SlideShare una empresa de Scribd logo
1 de 10
Defense and
Intelligence Council
Members
COUNCIL CHAIR
James A. Shamess, CPP
COUNCIL VICE CHAIR
Daniel A. McGarvey
2nd
COUNCIL VICE CHAIR
Karl C. Glasbrenner,
CPP, PCI
MEMBERS
List included
Defense and Intelligence Council
December 2014
A QUICK LOOKA QUICK LOOK
The Defense and Intelligence Council (D&IC) successfully closes
out the year with several accomplishments. The establishment of
issue specific focus groups and continued collaboration with the
security community led to positive participation and presentations
at the annual seminar. The council met goals and objectives
outlined in its business plan and looks forward to similar
achievements in 2015.
In this Issue:
 DOD Insider Threat Program
 2014 At-A-Glance
 Policies & Issues Survey
 National Counterintelligence & Security Center
 Meet Our Members
 2014 Annual Seminar-D&IC Sponsored Sessions
 Defense & Intelligence Council Members
DOD INSIDER THREAT PROGRAMDOD INSIDER THREAT PROGRAM
The National Insider Threat Policy and Minimum Standards for
Executive Branch Insider Threat Programs evolved from a
presidential memorandum in 2012 to provide guidance for
developing effective insider threat programs within agencies. The
goal was to identify actions and behaviors of employees who may
pose a threat to national security. The Department of Defense
issued a new Insider Threat Directive on September 30, 2014 to
further explain the requirements of the program.
The key components in the directive are:
• The program will monitor and audit information from sources
including counterintelligence, security, cybersecurity, civilian and
military personnel management, workplace violence, antiterrorism
risk management, law enforcement, user monitoring and other
sources as necessary.
• The program will provide training, education, and awareness to
military and civilian personnel, contractors and volunteers who
have access to DOD resources.
1 of 10
2 of 10
2014 AT-A-GLANCE2014 AT-A-GLANCE
The D&IC restructured the council to address the needs of the members and ASIS. An
executive committee emerged to manage the council infrastructure and relationships to
the ASIS membership. Several working groups were created to identify issues within
industry, find ways to leverage the council expertise and create partnerships with
government and industry members. The working groups manifested many
accomplishments in 2014.
Group Accomplishment
Policy and
Issues Working
Group
• Developed the first comprehensive security policy issues matrix for government
and industry.
• Issues matrix accepted as the standard document at many industry and
government events.
• A special team was formed at the request of the NISPPAC to address the
potential degradation of the NISP.
Insider Threat
Working Group
• Reorganized the ITWG into four functional subgroups (Operations, Analytics,
Collaboration and Education) staffed by government and industry SMEs to
develop an Insider Threat Program Model.
• Coordinated with NCMS Board of Directors the completion of an Insider Threat
survey of small and medium-sized organization programs.
• Provided Insider Threat Program Model presentations during the Annual
CAISSWG Conference (5/6), DIB SCC Quarterly Meeting (6/11) and AIA/NDIA
conference (9/24).
• Developed a presentation for the ASIS 2014 Seminar outlining how to create an
effective scalable model framework for a corporate Insider Threat Program.
• Supported the development and certification of Insider Threat Program and
Analytical Workshops for ASIS International.
• Develop a section in the ASIS O.P. Norton Library for an Insider Threat
Information Repository to hold reference/training materials. (In progress)
Trusted
Information
Provider
Working Group
• Chaired Pre-employment Background Screening Supplement (PBSS) Technical
Committee of the Commission of Standards & Guidelines:
o 20 hours of internal comment review/revision so far; another 20 hours
expected after public comment period.
o Hope to approve supplement by early 2015.
• Enlisted GWU PhD candidate in Systems Engineering to analyze TIP
clearinghouse/database management concern (ongoing).
Security Metrics • Supported the completion of the ASIS Foundation funded project which involved
researching and summarizing literature on the use of security metrics,
conducting surveys, performing interviews and collecting data associated with
current practices, developed a Security Metrics Evaluation Tool (SMET) to
evaluate specific metrics and published a 207 page report which has received
broad circulation.
• Created and delivered a training module the Insider Threat Workshop.
• Drafted and submitted for publication an article on Security Metrics for ASIS
Security Management (scheduled for publication in October 2014).
• Presenting on Security Metrics at the 2014 ASIS Annual Seminar.
3 of 10
4 of 10
POLICIES & ISSUES SURVEYPOLICIES & ISSUES SURVEY
The D&IC conducted a policies and issues survey as a topic area for discussion with
government and industry partners. Several noteworthy items to included changes in the
National Industrial Security Operating Manual were prevalent. The following chart
depicts the issues identified by members around the Defense Industrial Base and the
government.
NATIONAL COUNTERINTELLIGENCE & SECURITY CENTERNATIONAL COUNTERINTELLIGENCE & SECURITY CENTER
The National Counterintelligence and Security Center (NCSC) launched on
Monday, December 1, 2014 as the parent organization to the Office of the
National Counterintelligence Executive (ONCIX). The increase in cyber-attacks
to U.S. businesses and agencies led to the establishment of the NCSC.
Hackers are targeting personally identifiable information (PII) on U.S. citizens
and are using the information to affect the U.S. economy. The center brings
security and counterintelligence under one umbrella to be led by
William Evanina. The security component will continue to focus on government
