March 20: Insight Session with Dr. Starnes Walker, Chief Technology Officer, U.S. Navy Cyber Command

The Coalition welcomes Dr. Starnes Walker, the Chief Technology Officer & Technical Director of the U.S. Fleet Cyber Command/U.S. 10th Fleet of the U.S. Navy, to its Insight Session on March 20.

Starnes WalkerAbout Dr. Starnes Walker

Dr. Walker now serves as the Chief Technology Officer & Technical Director for the U.S. Fleet Cyber Command & U.S. 10th Fleet, U.S. Navy.  Dr. Walker’s last post was serving as the Chief Engineering and Technical Director of The University of Hawaii System.

Previously Under Secretary of Science and Technology Jay Cohen (RADM-Ret) recruited Dr. Starnes E. Walker from the Office of Naval Research to be the new Director of Research for the S&T Directorate at the U.S. Department of Homeland Security. Formerly the Chief of Naval Research, Secretary Cohen previously worked with Walker, who served as Technical Director and Chief Scientist and top civilian for the Naval S&T program. As Director of Research for DHS, Walker oversaw the Office of National Laboratories, the Office of University Programs for the DHS Centers of Excellence, the four DHS in-house laboratories and T&E Centers, and the Academic Fellowship and Scholarship Program Office.  Additionally Walker served as the senior S&T leadership representative to OSTP, the Congress, the IC, and OGOs internationally. He joined the S&T Directorate in January, 2007.

Dr. Walker joined the Office of Naval Research in September 2004 and served as the Technical Director and Chief Scientist reporting directly to the Chief of Naval Research. Working with the CNR, Dr. Walker was responsible for structuring and leading an S&T organization that ensures technological superiority for the Navy and Marine Corps. Dr. Walker’s budget authority was annually $2,200M, plus an additional average Congressional plus-up of $700M, and Dr. Walker served in a supervisory role for a workforce of 5494 civilian and military for ONR and ONR’s Corporate Laboratory, the Naval Research Laboratory. Dr. Walker’s leadership spanned the university community, the government laboratory structure, industry, and international government defense organizations to bring their resources and technical capabilities into the Naval S&T program, thereby ensuring strategic Naval capabilities to the future and avoiding technological surprise for the nation.

Dr. Walker’s previous position was as the Acting Associate Laboratory Director for National Security, serving as the National Security Coordinator at Argonne National Laboratory. Most recently, Dr. Walker served on the DoD’s Defense Science Board in the Summer Study to define Future Strategic Strike Systems with STRATCOM as the COCOM sponsor.

Dr. Walker is a former member of the Senior Executive Service and served as the Senior Advisor for Science & Technology to stand up the Defense Threat Reduction Agency (DTRA) from 1999-2003. Dr. Walker was a standing member of the Defense Science & Technology Advisory Group for DDR&E in OSD and served as the senior S&T executive at OSD along with the S&T Executives of the Services, DIA, DARPA, MDA, and the Deputy Under Secretary for S&T.

Register now

OMB Sequestration Memo

OMB released its memo on February 27 outlining Federal agencies’ responsibilities under the sequester.  The full memo is here:
Sequestration memo from OMB m-13-05
Agencies will need to:
  • reduce approximately 9% for non-defense programs and 13% for defense programs
  • maintain and prioritize mission
  • identify any major contracts and grants they plan to cancel, re-scope delay or change payment amounts
  • identify the number of employees furloughed, length of the furlough and timing
  •  inform stakeholders – including Federal contractors – and partners in a timely and complete manner of sequestration using as many specifics as possible
  • agencies should assure that any contract actions are cost-effective and minimize the impact on mission
  • program, acquisition, financial/budget management, information technology and legal should work together to make contract determinations
  • new contracts or exercise options should only be entered in to if they support high priority initiatives or failure would expose the government to significant costs in the future
  • de-scope or terminate for convenience contracts that are no longer affordable — after evaluation of the cost and benefits and appropriately inform and negotiate with contractors
  • in the case of grants, loans, and other Federal financial assistance, agencies should ensure that new obligations or existing agreements protect the mission at the post-sequestration level and inform recipients as early as possible
  • implement internal risk management strategies and internal controls that provide hieghtened scrutiny of certain types of activities from sequestered accounts including:  hiring new personnel, issuing discretionary monetary awards to employees, incurring obligations for new training, conferences and travel.

