Archives page

Posts Tagged ‘brian finch’

GTSC Submits Comments on GSA-DOD Cybersecurity & Resilience

GTSC working in collaboration with Brian Finch, of Strategic Partner Dickstein Shapiro and GTSC members Robert V. Jones, CEO of PReSafe Technologies, Larry Grant, CEO, EnProVera and Gary Daemer and Mark Dale, InfusionPoints submitted comments to the Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition.  GTSC’s comments focused on clear and achievable cyber requirements that will not provide a competitive disadvantage for small and mid-sized companies.  Additionally, GTSC highlighted that an “LPTA” environment is not conducive to robust cybersecurity and that procurements that seek best value are more appropriate.  Please email us if you’d like a copy of our comments.

Comments on DOD-GSA Cyber Resilience Rules Needed!

On Wednesday, March 12, 2014, the Department of Defense (DOD) and General Services Administration (GSA) Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition (Working Group) requested public comments on its draft implementation plan (draft plan) for federal cybersecurity acquisition. See 79 Fed. Reg. 14042 (Mar. 12, 2014). The draft plan is the first of several steps toward implementing the recommendations outlined in the Working Group’s recently finalized report on Improving Cybersecurity and Resilience Through Acquisition (see our previous blog post for a summary).

As comments are due on April 28, 2014, federal contractors and other stakeholders should act quickly to submit their views on what will have a significant and lasting impact on federal cybersecurity acquisition practices.

The draft plan proposes a repeatable, scalable, and flexible framework for addressing cyber risk in federal acquisitions, and by design, it will affect nearly all contracting entities. The draft plan proposes a “taxonomy” for categorizing procurements so that the government can effectively prioritize those in need of additional resources, attention, and safeguards. As proposed, the taxonomy is modeled on Federal Information and Communications Technology (ICT) acquisitions—though the Working Group has asked whether this framework is a workable model for the categorization of all acquisitions. The Working Group would use the ICT framework to categorize all acquisitions that present cyber risk, after which it would separately assess the risks within each category. Categories that present greater cybersecurity risk (based on threats, vulnerabilities, and impacts) would receive more and faster attention in acquisitions. The taxonomy is, in our view, the most significant new development in the draft plan, as it will serve as the principal basis for categorizing the extent of cyber regulations for procurements. This aspect of the plan accordingly warrants particularly close attention.

The Working Group seeks comments in many areas, including whether:

(a) the approach is workable;

(b) the process will obtain sufficient stakeholder input;

(c) any additional assumptions, clarifications, or constraints should be expressed;

(d) the approach will satisfy the goals of Recommendation IV of the final report, i.e., whether it creates a repeatable, scalable, and flexible framework for addressing cyber risk in federal acquisitions;

(e) the major tasks and sub-tasks are appropriate and, if implemented, will achieve the identified outputs/completion criteria;

(f) the taxonomy and category definitions can be used to develop overlays (a fully specified set of security requirements and supplemental guidance that allow for the specific tailoring of security requirements;

(g) factors can be developed to assess each measure of cybersecurity risk (i.e., threat, vulnerability and impact);

(h) other aspects (e.g., annual spending) should be considered in category prioritization; and

(i) in addition to information security controls derived from the cybersecurity framework and other relevant NIST guidance and international standards, other procedural or technical safeguards that address business cyber risk should be included (e.g., source selection and pricing methodology, source selection evaluation criteria minimum weighting and evaluation methodology, etc).

Submit comments here or contact GTSC to provide input to the Coalition’s response.

 

Brian Finch

Brian Finch, a partner in Dickstein Shapiro’s Washington, DC office, is head of the firm’s Global Security Practice. Named by Washingtonian magazine in 2011 as one of the top 40 federal lobbyists under the age of 40, Brian is a recognized authority on global security matters who counsels clients on regulatory and government affairs issues involving the Department of Homeland Security, Congress, the Department of Defense, and other federal agencies.  Dickstein Shapiro is a Strategic Partner of the Government Technology & Services Coalition.   You can reach Brian at [email protected] (202)420-4823. 

Justin C


Justin Chiarodo represents clients in all aspects of federal, state, and local procurement law. Named by Law360 in 2013 as a “Rising Star” in Government Contracts, Justin has extensive experience in government contracts litigation, compliance, and regulatory matters, with particular expertise in the defense, health care, technology, and professional services sectors.

broderick
Daniel Broderick is a Washington, DC-based associate in Dickstein Shapiro’s Energy Practice. He focuses on regulatory and project development matters affecting clients in the electricity industry, including electric market design, municipalization, compliance, certification, and power purchase agreements. 