security clearances and conducting background investigations. The
counterintelligence mission is to continue monitoring foreign intelligence
service activities and counterspy programs. Combining security and
counterintelligence has proved a successful practice around other organizations.
5 of 10
MEET OUR MEMBERSMEET OUR MEMBERS
Kerrie L. Kavulic
Security Education, Training and Awareness
Program Manager
Amazon Web Services
1. Briefly describe how you first
started in the defense /intelligence
business?
I always thought I would end up as a
lobbyist on Capitol Hill. Majoring in
government and history I wanted to
make a difference in national security
through legislative means. Fortunately, I
stumbled on the security profession
because my uncle worked in the
business and highly encouraged
everyone to do their best to protect
national security. I began my security
career at Northrop Grumman and quickly
became engrossed in the security
profession. I was given the opportunity
to influence employees to become force
multipliers and protect the nation.
2. What are your major challenges in
the defense/intelligence community?
Money has always been my major
challenge although not a complete road
block. My passion in security became
security training, awareness and
education and I was fortunate to find the
right opportunity and right managers to
allow me to flourish. Money continued to
be a challenge in producing quality
products on virtually no budget. I quickly
learned to become my own design
studio, print shop, video production
studio and web based training operation.
The challenges presented me with the
opportunity to learn to do it myself and
produce quality products at very low
cost.
3. What are your most prevalent
opportunities in the defense
/intelligence community?
My most prevalent opportunities have
been the ability to work with employees
and external organizations to figure out
the right products and messages to
protect information. I have always had
great managers that allowed me to use
my creative and strategic skills to launch
corporate wide security programs. I was
able to apply the knowledge and
dissemination strategies of protecting
classified information and projecting that
to other equally important programs.
4. What types of changes have you
personally developed and
implemented?
One of my greatest accomplishments
has been creating and instituting a
corporate wide protecting information
campaign. The intent was to categorize
information into six focus areas and
develop marketing materials, posters,
videos, training and awareness around
those areas. Employees were informed
on the definitions of the areas and then
given the tools to protect the information.
The areas consisted of protecting
classified information, company
proprietary information, export
controlled/ITAR information, controlled
unclassified information, personally
identifiable information, and protected
health information. The campaign blast
around each topic was comprehensive
and disseminated in several forms to
allow a blended learning approach. The
campaign was extremely successful
6 of 10
which resulted in me receiving company
and industry awards. The most
important part for me was discussing the
topics with employees and repeatedly
seeing the ‘brand’ around the company.
There was a heightened awareness by
employees to protect all types of
information which ultimately protects our
country and our trade secrets.
5. What is your vision for the
company/agency?
My challenge continues to be finding a
balance in educating those that
understand the classified environment
and those who do not. The uncleared
employee is just as important in
recognizing the insider threat, external
threats, and must be vigilant. The HR
person working for a defense contractor
has sensitive information can be targeted
just because of the nature of their
employer. My vision is to continue to
bring awareness to all employees in
understanding the importance of
protecting national security information.
6. What keeps you enthused about
your career?
Creativity keeps me enthused about my
career. I have been able to use
processes, procedures, and new ways to
bring forth messages appropriate to the
audiences in different ways.
7. What is your leadership style?
I am a democratic leader. I am
diplomatic in my approach to effectively
leading and managing projects and
people. Being democratic allows buy in
from different audiences and makes
them a stakeholder in the process.
Creating a first rate product is ineffective
if I don’t have the buy in from
management or employees.
8. What lessons have you learned
throughout your career that still
inspires you today?
Listening to people has been one of the
most important lessons I have learned.
Stakeholders are all different depending
on what you are trying to sell-whether
products or programs. The more
engagement I provide the better the
programs are received. I have often
thought of myself as a marketing and
advertising security professional because
I feel as though I am constantly ‘selling’
security to someone. The key has been
to be able to sell it in a way best received
by that audience. Security comes in all
shapes and sizes and being creative in
the way it is disseminated has been a
lesson that continues to inspire me every
day.
7 of 10
Heightened Awareness Protects our Secrets
2014 ANNUAL SEMINAR – D&IC SPONSORED SESSIONS2014 ANNUAL SEMINAR – D&IC SPONSORED SESSIONS
The D&IC sponsored 7 sessions at the annual seminar. The sessions covered a variety of topic
areas with prominent speakers and were well received. The D&IC also met with several members
from the defense and intelligence industry as well as other industry partners.
Session Title Speaker(s) Abstract
Insider Threat
Program Model, Part
1: Best Security
Practices from
Government and
Industry
George Quin
Lockheed Martin Aeronautics
Dave Drab
Insider Threat Mitigation Group
Daniel McGarvey
Global Skills X-change