5 Minute Survey on Sequestration: Share the Impacts on YOU!!

GTSC is currently conducting a short survey to assess the impacts and actions being taken by the private sector to prepare for sequestration.  According to our mission, part of GTSC’s role is to understand and convey impacts of government action on our community.  Please take a moment to take the confidential survey and provide your input to this historic impasse.

TAKE THE SURVEY.

GTSC Expands Strategic Advisors

Cooper, Stolarski, Haney and Holland further enhance A-List of homeland and national security leaders

New Advisors

Washington, D.C. – February 20, 2013 – The Government Technology & Services Coalition (GTSC) announced today that former Acting Assistant Administrator for Information Services & Chief Information Officer of the Federal Aviation Administration (FAA) Steve Cooper and Jim Stolarski, a renowned senior management consulting executive, have joined GTSC’s board of strategic advisors. P. Allen Haney, fellow for the American Society of Association Executives and president of P. Allen Haney Company and Earl Holland, vice president of the Strategic Alliance Professionals Washington, D.C. chapter and CEO of Growth Strategy Consultants also joined the board.

“I have always been committed to the small and mid-sized business community, and believe GTSC offers a terrific platform for sharing my experience and lessons learned to help government and industry leaders work together more effectively,” said Cooper. “I’m excited to engage with the incredible community within GTSC committed to achieving the mission of homeland and national security despite these austere budgets.”

In addition to his work at the FAA, Cooper was the first CIO of the U.S. Department of Homeland Security (DHS), where he led the IT strategy for homeland security, guided the implementation of unclassified and classified networks for the new department and provided the vision for the use of IT across the department. He formerly served as vice president and CIO of the American Red Cross and special assistant to the president for homeland security and senior director for information integration in the White House Office of Homeland Security. Mr. Cooper was named one of the top 100 CIOs in America by CIO Insight.

Jim Stolarski brings over 28 years of experience in strategy, operations reengineering and mergers and acquisitions to the Coalition, a decade of that working with public agencies within the departments of homeland security, justice and state. He retired from Accenture in 2011 and currently advises small and large businesses through his firm Nextesse.

“GTSC has created an exciting nexus of government and industry at a critical time for the country. The dedication of these people to our nation’s homeland and security missions is refreshing, and I look forward to contributing my experience helping companies execute exceptionally to forward our mutual goals of a safer, more resilient country,” said Stolarski.

They join a number of esteemed advisors, including Chani Wiggins, former assistant secretary for legislative affairs at DHS; Richard Skinner, former inspector general for DHS; Michelle Mrdeza, former majority staff director, House Committee on Appropriations, Subcommittee on Homeland Security; Jim Williams, former commissioner of the General Services Administration’s Federal Acquisition Service; Dr. Steve Bucci, former deputy assistant secretary of defense for homeland defense and defense support to civil authorities, and Bill Carroll, former official for U.S. Immigration and Naturalization Service. See all the strategic advisors at www.GTSCoalition.com.

-###-

The Government Technology & Services Coalition (GTSC) is a nonprofit, non-partisan association of innovative, agile small and midsize company CEOs that create, develop and implement solutions for the federal homeland and national security sector. The GTSC’s mission is to provide exceptional advocacy, capacity building, partnership opportunities and marketing for small and midsize companies in the federal security market.

For more information, please email Whitney Kazragis or call 706.799.1806.