 

 

 

 

GTSC Recognizes Leaders in Homeland & National Security Community: U.S. Immigration & Customs Enforcement, Chertoff Group, Dickstein Shapiro, PReSafe Technologies, StrikeForce Consulting, TASC, Inc. recognized

Washington, D.C., February 6, –The Government Technology & Services Coalition (GTSC), the premier organization for small and mid-sized companies in homeland and national security yesterday recognized numerous public and private sector leaders and innovators in homeland and national security at its Annual Awards.

John Morton, former director, U.S. Immigration & Customs Enforcement and John Fantini Porter, Chief of Staff, Management & Administration, were awarded Federal Small Business Champions of the Year; Chad Sweet, co-founder and CEO of the Chertoff Group received the Market Maven award; Robert V. Jones, CEO, PreSafe Technologies for Small Business Member of the Year; Brian Finch, Dickstein Shapiro for Strategic Partner of the Year; Bill Carroll, Managing Partner StrikeForce Consulting, Strategic Advisor of the Year and TASC Inc. for Mentor of the year.  Read the release.

 

DOD & GSA Issue Final Report on Improving Cybersecurity & Resilience through Acquisition

On January 23, 2014, the Department of Defense (DoD) and General Services Administration (GSA) Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition (Working Group) submitted its eagerly anticipated final report on integrating cybersecurity requirements into all federal procurements. This report, which satisfies Executive Order (EO) 13636 and Presidential Policy Directive (PPD) 21, includes recommendations on the increased use of cybersecurity standards in all federal acquisition activities, including strategic planning, capabilities needs assessment, systems acquisitions, and program and budget development. 

The final report is perhaps most notable as another step toward an era where most every government contractor must satisfy baseline cybersecurity requirements. While the final report does not provide explicit guidance on the details of creating such a new procurement environment, in light of recent, imminent and forthcoming government activity, including the final rule imposing cybersecurity and reporting obligations on DoD contractors (issued November 18, 2013 and summarized here), the upcoming final cybersecurity framework of the National Institute of Standards and Technology (NIST) (to be released in mid-February), and the forthcoming final rule governing the safeguarding of government contractor information systems (likely finalized next year), we view this final report as a bellwether. Government contractors who ignore the final report and the course it has set do so at their own peril.

Cybersecurity issues will increasingly affect agency standard setting, coverage issues and incentives, government audits and investigations, security breach litigation, and other business drivers. Government contractors and other companies that handle government information or supply components that could be compromised electronically must begin, to the extent they have not already done so, to think both strategically and pragmatically about developing an integrated approach to these cybersecurity issues.

Background

On February 12, 2013, President Obama issued EO 13636 – Improving Critical Infrastructure Cybersecurity. Section 8(e) mandated that the Working Group, in consultation with the Department of Homeland Security (DHS) and the Federal Acquisition Regulatory (FAR) Council, “make recommendations to the President . . . on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration.” Section 8(e) also directed the Working Group to “address what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity.”

On May 13, 2013, the Working Group published a request for information (RFI), inviting public comment on the appropriate cybersecurity measures and parameters for federal procurements (summarized here). The Working Group also consulted with representatives from the DoD, GSA, DHS, FAR Council, the Office of Federal Procurement Policy, NIST, and others before issuing the final report.

Working Group Recommendations

The final report makes six recommendations, including that the federal government and/or contractors, as appropriate, should:

(1) institute baseline cybersecurity requirements as a condition of contract award for appropriate acquisitions;

(2) address cybersecurity in relevant training;

(3) develop common cybersecurity definitions for federal acquisitions;

(4) institute a federal acquisition cyber risk management strategy;

(5) include a requirement to purchase from original equipment or component manufacturers (OEM), their authorized resellers, or other trusted sources, when available, for appropriate acquisitions; and

(6) increase government accountability for cyber risk management.

For contractors, the most helpful recommendations ask the government to clarify, with more specificity, the standards to which contractors will be held accountable. For example, the first recommendation correctly observes that, “[o]ften, cybersecurity requirements are expressed in terms of compliance with broadly stated standards and are included in a section of the contract that is not part of the technical description of the product or service the government seeks to acquire.” This, the report concedes, “leaves too much ambiguity as to which cybersecurity measures are actually required in the delivered item.” Accordingly, the report recommends expressing baseline cybersecurity requirements as part of the acquisition’s technical requirements and including performance measures to ensure the baseline is maintained and risks are identified. The final report also recommends common cybersecurity definitions, which if adopted would dramatically advance anxiety about contractors’ and the government’s current and near-future cybersecurity obligations.