Every business has its own “crown jewels” which provide
an edge in a highly competitive global market. What
would happen if your company lost its edge through
internal theft or sabotage? Learn how to safeguard your
company’s proprietary, sensitive, and government-
provided information from unauthorized disclosure by
deterring, detecting, and defeating employee insider
threats. This two-part session presents a scalable program
derived from government and industry best practices to
counter the insider threats. Part 1 introduces the Insider
Threat Program Model and describes its operational and
analytical components.
Insider Threat Program
Model, Part 2: Best
Security Practices from
Government and
Industry
George Quin
Lockheed Martin Aeronautics
Michael McCall
Raytheon Company
Mark Dargis
FBI Headquarters
Part 2 describes the educational and collaborative
components of the Insider Threat Program Model.
Shaping Federal
Security Policy
John Fitzpatrick
Director
National Archives and Records
Administration
Mike Witt
Director of Security/Chief
Security Officer
Ball Aerospace & Technologies
Corp.
Discover how ASIS International helps influence
National Industrial Security policy as one of seven
professional security associations known as the
Memorandum of Understanding (MOU) group. Many
within the industry are unaware of the MOU and the role
it plays in shaping National Industrial Security policy.
ASIS was founded in 1955 by industrial security
directors collaborating to improve classified information
safeguards. Today, the U.S. government still
aggressively seeks ASIS expertise. Learn about the
National Industrial Security Program Policy Advisory
Committee, other MOU signatories, and how the group
speaks with one voice.
Leveraging Security
Metrics to Demonstrate
Efficiencies and ROI
Peter Ohlhausen
President
Ohlhausen Research, Inc.
Daniel McGarvey
Metrics Research Team
ASIS Foundation
Tracking metrics is the answer to measuring the
effectiveness of security. But what are the best ones
and best examples? How can a security organization
assess and improve a metric and then tailor it to
organizational needs? Discover the answers from new
ASIS Foundation research. Learn the specifics of a
Security Metrics Evaluation Tool, which helps assess,
8 of 10
select, and improve metrics. Hear a description of
metrics in actual use today by private and public sector
organizations, and gain ideas that can be applied to any
organization. Discover guidelines for using metrics to
inform senior management and demonstrate return on
investment.
Sex, Drugs, and Rock
n Roll: The 24/7
Online Party
Adam Lurie
Vice President - Government
Solutions
Social Intelligence Corp.
Geoffrey Andrews
Chief Operating Officer
Social Intelligence Corp.
Can security departments legally use social media and
online data? Case studies help to illuminate the types of
deviant behavior that regularly exists online and how to
best locate and identify vital information. Online data is
a treasure trove of information that has been applied to
security operations, insider threat detection, and social
network analysis. The result? Individuals have been
caught engaging in various types of illegal activity, and
lives have been saved.
Defense Security
Service: A Report to
ASIS
Stanley Sims
Director
Defense Security Service
Learn about the symbiotic relationship between the
Defense Security Service (DSS) and ASIS International
and current DSS initiatives that affect industry. DSS
supports national security and the warfighter, secures the
technological base, and oversees the protection of U.S.
and foreign classified information in the hands of
industry. It provides security and counterintelligence
support to approximately 14,000 facilities on behalf of
the military services, defense agencies, and 26 other
federal agencies in the National Industrial Security
Program. Also learn about the role of DSS in the defense
of the cyber domain.
Bulletproof Your
Thinking: Key Skills
for Security
Professionals
Kathy Pherson
CEO
Pherson Associates, LLC
Critical thinking techniques can help frame solutions for
a range of security problems, ranging from sensitive
facilities, supply chains, counterterrorism analysis, and
competitive intelligence pertinent to homeland security
or national security issues. Focusing on analytic
strategies that improve rigor, avoid mental traps, and
communicate clearly with others, security examples will
be used to demonstrate the importance of understanding
your context, checking key assumptions, considering
alternative explanations, seeking inconsistent data, and
focusing on key drivers and indicators. These skills will
improve the quality of your work by protecting against
biased thinking, spurring imagination, and facilitating
collaboration with others.
9 of 10
DEFENSE SECURITY SERVICE UPDATEDEFENSE SECURITY SERVICE UPDATE
10 of 10
D&IC MEMBERSD&IC MEMBERS
Curt E. Armbruster J. Michael Harris Rhonda Peyton
Jeffrey J. Berkin Klaus Heerwig Charles S. Phalen, Jr.
Marc Brooks Matthew Hollandsworth Katherine Pherson
David P. Brummell Vincent Jarvie Michael J. Porturica
Allen Chung Alvina E. Jones Steven Rutledge
Michael H. Clancy Kerrie L. Kavulic Marc Ryan
Cynthia P. Conlon Robb Kubiak-Cherkaski Marshall C. Sanders
Christian Conroy Michael L. Laverdure Daniel E.(Dan) Schlehr
Shawn S. Daley Robert O. Lilje James Shamess
Carl Davis Joseph S. Mahaley Cheryl Stone
Jeffrey C. (JC) Dodson Jeffrey C. Manzanec Michelle Sutphin
Jonathan Fitz-Enz Gregory Marshall Robert E. Trono
John Fitzpatrick John McCarthy Jeff Vish
William F. Flynn Daniel A. McGarvey Richard Weaver
Karl C. Glasbrenner Paul Mellema Richard F. Williams
Dennis P. Hanratty Raymond Musser
Robert Harney Greg Pannoni
Links
Defense & Intelligence Council –
http://www.asisonline.org/councils/GOVT.xml
ASIS International – http://www.asisonline.org/
Next Issue:
April 2015
Defense & Intelligence Council Newsletter:
Contact Kerrie Kavulic
kkavulic@amazon.com