NIST Issues Draft on Security Controls

National Institute of Standards and Technology (NIST) Issues Draft Security Controls for Federal Information Systems

By McKenna Long & Aldridge LLP

As cybersecurity has taken center stage in recent months, with several high profile attacks on commercial and public institutions (including a cybersecurity attack on the Federal Reserve this week), a potentially significant development is in the works regarding the security of Federal information systems, one that could have a substantial effect on government contractors. On February 6, 2013, the National Institute of Standards and Technology (NIST), the agency charged with developing information security standards and guidelines for Federal information systems, announced that it was seeking comments on the final public draft of Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP)800-53, Revision 4. Once finalized, this document, developed by a joint task force of security experts from NIST, the Department of Defense, the Intelligence Community and the Committee on National Security Systems, will provide primary guidance for security safeguards and countermeasures used to protect Federal information systems. NIST notes that the latest draft supports the Federal information strategy of “Build It Right, Then Continuously Monitor.”

A comprehensive analysis of the current draft, which is over 450 pages, is beyond the scope of this alert. However, there are a couple of key points that should be made about the guidelines in their current form. First, as with previous guidelines produced by NIST, these guidelines would apply to all federal information systems, except for those designated as national security systems under 44 U.S.C. § 3542. This means that any system used by an executive agency or the contractor of an executive agency will be subject to the finalized guidelines, unless the system is used for national security purposes, such as intelligence activities, military command and control, or weapons systems. Second, the revised guidelines would provide new security controls and control enhancements addressing a wide range of cybersecurity concerns, including advanced persistent threats, supply chains, insider threats, application security, distributed systems, and mobile and cloud computing. For many government contractors, compliance with these guidelines will require the adoption of extensive new security measures.

Contractors that could be affected by these new guidelines can offer comments on the current draft through March 1, 2013. McKenna will continue to monitor the NIST’s efforts to promulgate new guidelines and other cybersecurity related developments relevant to government contractors.

For additional information, please contact:

Elizabeth “Beth” Ferrell
202.496.7544

Patrick J. Stanton
202.496.7316

McKenna Long & Aldridge LLP (MLA) is an international law firm with more than 575 attorneys and public policy advisors in 13 offices and 11 markets. The firm is uniquely positioned at the intersection of law, business and government, representing clients in the areas of complex litigation, corporate law, energy, environment, finance, government contracts, health care, infrastructure, insurance, intellectual property, private client services, public policy, real estate, and technology. To further explore the firm and its services, go to mckennalong.com.

© 2013 MCKENNA LONG & ALDRIDGE LLP, 303 PEACHTREE STREET NE, ATLANTA, GA, 30308. All Rights Reserved.

*This Advisory is for informational purposes only and does not constitute specific legal advice or opinions. Such advice and opinions are provided by the firm only upon engagement with respect to specific factual situations. This communication is considered Attorney Advertising.

Executive Order on Cyber: What it Means to You

Improving Critical Infrastructure Cybersecurity Executive Order: Impact on Corporate America

By Brian Finch, Partner, Dickstein Shapiro LLP

Released during President Obama’s State of the Union Address, the long-awaited Executive Order (EO) addressing the federal government’s response to the ongoing menace of cyber attacks has made its formal appearance. The EO contains many ideas that had been previewed in previous drafts, as well as some interesting new twists that should have an immediate impact on corporate America and the nation as a whole. More than anything else, the EO represents another step in the U.S. government’s ongoing response to the ever more extensive and expensive threat posed by cyber attacks.Below are seven key takeaways for businesses, followed by an in-depth analysis of the EO which addresses these key points and identifies next steps to be taken by the parties involved.

Key Takeaways: What’s in the EO, What’s Missing, and What’s Next?

1)     The EO dramatically expands existing information sharing programs and provides mechanisms for sharing of unclassified threat data. But will the information be useful to many companies, will it be provided in a timely manner, and most importantly will companies have liability protection for sharing information or choosing not to act on information provided to it?

2)     How quickly will the National Institutes of Standards and Technology (NIST) develop the “Cybersecurity Framework”? And will it be able to adequately tailor a framework that accounts for the great variability amongst the yet-to-be-defined “critical infrastructure” facilities?

3)     What will be deemed “critical infrastructure” and what won’t be?  The nation has been through this exercise many times before, and it has yet to go smoothly. And will it be easy to seek a redetermination of whether a facility constitutes critical infrastructure?