Though the recommendations are instructive, the final report does not actually mandate specific baseline requirements or propose common cybersecurity definitions. Nor does it propose a cyber risk management strategy or otherwise attempt to identify the acquisitions in which baseline requirements or OEM limitations are “appropriate.” Instead, the final report “intends” that others will harmonize these recommendations with ongoing rulemakings, cybersecurity standards, and statutory frameworks. In short: stay tuned.

Takeaways

First and foremost, change is coming. Although the final report recommendations are directed more toward government program managers and acquisition decision makers than industry, the harmonization of such recommendations with recent and forthcoming regulations, mandatory contract provisions, and other statutory requirements and protections will affect the industry directly and significantly.

Other critical points for government contractors to consider as the final report’s recommendations are implemented include:

  • What cybersecurity terms will be defined, and what will those definitions look like? Considering that the definitions will be used government-wide, it is imperative that contractors provide feedback lest a definition be issued that is contrary to their interests, much less defies common sense;
  • What topics will be covered in the cyber education program for the procurement work force? If procurement officials are not properly educated on a variety of threats, then they may fail to incorporate standards and requirements that are necessary for information protection;
  • How will federal risk management strategy be developed? And will it be flexible enough to account for the rapidly evolving threat environment?;
  • Are contractors prepared to fight back against cybersecurity requirements in federal acquisition programs that are being used to exclude otherwise acceptable vendors and technologies?; and
  • How deep will these requirements reach into federal contractors’ business? In other words, will the cybersecurity obligations be limited just to public-contracting programs, or will they effectively become company-wide requirements regardless of the buyer?

The final report is a clear signal that mandatory baseline standards, training protocols, and other risk-based requirements are on the horizon. Those standards will likely be based on the NIST framework or, in specialized areas, even stricter protocols. Government contractors and other companies that handle government information must implement an integrated strategy that mitigates the risks associated with these cybersecurity issues, and where viable, the opportunities that these changes might create.

By Contributing Authors:   Brian FinchJustin Chiarodo, and Daniel Broderick from GTSC Strategic Partner Dickstein Shapiro

Brian Finch

Brian Finch, a partner in Dickstein Shapiro’s Washington, DC office, is head of the firm’s Global Security Practice. Named by Washingtonian magazine in 2011 as one of the top 40 federal lobbyists under the age of 40, Brian is a recognized authority on global security matters who counsels clients on regulatory and government affairs issues involving the Department of Homeland Security, Congress, the Department of Defense, and other federal agencies.  Dickstein Shapiro is a Strategic Partner of the Government Technology & Services Coalition.   You can reach Brian at [email protected] (202)420-4823. 

Justin C


Justin Chiarodo represents clients in all aspects of federal, state, and local procurement law. Named by Law360 in 2013 as a “Rising Star” in Government Contracts, Justin has extensive experience in government contracts litigation, compliance, and regulatory matters, with particular expertise in the defense, health care, technology, and professional services sectors.

broderick
Daniel Broderick is a Washington, DC-based associate in Dickstein Shapiro’s Energy Practice. He focuses on regulatory and project development matters affecting clients in the electricity industry, including electric market design, municipalization, compliance, certification, and power purchase agreements. 

Dec. 10: GTSC Holiday Awards

Join the Government Technology & Services Coalition for an extraordinary celebration of a great year and a toast to a new and prosperous 2014 at our Annual Awards Celebration! We’re thrilled to feature our Italian Feast dinner buffet in addition to holiday libations, great company and a fun evening to ring in the holidays.

The 2013 GTSC Holiday Awards honors:

Federal Small Business Champions of the Year Award: John Morton, former Director, U.S. Immigration and Customs Enforcement & Jonathan Porter, Chief of Staff, U.S. Immigration and Customs Enforcement

Federal Small Business Champion of the Year is awarded annually to the Federal official(s) who show a distinct commitment and tangible results toward improving the environment and success for small businesses in the Federal homeland and national security market.

 

Market Maven of the Year Award: Chad C. Sweet, Co-Founder & CEO, The Chertoff Group

Normally presented at the GTSC Anniversary, 2013 year’s Market Maven of the Year Award will be presented at the holiday party. It is presented to an exceptional individual who contributes in a concrete and tangible way to the efficiency, productivity and effectiveness of the homeland and national security market. Proven as a thought leader with a belief in increasing individual opportunity, the power of free enterprise and the nurture of innovation to advance and support the homeland and national security mission.