Más contenido relacionado

Destacado

Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27
Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27
Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27Kevin Berry
 
10 JUN 10 Tenant Executive Council
10 JUN 10 Tenant Executive Council10 JUN 10 Tenant Executive Council
10 JUN 10 Tenant Executive CouncilWashington, DC
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
John Szkotnicki Resume 1
John Szkotnicki Resume 1John Szkotnicki Resume 1
John Szkotnicki Resume 1John Szkotnicki
 
Psa Capabilities Brief 12 19
Psa Capabilities Brief 12 19Psa Capabilities Brief 12 19
Psa Capabilities Brief 12 19Michael Dean
 
U.S. Transition – Forming the Next Government
U.S. Transition – Forming the Next GovernmentU.S. Transition – Forming the Next Government
U.S. Transition – Forming the Next Governmentkolkn
 
J2X OMT Course 2005
J2X OMT Course 2005J2X OMT Course 2005
J2X OMT Course 2005John Wilson
 
Tactical Convoy Operations Course Cert 2004
Tactical Convoy Operations Course Cert 2004Tactical Convoy Operations Course Cert 2004
Tactical Convoy Operations Course Cert 2004John Wilson
 
Tactical Pistol and Carbine Course 2004
Tactical Pistol and Carbine Course 2004Tactical Pistol and Carbine Course 2004
Tactical Pistol and Carbine Course 2004John Wilson
 
DoD Strategic Debriefing Course Cert (DoD) 2003
DoD Strategic Debriefing Course Cert (DoD) 2003DoD Strategic Debriefing Course Cert (DoD) 2003
DoD Strategic Debriefing Course Cert (DoD) 2003John Wilson
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
Antiterrorist Driving Course and SDR BSR 2002
Antiterrorist Driving Course and SDR BSR 2002Antiterrorist Driving Course and SDR BSR 2002
Antiterrorist Driving Course and SDR BSR 2002John Wilson
 
MAGTF Intelligence Course 1997
MAGTF Intelligence Course 1997MAGTF Intelligence Course 1997
MAGTF Intelligence Course 1997John Wilson
 
Counterintelligence Analysis Course 2004
Counterintelligence Analysis Course 2004Counterintelligence Analysis Course 2004
Counterintelligence Analysis Course 2004John Wilson
 