4)     Will the “voluntary” cybersecurity program actually be voluntary? History has shown that such programs either (a) are dramatically underutilized or (b) are a precursor to mandatory regulations.

5)     What incentives will be recommended for participation in the voluntary cybersecurity program? Will the government promote only those incentives and discourage the use of incentives that are not tied to the voluntary program (for example Terrorism Reinsurance Act (TRIA) coverage or the SAFETY Act?)

6)     The portion of the EO that is the most immediate and has the greatest impact is also the simplest to implement – procurement reform. One can easily anticipate that government contractors will soon face much stricter cybersecurity requirements as a result of the EO. What will this look like?  Will it mirror the Defense Department’s new breach notification requirements? Will it cover only contractors working on classified or sensitive programs, or will it touch on almost every procurement?

7)     The EO sets in motion a formal review of existing cybersecurity authorities to see what additional legislation is needed. This is yet another signal that cybersecurity legislation will be a top priority for the President and the Congress over the next two years.

“Critical Infrastructure”

The eight-page EO contains some themes that are familiar to cyber watchers.  First, the EO is in large part limited to “critical infrastructure.” As defined in Section 2 of the EO, that means “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health and safety, or any combination of those matters.” Not surprisingly, many of those terms (“vital,” “debilitating,” “national economic security”) are undefined, meaning that much of the spade work on identifying “critical infrastructure”-or in some cases arguing that a system or asset is NOT critical infrastructure, is yet to be done. The debate over what is defined as “critical infrastructure” is certain to be  significant, and based on past experience with efforts to define “critical infrastructure,” it is likely to be a lengthy process rife with errors and confusion.

Cyber Information-Sharing Program Expanded

Section 4 sets forth an expanded cyber information-sharing program. The goal of Section 4 is to set up a framework that allows for the “timely production” of unclassified reports of cyber threats to an entity that has been specifically targeted. In addition, Section 4 also gives the Secretary of Homeland Security, the Attorney General, and the Director of National Intelligence the ability to share classified information in certain circumstances. Perhaps most striking is that Section 4 of the EO directs the Secretary of Defense to establish a process by which its Enhanced Cybersecurity Services program (an existing cyber threat information sharing program) can be dramatically enhanced to allow any entity in “critical infrastructure sectors” to join that program. This represents a dramatic expansion of a program that heretofore was limited to specific companies in the so-called “Defense Industrial Base.”

The question remains, however, whether the information shared as part of this program will actually be useful and timely. Such information often is transmitted weeks after malware is discovered and the harm has been done, creating a situation akin to reading in the newspaper that your house is on fire. The EO also leaves unanswered whether liability protection will be available to participants in the information-sharing program. Liability protections are critical because, without them, many companies will not participate in information-sharing programs for fear of exposing themselves to liability.

Impact on Corporate America

Sections 7 and 8 of the EO may give many in the private sector pause, as they direct portions of the U.S. government to establish baselines to reduce cyber risks and create voluntary critical infrastructure protection programs. These sections could be worrisome, as some will argue that they will lead to regulation at a later date.

I.                New Cybersecurity Framework

Section 7 gives the Secretary of Commerce, through the Director of the National Institutes of Standards and Technology, approximately one year to develop a framework to reduce cyber risks (the so-called “Cybersecurity Framework.”) That Framework is to include a set of standards, methodologies, procedures, and processes designed to address cyber risks. The Cybersecurity Framework is supposed to incorporate voluntary consensus standards and industry best practices “to the fullest extent possible.” The goal is to create a framework that is “prioritized, flexible, repeatable, performance-based, and cost-effective” that will help owners and operators of critical infrastructure identify, assess, and manage cyber risk.  Areas of improvement are to be identified, the framework is supposed to be “technology neutral,” and it is supposed to include guidance for measuring performance in implementing the framework. All of this is also to be done using an open public review along with operational feedback from actual owners and operators of critical infrastructure. It remains to be seen if NIST can meet those timelines, and whether the framework established will be flexible enough to address the varied cyber security needs of the vastly different “critical infrastructure” sectors.

