategies for making compliance work within real operational environments—without unnecessary friction. Hear directly from security professionals who have successfully balanced compliance mandates with business realities, learning what works, what doesn’t, and how to apply compliance principles with confidence and flexibility.

As a senior security leader, you need compliance to be a strength, not a burden. Security programs that treat NISPOM requirements as rigid mandates rather than adaptable guidelines can struggle with inefficiencies, internal resistance, or unnecessary operational slowdowns. This session equips your team with strategies to apply compliance measures in a way that supports both security and operational success. By attending, they’ll gain practical insights on making security a seamless part of the business—reducing friction, improving audit readiness, and strengthening your organization’s overall security posture.

As a business leader, you recognize the importance of maintaining compliance with NISPOM standards—but you also know that compliance efforts can either support or hinder business operations. An overly rigid approach can slow processes, frustrate employees, and create inefficiencies, while a well-executed compliance strategy strengthens security and business continuity. Approving your security team’s attendance at this session ensures they learn how to implement security requirements in ways that align with your company’s goals—minimizing disruption, maintaining contract eligibility, and ensuring compliance supports rather than obstructs operations.

  • Lessons from the Field – Real-world insights from security professionals who have aligned compliance with business operations.
  • Interpreting NISPOM’s Intent – How to apply compliance principles practically while maintaining audit readiness.
  • Navigating Gray Areas – Strategies for handling ambiguous requirements, conflicting priorities, and operational challenges.
  • Building Internal Buy-In – How to foster cooperation so compliance is a shared responsibility, not just a security burden.
  • Streamlining Compliance Processes – Techniques to reduce friction while ensuring regulatory adherence.

This session is about understanding compliance in context—how to meet regulatory requirements while keeping security programs practical, effective, and aligned with business realities. Walk away with strategies to turn compliance from a challenge into a long-term operational strength.

Stakeholder Skills • Compliance and Audit Readiness 

Security Awareness: How to Supercharge Employee Engagement

Create Authentic Engagement and Awareness Through an Audience-Centered Approach. 

Jeremy Treadwell – President, Treadwell Agency

If you want employees to take security seriously, you need more than just policies and training modules—you need a message that resonates. Too often, security awareness efforts fall flat because they don’t connect with the audience in a way that feels relevant or engaging. This session gives you the tools to understand your “customer”—your employees—so you can tailor security awareness programs that actually drive behavior change. Learn how to shape messaging, overcome resistance, and create a security culture that people buy into, rather than tune out.

Security awareness programs only work if people pay attention and apply what they learn—but too often, security training is generic, ignored, or quickly forgotten. The key to real engagement? Treat employees like customers and design security messaging that speaks to their needs, motivations, and daily realities.

In this practical, strategy-driven session, you’ll learn how to shift from one-size-fits-all training to an audience-centered approach that resonates with employees, drives real behavior change, and strengthens security culture.

As a senior security leader, you know that security awareness is about more than just checking the compliance box—it’s about changing behavior. If employees don’t connect with the message, they won’t change how they act. This session provides your team with proven techniques for making security awareness programs more effective by understanding how employees think, what motivates them, and how to craft messaging that gets real engagement. A security program that resonates with its audience results in fewer preventable incidents and a stronger security culture across the organization.

As a business leader, you know that security awareness is a critical part of reducing risk, but ineffective training can waste time and resources. If security messages don’t engage employees, they won’t stick—and that leaves your organization vulnerable. Approving your security team’s attendance at this session ensures they gain strategies to design awareness programs that actually change behavior, making security a natural part of how employees work. A workforce that understands and actively supports security means fewer incidents, stronger compliance, and a more resilient business.

  • Know Your Audience – How to analyze your workforce like a customer base—understanding different groups’ motivations, learning styles, and risk profiles.
  • Targeted Messaging That Works – How to tailor security awareness for technical vs. non-technical staff, executives, frontline employees, and high-risk roles.
  • Behavioral Science for Engagement – How to frame security messaging so employees actually care.
  • Cutting Through the Noise – Strategies for designing awareness campaigns that stick, using storytelling, repetition, and real-world relevance.

Security professionals aren’t just educators—they’re communicators. Walk away with proven strategies to make security awareness more engaging, more effective, and more impactful across your organization.

Continuous Improvement • Compliance & Audit Readiness

IMPACT DCSA/INDUSTRY PANEL

Proving Insider Threat Compliance: What Does Meaningful Progress Look Like?

Whether you’re building from the ground up or refining a well-established program – what are the achievable next steps to impress DCSA and your leadership?