Strategic Partner of the Year Award: Brian E. Finch, Partner, Global Security Practice, Dickstein Shapiro LLP

The Strategic Partner of the Year is awarded annually to the Strategic Partner that demonstrates a clear commitment to GTSC, contributes significantly to the content and substance of the organization and provides GTSC members with counsel, insight and resources to perform exceptionally on behalf of the homeland and national security mission.

Strategic Advisor of the Year Award: Bill Carroll, Senior Partner, Strike Force Consulting

The Strategic Advisor of the Year is awarded annually to the Strategic Advisor who works on behalf of GTSC to increase our capacity, membership and opportunities to bring the innovation, creativity and solutions of small and mid-sized companies to the homeland and national security mission.

 

Small Business Member of the Year Award: PReSafe Technologies LLC

The award is presented annually to the GTSC Member that exemplifies exceptional quality and ethics for the Federal government, a commitment to GTSC’s small business members and advocacy on behalf of our community.

 


Mentor of the Year Award: TASC & Mike Kelly, Vice President, Business Development, Civil and Infrastructure Security Group, TASC

Mentor of the Year is awarded annually to the GTSC Mentor who has worked to increase members’ understanding of the homeland and national security market, increased business opportunities for small companies through formal and informal mentoring and engages with GTSC to promote an innovative, robust, fair market for all.

About the Border Patrol Foundation

The Border Patrol Foundation provides resources to the families of the fallen and creates awareness of the escalating risk of those who keep America’s borders safe. These services create a financial bridge through the turbulent time following a family’s loss. The Foundation supports programs improving awareness of United States border security and recognizes community leaders supporting the families of the U.S. Border Patrol. The Foundation’s volunteers have served with the U.S. Border Patrol or are professionals, friends and family committed to the importance of securing America’s borders and dedicate their lives to the same.

Thank You to our Sponsors!

Gold Sponsors

 

Silver Sponsors

 

Thank you to Old Dominion Strategies!

Support and sponsorships of our holiday event are welcome  — please contact us to help make this our best event ever!

Register nowParking & Public Transportation

Parking: There is some on-site and two-hour metered street parking. Parking is also available at GMU.

Metrorail: The Arlington Arts Center is one block south of the Virginia Square-GMU metro station on the Orange line.

Metrobus: Line 24P and ART Line 41 stop directly in front of the AAC.

Oct. 23: Cyber Security: Focus on Public Private Sector Collaboration

Join GTSC and the InfraGard National Capital Region Members Alliance for a cyber program focused on the threats to the public and private sector.  gram.  Since Executive Order 13636 and PPD-21 were issued in February 2013, there has been a renewed focus on the challenges of security the nation’s digital infrastructure. Most admit and understand that our cyber security relies on a strong and vital collaboration between industry and government — whether that be the industry protecting our critical infrastructure or industry that provides the underpinning of our economy.  Legislators on Capitol Hill  are trying to determine how to streamline authorities and responsibilities and law enforcement and other agencies in the Federal government are grappling with preventing and mitigating the impacts of this threat.  This session will discuss DHS’ role in cyber security, how the private sector and Federal partners are communicating, what threats are at the forefront from cyber hackers, hostile nation states etc. and how we see future collaboration improving to fight these threats and protect our economy and infrastructure.

gtsc_securityAGENDA AT A GLANCE
8:00 AM Registration & Breakfast 
8:30 AM Conference Introduction
8:45 AM Keynote: The Challenges of Cyber Security
9:30 AM How do we share information more effectively? 
10:30 AM What are the latest threats? 
11:30 AM Lunch on your own in the National Geographic Society Cafeteria
12:30 PM Keynote: Cyber Security Priorities from the DHS Perspective
1:15 PM Where is the Government Targeting their Resources?
2:00 PM What the Private Sector Do?
2:45 PM Closing Remarks 
Confirmed Speakers:

Keynote: Dr. Phyllis Schneck, Deputy Under Secretary for Cyber Security, NPPD, DHS

Dr. Phyllis Schneck, McAfee’s former CTO and vice president of the global public sector, has been named deputy under secretary of cyber security for the National Protection and Programs Directorate at DHS. Join us to hear her priorities for cyber at NPPD!