Destacado (20)

CI_Reader_Vol1
CI_Reader_Vol1CI_Reader_Vol1
CI_Reader_Vol1
 
Obsec newsletter
Obsec newsletterObsec newsletter
Obsec newsletter
 
013112 mds resume9
013112 mds resume9013112 mds resume9
013112 mds resume9
 
Importance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To CorporationsImportance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To Corporations
 
Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27
Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27
Enrollment Is The Start Not The End 2010 Mhs Conference Jan 27
 
10 JUN 10 Tenant Executive Council
10 JUN 10 Tenant Executive Council10 JUN 10 Tenant Executive Council
10 JUN 10 Tenant Executive Council
 
S I M I A T U G
S I M I A T U GS I M I A T U G
S I M I A T U G
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
John Szkotnicki Resume 1
John Szkotnicki Resume 1John Szkotnicki Resume 1
John Szkotnicki Resume 1
 
Psa Capabilities Brief 12 19
Psa Capabilities Brief 12 19Psa Capabilities Brief 12 19
Psa Capabilities Brief 12 19
 
U.S. Transition – Forming the Next Government
U.S. Transition – Forming the Next GovernmentU.S. Transition – Forming the Next Government
U.S. Transition – Forming the Next Government
 
J2X OMT Course 2005
J2X OMT Course 2005J2X OMT Course 2005
J2X OMT Course 2005
 
CI Reader Vol 2
CI Reader Vol 2CI Reader Vol 2
CI Reader Vol 2
 
Tactical Convoy Operations Course Cert 2004
Tactical Convoy Operations Course Cert 2004Tactical Convoy Operations Course Cert 2004
Tactical Convoy Operations Course Cert 2004
 
Tactical Pistol and Carbine Course 2004
Tactical Pistol and Carbine Course 2004Tactical Pistol and Carbine Course 2004
Tactical Pistol and Carbine Course 2004
 
DoD Strategic Debriefing Course Cert (DoD) 2003
DoD Strategic Debriefing Course Cert (DoD) 2003DoD Strategic Debriefing Course Cert (DoD) 2003
DoD Strategic Debriefing Course Cert (DoD) 2003
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Antiterrorist Driving Course and SDR BSR 2002
Antiterrorist Driving Course and SDR BSR 2002Antiterrorist Driving Course and SDR BSR 2002
Antiterrorist Driving Course and SDR BSR 2002
 
MAGTF Intelligence Course 1997
MAGTF Intelligence Course 1997MAGTF Intelligence Course 1997
MAGTF Intelligence Course 1997
 
Counterintelligence Analysis Course 2004
Counterintelligence Analysis Course 2004Counterintelligence Analysis Course 2004
Counterintelligence Analysis Course 2004
 

Similar a Defense and Intelligence Council Members List and Accomplishments

Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15DSCI_Connect
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zeroConsultivo
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxdanhaley45372
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALdjnonstp
 

Similar a Defense and Intelligence Council Members List and Accomplishments (20)

Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero10 ways to ensure your safety leadership journey towards vision zero
10 ways to ensure your safety leadership journey towards vision zero
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programs
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Nuclear Industry Resilience
Nuclear Industry ResilienceNuclear Industry Resilience
Nuclear Industry Resilience
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Resume #11
Resume #11Resume #11
Resume #11
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINAL
 