James Shappell, Director, DoD Insider Threat Management and Analysis Center, DCSA

ITPSO with a developing program – TBD

ITPSO with a mature program – TBD

For Attendees with an Early-Stage Insider Threat Program
DCSA doesn’t expect your program to be fully developed overnight, but they do expect proof that you’re making steady progress. If your program is still developing, it can be difficult to know what steps actually count as meaningful improvement. This session will help you pinpoint the most important actions to take now, hear from a peer ITPSO who’s been in your position, and leave with DITMAC’s latest compliance guidance and practical next steps you can implement immediately.

For Attendees with a More Mature Insider Threat Program
Even a strong insider threat program can lose momentum without continuous improvement. DCSA’s evolving compliance expectations mean that even well-established programs must demonstrate progress and measurable effectiveness. This session will help you refine how you document progress, measure impact, and engage leadership to sustain long-term program success. Learn from a peer ITPSO with a high-performing program and walk away with DITMAC’s insights on what matters most in evaluations—so your program stays compliant, effective, and ahead of emerging risks.

DCSA doesn’t expect perfection—but they do expect steady, measurable improvement. Whether your insider threat program is just getting started or already well-established, the key to compliance is demonstrating progress in a way that aligns with your program’s stage of maturity.

This session, moderated by DITMAC, will break down the key compliance areas DCSA evaluates and provide specific, achievable ways to demonstrate improvement. Instead of treating early-stage and mature programs separately, this session will show how insider threat programs evolve over time—giving you a clear roadmap for making meaningful progress, no matter where you are today.

You’ll hear from two ITPSOs: one leading a developing program and another running a mature, well-integrated insider threat program. They’ll share their real-world experiences, lessons learned, and the practical steps that made the biggest impact in strengthening compliance.

Through this interactive discussion, you’ll leave with:

  • DITMAC’s latest compliance guidance on what counts as meaningful progress.
  • A clear set of actionable steps that align with your program’s current stage.
  • Strategies to demonstrate progress in a way that meets DCSA’s expectations and improves your security rating.

As a senior security leader

Insider threat programs vary widely in maturity—is your team approaching it the right way? Whether they need to focus on compliance fundamentals or build a more advanced threat detection program, this session provides real-world insights into both paths.By sending your team to this session, you ensure they gain a structured understanding of DCSA’s insider threat expectations, learn best practices from organizations at different stages, and return equipped to enhance your company’s approach to insider risk mitigation.

As a business leader

DCSA requires every cleared contractor to have an insider threat program, but smaller companies often struggle to balance compliance with available resources. Understanding the two primary paths to compliance ensures your security staff can implement an effective insider threat program without overextending your business. By approving their attendance, you are giving your security team the tools to meet DCSA requirements efficiently—helping your company reduce risk, stay compliant, and protect its ability to maintain DoD contracts.

For Early-Stage Programs: Practical Steps to Make an Immediate Impact

  • How to meet compliance expectations while showing DCSA measurable progress.
  • Tactical improvements that increase program effectiveness without significant funding or buy-in.
  • How to use early insider threat wins to engage leadership and build momentum.

For More Advanced Programs: Continuous Improvement & Long-Term Success

  • How mature programs evolve to stay ahead of emerging insider threats.
  • What top-tier programs do to strengthen collaboration across business functions.
  • How to demonstrate and measure insider threat program success for continued executive support.

Compliance and Audit Readiness • Continuous Improvement

NSI IMPACT DAY 3 WEDNESDAY, APRIL 16

NSI IMPACT DAY 3 Wednesday, April 16

ISOO ‘25 – What’s Ahead for Security Professionals in Cleared Industry

This is your chance to hear directly from the new ISOO Director.

Michael Thomas, Director, Information Security Oversight Office (ISOO)

This is your chance to hear directly from the new ISOO Director about the key issues shaping the oversight landscape in 2025. Understanding ISOO’s priorities early helps you anticipate compliance expectations, adapt your security program accordingly, and stay ahead of potential policy shifts.

The Information Security Oversight Office (ISOO) plays a critical role in shaping national security classification policy, insider threat initiatives, and compliance expectations for cleared industry. In this exclusive briefing, the newly appointed Director of ISOO will share firsthand insight into the office’s priorities and initiatives for 2025.

This session offers a rare opportunity to hear directly from ISOO’s leadership on the direction of classification policy, compliance expectations, and evolving security challenges. It sets the stage for the NISPPAC industry leaders panel, where security professionals will discuss the practical implications of ISOO’s priorities on cleared industry operations.

As a senior security leader, with a new ISOO Director in place you know that policy priorities and enforcement focus areas may shift. This session gives you direct insight into what’s changing and why, so you can proactively prepare for potential impacts on classification management, compliance obligations, and insider threat initiatives.