II.              Voluntary Support Program

In conjunction with the Cybersecurity Framework, the Secretary of Homeland Security is directed in Section 8 of the EO to establish a “voluntary program” to support the adoption of the framework by owners of critical infrastructure owners and operations and, interestingly, “any other interested entities.” The U.S. Department of Homeland Security (DHS) will work with other federal agencies to review the framework and, “if necessary,” develop implementation guidance and supplemental materials to address sector-specific risks and operating environments. The various federal agencies are also required to report to the President annually on the extent to which specific critical infrastructure owners and operators are participating in the “voluntary” program.  Just how “voluntary” this program is remains to be determined. These “voluntary” programs often become de facto mandatory programs as companies feel compelled to participate lest they open themselves to litigation for not taking identified security measures. This has led to many voluntary infrastructure programs either being severely delayed in their deployment or being dramatically underutilized by the private sector.

Section 8 also directs the Secretary of Homeland Security to coordinate the establishment of “incentives” designed to promote participation in the voluntary program. Such report is supposed to be made within 120 days of the issuance of the EO, and the Secretaries of Commerce and Treasury are required to submit their own reports on incentives. The report is to identify the relative benefits of identified incentives, and if additional legislation is needed to implement them. What these incentives will look like is unknown. Possible incentives could include greater use of the SAFETY Act (which offers liability protection), an expansion of the TRIA, or other novel ideas.

Another requirement of Section 8 of the EO is that within 120 days of its signature, the Secretary of Defense and the Administrator of the General Services Administration are to make recommendations on the “feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration.” In other words, a comprehensive review of existing procurement regulations will be conducted to see if cybersecurity requirements can be embedded therein.

This portion of the EO may indeed have the most immediate impact on cybersecurity. One can easily anticipate that government contractors will soon face much stricter cyber security requirements as a result of the EO. These requirements could take any number of forms, including minimum security standards and data breach notification requirements. It also remains to be seen whether these requirements will cover only contractors working on classified or sensitive programs, or if they will touch almost every government vendor. It is certain that government contractors should be prepared for increased cybersecurity requirements and should be proactive in discussing what requirements are realistic.

Critical Infrastructure Identification 

Interestingly, Section 9 takes the identification of “critical infrastructure” a step further by directing that within 150 days “critical infrastructure” must be identified by the Secretary of Homeland Security using a “risk-based” approach.  This list is supposed to be developed using a “consultative process” and is to use “consistent, objective” criteria. The list is to be reviewed and updated annually and (somewhat unusually) is to include a process by which identified “critical infrastructure” entities may request reconsideration of such a determination. The ease or difficulty of successfully appealing a “critical infrastructure” designation remains to be seen.

Cybersecurity Framework Final Approval

Section 10 is the catch-all of the EO, stating that once the Cybersecurity Framework has been preliminarily finalized, the Secretary of Homeland Security in consultation with the Office of Management and Budget and the National Security Staff shall review it to determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. Those entities are then directed to submit a report to the President stating whether clear authority to establish requirements based on the Cybersecurity Framework exists and any additional authority required.

Summary and Conclusion

So what does all of this mean?  In its simplest form, the EO is a data collection exercise and a blueprint for legislative and regulatory cybersecurity mandates. As has been done in the past, the federal government will now go about identifying what it considers to be “critical infrastructure” and then will prepare for those entities (and others) “voluntary” measures it believes will help increase security. Moreover, the EO explicitly directs the U.S. government to begin planning for the determination that a voluntary program is insufficient, and thus that existing regulatory authority plus new statutory authority will be used to implement mandatory cybersecurity measures. Of course, that is all aspirational and assumes that Congress will grant the Executive Branch the authority to carry out such mandatory programs, which is far from certain.

It seems that the portion of the EO with the greatest impact is the one section that is easy to overlook-the section requiring incorporation of security standards into federal procurements. Considering the volume of business conducted by the federal government, it is easy to foresee that mandatory cybersecurity requirements for entities contracting with the federal government will have be quickly implemented, causing a radical shift in the cybersecurity posture of large portions of the U.S. economy.