Defense and Intelligence Council Members List and Accomplishments

  • 1. Defense and Intelligence Council Members COUNCIL CHAIR James A. Shamess, CPP COUNCIL VICE CHAIR Daniel A. McGarvey 2nd COUNCIL VICE CHAIR Karl C. Glasbrenner, CPP, PCI MEMBERS List included Defense and Intelligence Council December 2014 A QUICK LOOKA QUICK LOOK The Defense and Intelligence Council (D&IC) successfully closes out the year with several accomplishments. The establishment of issue specific focus groups and continued collaboration with the security community led to positive participation and presentations at the annual seminar. The council met goals and objectives outlined in its business plan and looks forward to similar achievements in 2015. In this Issue:  DOD Insider Threat Program  2014 At-A-Glance  Policies & Issues Survey  National Counterintelligence & Security Center  Meet Our Members  2014 Annual Seminar-D&IC Sponsored Sessions  Defense & Intelligence Council Members DOD INSIDER THREAT PROGRAMDOD INSIDER THREAT PROGRAM The National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs evolved from a presidential memorandum in 2012 to provide guidance for developing effective insider threat programs within agencies. The goal was to identify actions and behaviors of employees who may pose a threat to national security. The Department of Defense issued a new Insider Threat Directive on September 30, 2014 to further explain the requirements of the program. The key components in the directive are: • The program will monitor and audit information from sources including counterintelligence, security, cybersecurity, civilian and military personnel management, workplace violence, antiterrorism risk management, law enforcement, user monitoring and other sources as necessary. • The program will provide training, education, and awareness to military and civilian personnel, contractors and volunteers who have access to DOD resources. 1 of 10
  • 3. 2014 AT-A-GLANCE2014 AT-A-GLANCE The D&IC restructured the council to address the needs of the members and ASIS. An executive committee emerged to manage the council infrastructure and relationships to the ASIS membership. Several working groups were created to identify issues within industry, find ways to leverage the council expertise and create partnerships with government and industry members. The working groups manifested many accomplishments in 2014. Group Accomplishment Policy and Issues Working Group • Developed the first comprehensive security policy issues matrix for government and industry. • Issues matrix accepted as the standard document at many industry and government events. • A special team was formed at the request of the NISPPAC to address the potential degradation of the NISP. Insider Threat Working Group • Reorganized the ITWG into four functional subgroups (Operations, Analytics, Collaboration and Education) staffed by government and industry SMEs to develop an Insider Threat Program Model. • Coordinated with NCMS Board of Directors the completion of an Insider Threat survey of small and medium-sized organization programs. • Provided Insider Threat Program Model presentations during the Annual CAISSWG Conference (5/6), DIB SCC Quarterly Meeting (6/11) and AIA/NDIA conference (9/24). • Developed a presentation for the ASIS 2014 Seminar outlining how to create an effective scalable model framework for a corporate Insider Threat Program. • Supported the development and certification of Insider Threat Program and Analytical Workshops for ASIS International. • Develop a section in the ASIS O.P. Norton Library for an Insider Threat Information Repository to hold reference/training materials. (In progress) Trusted Information Provider Working Group • Chaired Pre-employment Background Screening Supplement (PBSS) Technical Committee of the Commission of Standards & Guidelines: o 20 hours of internal comment review/revision so far; another 20 hours expected after public comment period. o Hope to approve supplement by early 2015. • Enlisted GWU PhD candidate in Systems Engineering to analyze TIP clearinghouse/database management concern (ongoing). Security Metrics • Supported the completion of the ASIS Foundation funded project which involved researching and summarizing literature on the use of security metrics, conducting surveys, performing interviews and collecting data associated with current practices, developed a Security Metrics Evaluation Tool (SMET) to evaluate specific metrics and published a 207 page report which has received broad circulation. • Created and delivered a training module the Insider Threat Workshop. • Drafted and submitted for publication an article on Security Metrics for ASIS Security Management (scheduled for publication in October 2014). • Presenting on Security Metrics at the 2014 ASIS Annual Seminar. 3 of 10
  • 5. POLICIES & ISSUES SURVEYPOLICIES & ISSUES SURVEY The D&IC conducted a policies and issues survey as a topic area for discussion with government and industry partners. Several noteworthy items to included changes in the National Industrial Security Operating Manual were prevalent. The following chart depicts the issues identified by members around the Defense Industrial Base and the government. NATIONAL COUNTERINTELLIGENCE & SECURITY CENTERNATIONAL COUNTERINTELLIGENCE & SECURITY CENTER The National Counterintelligence and Security Center (NCSC) launched on Monday, December 1, 2014 as the parent organization to the Office of the National Counterintelligence Executive (ONCIX). The increase in cyber-attacks to U.S. businesses and agencies led to the establishment of the NCSC. Hackers are targeting personally identifiable information (PII) on U.S. citizens and are using the information to affect the U.S. economy. The center brings security and counterintelligence under one umbrella to be led by William Evanina. The security component will continue to focus on government security clearances and conducting background investigations. The counterintelligence mission is to continue monitoring foreign intelligence service activities and counterspy programs. Combining security and counterintelligence has proved a successful practice around other organizations. 5 of 10