As a business leader, be aware that ISOO’s decisions influence classification management, security policy, and compliance oversight for cleared contractors. Hearing from the new Director firsthand ensures you have executive-level awareness of upcoming changes, helping you make informed decisions that align with evolving security policies.

  • Stay ahead of policy shifts—understand which regulations are evolving and how they impact your responsibilities.
  • Turn NISPPAC insights into action—apply working group recommendations to your security program before they become mandates.
  • Prepare for system and process changes—what FSOs need to do now to stay compliant and operationally efficient.

Compliance and Audit Readiness • Stakeholder Skills

IMPACT INDUSTRY PANEL

NISPPAC in Action – Be In The Know, Get Engaged, Get Prepared

Be in the know, ahead of policy shifts and aware of coming changes. Find out how your program will be affected and how to prepare your leadership.

Moderator: Ike Rivers – NISPPAC Industry Spokesperson, CSO at IDA
Dave Tender, CSO, ASRC Federal

As a Facility Security Officer (FSO) or security professional, staying abreast of policy changes within the National Industrial Security Program (NISP) is crucial for maintaining compliance and effectively safeguarding classified information. This session offers direct insights from NISPPAC industry leaders, providing you with the latest updates on policy modifications and practical guidance on how to adapt your security programs accordingly. Engaging with this conversation will equip you with the knowledge to anticipate changes, implement necessary adjustments, and ensure your organization remains aligned with evolving security requirements.

NISPPAC isn’t just about policy updates—it’s about solving real challenges facing FSOs and ensuring industry has a voice in shaping the future of security compliance. But how do these working groups actually influence regulations, and what do security professionals need to understand, anticipate, and act on?

In this FSO-focused briefing, NISPPAC working group leaders will provide insight into policy developments, compliance priorities, and upcoming system changes—helping FSOs connect regulatory shifts to real-world security program decisions.

You Will Learn:

  • What’s changing in key policy areas (FOCI, Insider Threat, NISA, Clearances, Physical Security) and what’s next.
  • How industry recommendations influence government decisions—and how FSOs can engage.
  • What upcoming compliance shifts mean for audits, reporting, and security operations.

As a senior security leader, it’s imperative to ensure your team is prepared for forthcoming changes in industrial security policies. This session provides an opportunity for your staff to hear directly from NISPPAC industry representatives about anticipated policy shifts and their implications. By attending, your team will gain valuable insights into how these changes may impact your organization’s security posture and receive guidance on proactive measures to maintain compliance. This knowledge enables you to strategically plan and allocate resources, ensuring a seamless transition as new policies are implemented.

As a business leader, maintaining compliance with the National Industrial Security Program is essential for your company’s eligibility to handle classified contracts and protect sensitive information. Authorizing your security personnel to participate in this session ensures they are informed about upcoming policy changes directly from NISPPAC industry leaders. This proactive approach allows your team to implement necessary adjustments promptly, minimizing potential disruptions to operations and safeguarding your organization’s reputation. Investing in this knowledge not only ensures compliance but also reinforces your commitment to national security and the integrity of your business operations.

  • Stay ahead of policy shifts—understand which regulations are evolving and how they impact your responsibilities.
  • Turn NISPPAC insights into action—apply working group recommendations to your security program before they become mandates.
  • Prepare for system and process changes—what FSOs need to do now to stay compliant and operationally efficient.

Compliance and Audit Readiness • Stakeholder Skills

IMPACT DCSA/INDUSTRY PANEL

Trusted Workforce 2.0 – Getting a Clear View and Aligning Your Security Program

The shift to continuous vetting is here—how do you plan to keep up and ensure your organization stays compliant? How do you plan to take advantage of this transformation?

MODERATOR: Lindy Kyzer, Vice President, Content, Clearancejobs

Marianna Martineau, Assistant Director for Adjudications, DCSA.

Chakeia Ragin, Deputy Asst. Director, Adjudication and Vetting Services, DCSA

NISPPAC Industry Representative (TBD)

If you are on the front lines of implementing personnel security policies, managing clearance processes, and ensuring compliance—Trusted Workforce 2.0 will bring major changes that directly impact your responsibilities, your interactions with DCSA, and the expectations placed on your security program.

This session ensures you leave with practical, actionable guidance on how to navigate the transition, avoid clearance processing delays, and integrate new adjudication and vetting requirements into your program. You will also be equipped to explain TW 2.0’s impact to leadership—making it easier to secure internal buy-in and resources for successful implementation.

Trusted Workforce 2.0 is modernizing personnel security with continuous vetting, streamlined adjudication, and enhanced clearance mobility. But FSOs are facing uneven implementation, evolving policies, and operational roadblocks as they work to align with the transition.

