via their literature...
Keynote Address: Defending Against Cyber Threats in Dangerous Times
General Michael V. Hayden, Principal, Chertoff Group and former Director CIA, NSA
Top-notch education, security best practices and practical solutions you can take back to your office and implement right away. The conference is packed with informative sessions and practical workshops targeted to your specific needs so your time is always spent productively. For a complete list of speakers, topics, and schedule, go to: http://nsi.org/impact-agenda.html
What you will learn:
-- Step-by-step recommendations for improving your security program
-- Real world tips to prevent security breaches and deficiencies
-- How to ensure timely security clearance processing
-- How to defend against low-tech threats and social engineering
-- Vital intelligence about the latest collection techniques used by spies
-- Best practices for using JPAS, JCAVS and e-QIP
-- How to create a winning strategy for your awareness program
-- Practical countermeasures to defend against terrorism
-- Expert advice on how to avoid the biggest AIS security landmines
-- Best practices to implement NISPOM changes
-- Proven strategies for managing the human side of info security
-- Key steps for certification and accreditation of classified systems
-- How to manage risks to and from the mobile workforce
-- Practical, non-technical understanding of IT security threats
-- Valuable lessons learned from the security trenches
What you will learn:
-- Step-by-step recommendations for improving your security program
-- Real world tips to prevent security breaches and deficiencies
-- How to ensure timely security clearance processing
-- How to defend against low-tech threats and social engineering
-- Vital intelligence about the latest collection techniques used by spies
-- Best practices for using JPAS, JCAVS and e-QIP
-- How to create a winning strategy for your awareness program
-- Practical countermeasures to defend against terrorism
-- Expert advice on how to avoid the biggest AIS security landmines
-- Best practices to implement NISPOM changes
-- Proven strategies for managing the human side of info security
-- Key steps for certification and accreditation of classified systems
-- How to manage risks to and from the mobile workforce
-- Practical, non-technical understanding of IT security threats
-- Valuable lessons learned from the security trenches