Denise Anderson, National Council of Information Sharing and Analysis Centers (ISACs); Vice President, Financial Services-ISAC

Noel Due, Supervisory Special Agent, FBI – HQ, Cyber Division, Operation Clean Slate

Brian Finch, Partner, Global Security, Dickstein Shapiro LLP

John Harmon, Partner, Tactical Network Solutions

John Lainhart, CGEIT, CISA, CISM, CRISC, CIPP/G, CIPP/US Partner, Cybersecurity & Privacy, US Public Sector, IBM Global Business Services

James Mulvenon, Vice President, Defense Group Inc., Center for Intelligence Research and Analysis

Vipul Sharma, Vice President & CTO, Civil Government & Healthcare IT solutions, L-3 STRATIS

Trent Teyema, Assistant Special Agent in Charge, FBI WFO, Criminal Division – Cyber Branch

Glenn Wood, Vice President, Technology, InfraGard Board & Co-Chair, Cyber SIG

 

About the InfraGard National Capital Region Members Alliance

The InfraGard National Capital Region Members Alliance (INCRMA) consists of a growing membership of professionals who are creating a more resilient critical infrastructure in the Washington, DC metro area. These include defense industrial base, information technology, water supply systems, electrical energy, emergency services, law enforcement, health systems, transportation, banking, and telecommunications. Our membership is voluntary yet exclusive and is comprised of individuals from both the public and private sector. The main goal of INCRMA is to promote ongoing communication, education, and community outreach between the public and private sectors and the FBI. In doing so, information is shared, relationships are strengthened, and vital assets are protected.  To learn more, visit us at www.infragard.org.

 

Register now

Oct. 10: Cyber Security Acquisition: What is the Government Buying?

Join the Government Technology & Services Coalition (GTSC) during October’s National Cyber Security Awareness Month for an in-depth look at the acquisition landscape for cyber security programs across DoD, DHS, DOS, and DOJ during its Capacity Building Session, Cyber Security Acquisition: What is the Government Buying? GTSC’s Strategic Partner Dickstein Shapiro LLP will track acquisition activity and provide some insights into how the Federal government is making cyber security investments. This is a “must attend” program if you are interested in understanding the Federal cybersecurity space.

Speakers:

Brian FinchBrian E. Finch

Partner

Dickstein Shapiro LLP

Brian Finch, a partner in Dickstein Shapiro’s Washington, DC office, is head of the firm’s Global Security Practice. Named by Washingtonian magazine in 2011 as one of the top 40 federal lobbyists under the age of 40, Mr. Finch is a recognized authority on global security matters who counsels clients on regulatory and government affairs issues involving the Department of Homeland Security, Congress, the Department of Defense, and other federal agencies. His focuses include liability mitigation, protection of critical infrastructure, state and local grant funds, WMD response preparations, chemical security, cyber security, and border and trade security.

Mr. Finch is a Senior Advisor to the Homeland Security and Defense Business Council and also is a member of the American Bar Association’s Homeland Security Executive Committee for the Administrative Law Section. Mr. Finch served as an inaugural Senior Fellow at George Washington University’s Homeland Security Policy Institute. He also was a member of the Heritage Foundation/Center for Strategic and International Studies Task Force for Examining the Roles, Missions, and Organization of the Department of Homeland Security. Mr. Finch is a Professorial Lecturer in Law at The George Washington University Law School, where he co-teaches Homeland Security Law and Policy. He is admitted to practice in the District of Columbia.
Mr. Finch speaks and writes extensively on global security and terrorism matters, as well as other public affairs issues. He has testified on the implementation of the SAFETY Act twice before the U.S. House of Representatives Committee on Homeland Security. He is regularly quoted in publications such as CQ Homeland Security and Washington Technology, and has been profiled by Government Security News Magazine, a leading homeland security journal. Examples of his articles include “Utilizing the SAFETY Act to Assist with CFATS Process,” which appeared in Business & Industry Connection in October 2009; “The SAFETY Act Affords Protections For Smart Grid Players,” which appeared in Renew Grid in October 2009; and “How Sports Owners Can Find Protection in SAFETY,” which appeared in the Sports Business Journal in November 2006. He also has appeared on television news programs such as MSNBC Live as a global security commentator.