It is quite clear from the EO that legislation is still a vital part of this process. Many of the aspirational elements of the EO cannot happen without congressional action, and specific issues such as liability protection were left relatively unaddressed by the EO. Therefore, Congress will continue to play a critical role in how exactly the nation addresses cybersecurity going forward.

Overall, the CyberSecurity EO is the starting signal for a long race involving multiple administrative processes, any of which could result in genuine improvement in the nation’s cybersecurity posture, or something akin to large game of cybersecurity theater, where seemingly powerful directives and plans result in little actual benefit.  It is another critical milestone in the ongoing and increasingly complex effort to combat cyber threats. We will continue to monitor the progress of this initiative and provide key updates and analysis of its impacts on the business sector as developments occur.

Brian Finch is a partner at Dickstein Shapiro LLP, where he heads the firm’s Global Security Practice. He can be reached at [email protected] or 202-420-4823.

Feb. 7: The View from Appropriations: Timeline for Sequester with Charles Kieffer (Senate Appropriations) & Ben Nicholson (House Appropriations)

U.S. Senate seal
Charles Kieffer
Staff Director
Homeland Security Appropriations Subcommittee
U.S. Senate
U.S. House of Representatives
Ben Nicholson
Majority Clerk
House Apprpriations Committee
Subcommittee on Homeland Security
U.S. House of Representatives
 
Join us for a bi-partisan, bi-cameral discussion of the timeline and budget appropriations for the U.S. Department of Homeland Security including the upcoming sequester, Continuing Resolution (CR) and a detailed outlook for FY 2014.
PARKING IS DIFFICULT.  METRO AT UNION STATION OR PARK AT UNION STATION.  SOME STREET PARKING.  ALLOW MORE TIME FOR PARKING.  WE WILL START PROMPTLY AT 1:30 PM.

About the Senate Homeland Security Appropriations Committee

The Senate Appropriations Committee is the largest committee in the U.S. Senate, consisting of 30 members in the 111th Congress.  Its role is defined by the U.S. Constitution, which requires “appropriations made by law” prior to the expenditure of any money from the Federal Treasurey.  The Committee, Chaired by Barbara Mikulski (D-MD), wries the legislation htat allocates federal funds to the numerous government agencies, departments and organizations on an annual basis.  Appropriations are limited to the levels set by a Budget Resolution, drafted by the Senate Budget Committee.  Twelve subcommittees are tasked with drafting legislation to allocate funds to government agencies within their jurisdictions. These subcommittees are responsible for reviewing the President’s budget request, hearing testimony from government officials, and drafting the spending plans for the coming fiscal year. Their work is passed on to the full Senate Appropriations Committee, which may review and modify the bills and forward them to the full Senate for consideration.

The Committee is also responsible for supplemental spending bills, which are sometimes needed in the middle of a fiscal year to compensate for emergency expenses.

The Homeland Security Subcommittee’s  Jurisdiction includes:
Agricultural Quarantine Inspection (USDA)
Chief Medical Officer (DHS)
Customs and Border Protection (DHS)
Disaster Relief (DHS)
Disaster Assistance Direct Loan Program (DHS)
Domestic Nuclear Detection Office (DHS)
Emergency Food and Shelter (DHS)
Federal Emergency Management Agency
Federal Law Enforcement Training Center (DHS)
Flood Map Modernization Fund (DHS)
Homeland Security, Department of (DHS)
Immigration and Customs Enforcement (DHS)
Infrastructure Protection and Information Security (DHS)
Intelligence and Analysis (DHS)
National Capital Region Coordination Office
National Flood Insurance Fund (DHS)
Office of Grants and Training
Pre-disaster Mitigation Fund
Preparedness Directorate
Science and Technology (DHS)
Strategic Border Initiative (DHS)
Transportation Security Administration (DHS)
U.S. Citizenship and Immigration Services (DHS)
U.S. Coast Guard (DHS)
U.S. Fire Administration
U.S. Secret Service (DHS)
US VISIT (DHS)
About the House Appropriations Committee, Sucommittee on Homeland Security On March 2, 1865, the House of Representatives separated the appropriating and banking and currency duties from the Committee on Ways and Means, which was first established in 1789, and assigned them to two new committees – the Committee on Appropriations and the Committee on Banking and Currency. Until 1865, all “general” appropriations bills had been controlled in the House by the Committee on Ways and Means – also in charge of revenue measures and some other classes of substantive legislation.Membership of the Committee. The new Committee on Appropriations – six Republicans and three Democrats – was appointed on December 11, 1865, in the 1st session of the 39th Congress, and first reported the general appropriations bills for the fiscal year 1867. By 1920, the number of members had grown to 21. It was changed that year to 35 and gradually increased to 50 by 1951. Until recently, the Committee numbered 66 members, but has since reduced its ranks to 50 members.   Continued
Its jurisdiction is the U.S. Department of Homeland Security.