This session delivers practical, real-world guidance from TW 2.0 leaders and security policy experts, helping FSOs understand where implementation stands today, what they need to prioritize now, and how to adapt their clearance and vetting programs without disruption.

As a senior security leader

Personnel security policies are evolving under TW 2.0—is your team prepared for the changes? Clearance processing, adjudication, and vetting are all being transformed, and your security staff needs to understand what’s changing to keep your workforce compliant and ready for contract work. By sending them to this session, you ensure they gain the practical knowledge needed to navigate the transition, prevent clearance delays, and integrate new personnel security requirements—helping your organization stay ahead of compliance risks.

As a business leader

Your ability to maintain a cleared, compliant workforce directly impacts your company’s contract eligibility. Trusted Workforce 2.0 is bringing major changes, and your security personnel need to be fully prepared to implement the new requirements.By approving their attendance, you are ensuring that your team understands TW 2.0’s impact—allowing them to proactively adjust processes, prevent clearance bottlenecks, and protect your company’s ability to meet DoD security expectations.

  • Continuous Vetting in Practice – What you need to change in clearance processing, incident reporting, and risk assessments as periodic reinvestigations are phased out.
  • Where TW 2.0 Stands Today – What’s implemented, what’s still in development, and what you should prepare for next.
  • Industry Challenges & Compliance Gaps – Where are people struggling with adoption, including reciprocity, adjudication delays, and integrating new vetting procedures.
  • How FSOs Should Prepare – What steps security teams need to take now to update internal policies, train personnel, and ensure their programs are TW 2.0-compliant.

This session is industry-focused, action-driven, and designed to cut through uncertainty. Get clear, practical answers on how to keep your personnel security program aligned with TW 2.0 without unnecessary delays or compliance risks.

Compliance and Audit Readiness • Continuous Improvement

IMPACT DCSA/INDUSTRY PANEL

The FSO/DCSA Dynamic – Go from Transactional Oversight to Transparent Collaboration

Working with DCSA can feel like a balancing act—oversight on one side, the aim for transparency and collaboration on the other. See what healthy partnership can look like.

Justin Walsh – Mid-Atlantic Region DCSA Field Director

Panelists: 3 pairs of DCSA/FSO “teams”

If you are responsible for managing security compliance and preparing for DCSA oversight, the way you engage with your assigned DCSA representative can determine whether your interactions feel strictly transactional or genuinely collaborative.

This session provides real-world examples of strong, effective FSO-DCSA relationships and practical strategies for fostering better communication, trust, and proactive issue resolution. You’ll leave with a better understanding of how to shift from an audit-focused mindset to a collaborative, continuous improvement approach.

How do you turn compliance-driven interactions into a real working relationship built on trust and shared security goals? For FSOs, navigating DCSA oversight is a constant challenge. While DCSA enforces compliance, FSOs rely on them for guidance, risk discussions, and security alignment. The difference between a frustrating, transactional relationship and a productive, supportive one comes down to trust, communication, and proactive engagement.

This session isn’t about theory—it’s about real, proven FSO-DCSA partnerships that work. Hear directly from FSOs and DCSA personnel who have built strong, effective relationships and learn how they navigate challenges, improve collaboration, and align on compliance expectations while advocating for their organization’s security needs.

As a senior security leader

Your team’s relationship with DCSA plays a direct role in your company’s compliance success. A strong, collaborative approach leads to better security outcomes, fewer compliance surprises, and a more proactive risk management strategy. By sending your team to this session, you ensure they gain practical strategies for engaging DCSA representatives effectively, improving compliance transparency, and fostering a working relationship that supports both security and business continuity.

As a business leader

DCSA oversight can feel transactional, but a strong working relationship with your security team can make a difference in compliance success. If your company is only reacting to DCSA audits, you could be missing opportunities to reduce risk and improve security efficiency. By approving your team’s attendance, you ensure they gain insight into how proactive engagement with DCSA leads to a more predictable, collaborative, and business-friendly compliance process—helping your company remain contract-ready.

  • Building a Strong FSO-DCSA Relationship – Lessons from teams who have developed trust and effective communication.
  • Overcoming Common Roadblocks – How to navigate friction points with inspectors and VRO reps.
  • Proactive Strategies for FSOs – Steps you can take to strengthen engagement with DCSA oversight teams.
  • Aligning Compliance with Security Needs – How to ensure DCSA’s expectations support your organization’s security posture.

This session goes beyond the challenges—it delivers practical, real-world strategies from FSOs and DCSA reps who have built trust, improved communication, and made oversight a productive process. Walk away with actionable steps to enhance your own working relationship with DCSA.

Stakeholder Skills • Compliance and Audit Readiness 

Space at NSI IMPACT is limited–Secure your seat before it’s too late!