Graham (Rusty) MathewsGraham (Rusty) Mathews

Senior Legislative Advisor

Dickstein Shapiro LLP

Rusty Mathews, the senior legislative advisor in the Public Policy & Law Practice of Dickstein Shapiro, joined the firm in 1996. Mr. Mathews’ specialties encompass representation, on a variety of legislative and appropriations issues, of the environmental community, electric utilities, competitive power producers and marketers, healthcare providers, direct marketers, homeland security and related high-tech industries, insurance and reinsurance providers, and clients involved in sports, entertainment, and Internet gaming.
During the years 1995 through 1996, in the office of U.S. Senator Barbara A. Mikulski, Mr. Mathews served as Chief Minority Clerk, Senate Appropriations Subcommittee on Veterans Affairs, Housing and Urban Development, and Independent Agencies. He managed all aspects of Congress’s second largest discretionary appropriations bill ($90 billion). He was also responsible for budget development and policy management for 25 federal departments and agencies, including the Departments of HUD and VA, the Environmental Protection Agency, the National Science Foundation, NASA and Federal Emergency Management Agency, and 15 independent boards, commissions, and offices.
In 1989 through 1994, in the office of U.S. Senator Robert C. Byrd, Mr. Mathews was the Assistant Majority Clerk, Senate Appropriations Subcommittee on the Department of Interior and Related Agencies. He managed all aspects of the Department of Interior appropriations bill relating to annual budget requests and policy development for the Bureau of Land Management, the U.S. Geological Survey, the Bureau of Mines, Office of Surface Mining, Smithsonian Institution, and the fossil energy accounts for the Department of Energy. He also served as principal negotiator for the Midwestern and Eastern coal states during Congressional deliberations on the Clean Air Act Amendments of 1990.
Among Mr. Mathews’ career highlights are membership on the Senate Democratic Policy Committee, serving as Deputy Vice President for External Affairs with the U.S. Synthetic Fuels Corporation, and being Director of Senate Relations with the Department of Energy.

Register now

Key Cybersecurity Issues for Government Contractors

Dickstein Shapiro LLP and the Government Technology & Services Coalition (GTSC) held a webcast, “Key Cybersecurity Issues for Government Contractors.” This interactive program, of particular interest to government contractor compliance officers, CIOs, CISOs, General Counsel, and any other C-suite members, discussed how the federal government is planning on fundamentally altering its acquisition policies to make the cybersecurity of its contractors a top priority.

The discussion included:
– Proposed Federal Acquisitions Regulation (FAR) changes relating to President Obama’s Cybersecurity Executive Order;
– Planned changes to procurement requirements based on independent agency actions;
– Congressionally mandated cybersecurity requirements; and
Ways contractors can prepare for these changes

Speakers included:

Brian Finch, Partner, Global Security, Dickstein Shapiro LLP

Justin Chiarodo, Partner, Government Contracts, Dickstein Shapiro LLP

Emile Monette, Senior Action Officer for Cyber Security Policy, Government Services Administration

Kristina Tanasichuk, CEO, Government Technology & Services Coalition

View the slides here or watch the webinar by clicking the link below.

Screen Shot 2013-10-09 at 2.21.39 PM

 

Aug. 19: Cyber Security & Safety: It’s Not Just for Kids

The InfraGard National Capital Region Members Alliance (INCRMA) is hosting this program featuring a number of GTSC member companies to discuss cyber security and privacy in the wake of the recent VISA card data breach. Keynote Brian Finch, strategic partner to the Coalition, has been interviewed by numerous news outlets on the breach and its ramifications for personal and corporate security. Other speakers will discuss government and industry efforts to secure your personal information and bring your attention to a number of precautions you can take to secure your business and family.
InfragardINCRMA is the leading public-private partnership working to improve and extend information sharing between private industry and the government, particularly the U.S. Federal Bureau of Investigation (FBI), for the protection of our critical national infrastructure.

Speakers:

Opening Keynote: The VISA card breach: Your information is Not as Safe as you Think

Brian Finch, Partner, Dickstein Shapiro LLP

Panel Discussion: Best Practices & Programs for Practical Cyber Safety Solutions

Schnearia Ashley, BB&T At Work, BB&T Bank

Kristina Dorville, Program Manager, Cyber Security Awareness Programs, National Protection & Programs Directorate, (confirmed but awaiting final approval from DHS)

Steve Howard, Executive Director, TecPort Solutions’ Cyber Defense and Compliance, Forensics Services Division

Andrew Leithead, Supervisory Special Agent, Hybrid Child Exploitation Task Force in Washington, DC and Northern Virginia, Washington Field Division, FBI

Russell Vines, Chief Security Advisor, Gotham Technology Group

Industry Case Study: CareerSafe National Cyber Security Program for High School Students and Teachers

Larry Teverbaugh, CEO, CareerSafe & K2Share

Register now