Feb. 25: Capacity Building Workshop

SUCCESS INSIDE & OUT: ALIGNING YOUR INTERNAL RESOURCES TO REFLECT THE SUCCESSES OF YOUR COMPANY

Sequestration, budget cuts and the Continuing Resolution (CR) have frozen contract awards and new work. GTSC invites you to take this opportunity to prepare for the fall — when the allocations will flow again – and you’ll need to be primed and ready!

Through the GTSC’s work with all the companies and officials involved in the Federal homeland and national security market, we’ve learned a number of lessons and best practices to mitigate some of the traditional “thorns” in a small business’ side.  When implemented, these practices assure your success with your Federal clients, large business primes and other partners. Join GTSC to shore up your resolutions to focus on your strategic plan, your marketing strategy and your legal, human resources and insurance needs. In Part I of this two-part series about building your internal capacity, the sessions will give you an in-depth look at strategic planning, marketing, talent acquisition, legal issues and ethics to expand your company’s reach in the Federal homeland and national security sector. Part II on Tuesday, March 12 will focus on every stage of the proposal process — from the RFI to your response to an RFP. Register today!

Part I Agenda: 

8:00AM: Networking/Coffee Hour 

8:30AM: Welcome & Opening Comments with Kristina Tanasichuk, President & CEO, Government Technology & Services Coalition

8:40-9:10 AM: KEYNOTE MENTOR SESSION

There are several unique attributes that make certain small businesses repeat partners for large primes. Ms. Petera will provide a “Top 5” list based on her experience as both an appointed official and as the client lead for one of the most prestigious IT companies in the country, Harris IT Services.

Anne Petera, former Assistant Secretary for Intergovernmental Affairs, U.S. Department of Homeland Security and DHS Client Executive, Harris IT Services,

9:15 AM – 10:30 AM: Session #1

WORKING WITH THE BIG GUYS: HOW TO MANAGE YOUR RESOURCES FOR BOTH STRATEGIC AND TACTICAL PLANNING

Large Federal contractors want — and need — to partner with small businesses to be successful in today’s Federal market.  This session will show you how your strategic plan — or lack thereof — can impact how potential partners and clients view you.  Are you a good partner? Is your organization able to deliver on its promises from beginning to end? How do your partners see and assess you, your company and your capabilities? Learn how to integrate your strategy and strategic plan into your thinking to improve your capabilities in all of your business relationships.

Mary-Claire Burick, CEO, MC Strategy and Strategic Advisor, GTSC

Chris Lawrence, Vice President, Engility and Mentor, GTSC

Josh Kussman, Sr. Vice President, The Sentinel HS Group

10:30 AM – 11:45 AM: Session #2

MARKETING: YOU’VE GOT THE PLAN, HOW DOES THAT TRANSLATE TO YOUR FEDERAL CLIENTS?

How do you sell yourself in the market? Are you showcasing your core capabilities in the best ways possible? Keep your company’s “name on the brain” of larger Federal contractors with these marketing tips. It is simpler than you think to maximize your relationships with them. Don’t forget to maintain an updated profile on the GTSC website – a large company’s database resource for finding subcontractors.