  • 6. MEET OUR MEMBERSMEET OUR MEMBERS Kerrie L. Kavulic Security Education, Training and Awareness Program Manager Amazon Web Services 1. Briefly describe how you first started in the defense /intelligence business? I always thought I would end up as a lobbyist on Capitol Hill. Majoring in government and history I wanted to make a difference in national security through legislative means. Fortunately, I stumbled on the security profession because my uncle worked in the business and highly encouraged everyone to do their best to protect national security. I began my security career at Northrop Grumman and quickly became engrossed in the security profession. I was given the opportunity to influence employees to become force multipliers and protect the nation. 2. What are your major challenges in the defense/intelligence community? Money has always been my major challenge although not a complete road block. My passion in security became security training, awareness and education and I was fortunate to find the right opportunity and right managers to allow me to flourish. Money continued to be a challenge in producing quality products on virtually no budget. I quickly learned to become my own design studio, print shop, video production studio and web based training operation. The challenges presented me with the opportunity to learn to do it myself and produce quality products at very low cost. 3. What are your most prevalent opportunities in the defense /intelligence community? My most prevalent opportunities have been the ability to work with employees and external organizations to figure out the right products and messages to protect information. I have always had great managers that allowed me to use my creative and strategic skills to launch corporate wide security programs. I was able to apply the knowledge and dissemination strategies of protecting classified information and projecting that to other equally important programs. 4. What types of changes have you personally developed and implemented? One of my greatest accomplishments has been creating and instituting a corporate wide protecting information campaign. The intent was to categorize information into six focus areas and develop marketing materials, posters, videos, training and awareness around those areas. Employees were informed on the definitions of the areas and then given the tools to protect the information. The areas consisted of protecting classified information, company proprietary information, export controlled/ITAR information, controlled unclassified information, personally identifiable information, and protected health information. The campaign blast around each topic was comprehensive and disseminated in several forms to allow a blended learning approach. The campaign was extremely successful 6 of 10
  • 7. which resulted in me receiving company and industry awards. The most important part for me was discussing the topics with employees and repeatedly seeing the ‘brand’ around the company. There was a heightened awareness by employees to protect all types of information which ultimately protects our country and our trade secrets. 5. What is your vision for the company/agency? My challenge continues to be finding a balance in educating those that understand the classified environment and those who do not. The uncleared employee is just as important in recognizing the insider threat, external threats, and must be vigilant. The HR person working for a defense contractor has sensitive information can be targeted just because of the nature of their employer. My vision is to continue to bring awareness to all employees in understanding the importance of protecting national security information. 6. What keeps you enthused about your career? Creativity keeps me enthused about my career. I have been able to use processes, procedures, and new ways to bring forth messages appropriate to the audiences in different ways. 7. What is your leadership style? I am a democratic leader. I am diplomatic in my approach to effectively leading and managing projects and people. Being democratic allows buy in from different audiences and makes them a stakeholder in the process. Creating a first rate product is ineffective if I don’t have the buy in from management or employees. 8. What lessons have you learned throughout your career that still inspires you today? Listening to people has been one of the most important lessons I have learned. Stakeholders are all different depending on what you are trying to sell-whether products or programs. The more engagement I provide the better the programs are received. I have often thought of myself as a marketing and advertising security professional because I feel as though I am constantly ‘selling’ security to someone. The key has been to be able to sell it in a way best received by that audience. Security comes in all shapes and sizes and being creative in the way it is disseminated has been a lesson that continues to inspire me every day. 7 of 10 Heightened Awareness Protects our Secrets