Mary Ann Stoops, Principal, Savvy Marketing Partners LLC

Victoria Laing, Senior Account Manager, Gotham Government Solutions

Earl Holland, President, Growth Strategy Consultants and Strategic Advisor, GTSC

11:45 AM – 1:00 PM: LUNCH KEYNOTE PANEL: WHY DOES THIS MATTER?

Join us for this discussion by several of GTSC’s mentor companies on how and why a lack of strategic planning can impact your success with both your Federal clients with your other partners, how they view and evaluate potential partners and what attributes draw them to repeat partnerships.

Wayne Pizer, Vice President Small Business Programs, L3 STRATIS

Andrea Marsh, Senior Market Manager and DHS Lead, Battelle

Mike Kelly, Senior Director, Infrastructure Protection & Security, TASC

1:00 PM – 2:15 PM: Session #3

GOT TALENT? HUMAN RESOURCES FOR SMALL BUSINESSES

Carrying out a contract is contingent on having the right talent for the project. How does a small to medium-sized company market themselves to potential talent? How can you find the right people and staff your project with high quality individuals?

Kathleen Smith, Chief Marketing Officer, ClearedJobs.Net

Jen Fritz, Director, Federal Government Solutions, CareerBuilder

Rob Edmonds, Director, Sales and Marketing, Uniplus and Chair, GTSC Small Business Collaboration Group (SBCG)

2:15 PM – 3:30 PM: Session #4

YOUR LEGAL, INSURANCE AND ETHICAL RESPONSIBILTIES: AN UPDATE

The landscape of legal, insurance and ethical requirements is constantly changing. Each “mistake” made by contractors or by government officials results in a slew of new requirements that can impact your responsibilities.  Join us for a look at the latest changes in these areas from some of the foremost experts in their fields.

Richard Conway, Partner, Dickstein Shapiro

P. Allen Haney, CEO, P. Allen Haney Company

Amy Hutchens, General Counsel, Vice President Compliance & Ethics Services, Watermark Risk Management International, LLC. 

Register now

 

January 30: Charles Armstrong, CIO, CBP

Charles Armstrong

Charles Armstrong,
Assistant Commissioner & Chief Information Officer
CBP

This roundtable with CBP’s Charlie Armstrong will focus on how CBP’s priorities are unfolding given the fiscal cliff and lack of clarity on sequestration. We will discuss his assessment of future opportunities, current initiatives and his thoughts on progress toward the integration of applied technology and acquisition efforts to complement CBP’s mission and support their frontline personnel.

REGISTER*

**This event is for GTSC members and FIRST TIME guests to GTSC only.  Thank you for your understanding.

About Mr. Armstrong

Mr. Charles R. Armstrong is the Assistant Commissioner and CIO for the Office of Information and Technology, U.S. Customs and Border Protection, Department of Homeland Security. Functional responsibilities include software development, infrastructure services and support, tactical communications, the laboratory system and research and development functions, and IT modernization initiatives supporting CBP’s core business processes. Additionally, as the Department of Homeland Security (DHS) Steward for network services, Mr. Armstrong is accountable for supporting the agency’s requirements for secure, reliable communications.

Mr. Armstrong served as the DHS Deputy CIO where he was a champion of the Department’s IT initiatives for improving the agency’s secure information sharing capabilities through the consolidation of infrastructure and strengthened security. Mr. Armstrong brings with him over 26 years of leadership and technology experience in the operations and management of IT. After starting his career with the Navy Department, he worked for the legacy U.S. Customs Service and CBP in various capacities. He also served as the CIO for the DHS Border and Transportation Security prior to assuming the position of DHS Deputy CIO in October 2005. Mr. Armstrong graduated from Old Dominion University with a Bachelor of Science in Information Systems and obtained a Master’s Certificate in Management from National Louis University. He is a Harvard Senior Executive Fellow, and was recognized by Federal Computer Week’s Federal 100 as one of the top executives from government, industry, and academia who had the greatest impact on the government information systems community in 2001.