  • 8. 2014 ANNUAL SEMINAR – D&IC SPONSORED SESSIONS2014 ANNUAL SEMINAR – D&IC SPONSORED SESSIONS The D&IC sponsored 7 sessions at the annual seminar. The sessions covered a variety of topic areas with prominent speakers and were well received. The D&IC also met with several members from the defense and intelligence industry as well as other industry partners. Session Title Speaker(s) Abstract Insider Threat Program Model, Part 1: Best Security Practices from Government and Industry George Quin Lockheed Martin Aeronautics Dave Drab Insider Threat Mitigation Group Daniel McGarvey Global Skills X-change Every business has its own “crown jewels” which provide an edge in a highly competitive global market. What would happen if your company lost its edge through internal theft or sabotage? Learn how to safeguard your company’s proprietary, sensitive, and government- provided information from unauthorized disclosure by deterring, detecting, and defeating employee insider threats. This two-part session presents a scalable program derived from government and industry best practices to counter the insider threats. Part 1 introduces the Insider Threat Program Model and describes its operational and analytical components. Insider Threat Program Model, Part 2: Best Security Practices from Government and Industry George Quin Lockheed Martin Aeronautics Michael McCall Raytheon Company Mark Dargis FBI Headquarters Part 2 describes the educational and collaborative components of the Insider Threat Program Model. Shaping Federal Security Policy John Fitzpatrick Director National Archives and Records Administration Mike Witt Director of Security/Chief Security Officer Ball Aerospace & Technologies Corp. Discover how ASIS International helps influence National Industrial Security policy as one of seven professional security associations known as the Memorandum of Understanding (MOU) group. Many within the industry are unaware of the MOU and the role it plays in shaping National Industrial Security policy. ASIS was founded in 1955 by industrial security directors collaborating to improve classified information safeguards. Today, the U.S. government still aggressively seeks ASIS expertise. Learn about the National Industrial Security Program Policy Advisory Committee, other MOU signatories, and how the group speaks with one voice. Leveraging Security Metrics to Demonstrate Efficiencies and ROI Peter Ohlhausen President Ohlhausen Research, Inc. Daniel McGarvey Metrics Research Team ASIS Foundation Tracking metrics is the answer to measuring the effectiveness of security. But what are the best ones and best examples? How can a security organization assess and improve a metric and then tailor it to organizational needs? Discover the answers from new ASIS Foundation research. Learn the specifics of a Security Metrics Evaluation Tool, which helps assess, 8 of 10
  • 9. select, and improve metrics. Hear a description of metrics in actual use today by private and public sector organizations, and gain ideas that can be applied to any organization. Discover guidelines for using metrics to inform senior management and demonstrate return on investment. Sex, Drugs, and Rock n Roll: The 24/7 Online Party Adam Lurie Vice President - Government Solutions Social Intelligence Corp. Geoffrey Andrews Chief Operating Officer Social Intelligence Corp. Can security departments legally use social media and online data? Case studies help to illuminate the types of deviant behavior that regularly exists online and how to best locate and identify vital information. Online data is a treasure trove of information that has been applied to security operations, insider threat detection, and social network analysis. The result? Individuals have been caught engaging in various types of illegal activity, and lives have been saved. Defense Security Service: A Report to ASIS Stanley Sims Director Defense Security Service Learn about the symbiotic relationship between the Defense Security Service (DSS) and ASIS International and current DSS initiatives that affect industry. DSS supports national security and the warfighter, secures the technological base, and oversees the protection of U.S. and foreign classified information in the hands of industry. It provides security and counterintelligence support to approximately 14,000 facilities on behalf of the military services, defense agencies, and 26 other federal agencies in the National Industrial Security Program. Also learn about the role of DSS in the defense of the cyber domain. Bulletproof Your Thinking: Key Skills for Security Professionals Kathy Pherson CEO Pherson Associates, LLC Critical thinking techniques can help frame solutions for a range of security problems, ranging from sensitive facilities, supply chains, counterterrorism analysis, and competitive intelligence pertinent to homeland security or national security issues. Focusing on analytic strategies that improve rigor, avoid mental traps, and communicate clearly with others, security examples will be used to demonstrate the importance of understanding your context, checking key assumptions, considering alternative explanations, seeking inconsistent data, and focusing on key drivers and indicators. These skills will improve the quality of your work by protecting against biased thinking, spurring imagination, and facilitating collaboration with others. 9 of 10
  • 10. DEFENSE SECURITY SERVICE UPDATEDEFENSE SECURITY SERVICE UPDATE 10 of 10 D&IC MEMBERSD&IC MEMBERS Curt E. Armbruster J. Michael Harris Rhonda Peyton Jeffrey J. Berkin Klaus Heerwig Charles S. Phalen, Jr. Marc Brooks Matthew Hollandsworth Katherine Pherson David P. Brummell Vincent Jarvie Michael J. Porturica Allen Chung Alvina E. Jones Steven Rutledge Michael H. Clancy Kerrie L. Kavulic Marc Ryan Cynthia P. Conlon Robb Kubiak-Cherkaski Marshall C. Sanders Christian Conroy Michael L. Laverdure Daniel E.(Dan) Schlehr Shawn S. Daley Robert O. Lilje James Shamess Carl Davis Joseph S. Mahaley Cheryl Stone Jeffrey C. (JC) Dodson Jeffrey C. Manzanec Michelle Sutphin Jonathan Fitz-Enz Gregory Marshall Robert E. Trono John Fitzpatrick John McCarthy Jeff Vish William F. Flynn Daniel A. McGarvey Richard Weaver Karl C. Glasbrenner Paul Mellema Richard F. Williams Dennis P. Hanratty Raymond Musser Robert Harney Greg Pannoni Links Defense & Intelligence Council – http://www.asisonline.org/councils/GOVT.xml ASIS International – http://www.asisonline.org/ Next Issue: April 2015 Defense & Intelligence Council Newsletter: Contact Kerrie Kavulic kkavulic@amazon.com