2025 Conference Agenda
When
What
Who
Introduction to the conference from the DCSA Deputy Director.
This session will review the five mission pillars, and their functions related to the agency mission and national security.
This session will provide an overview of the National Industrial Security Program (NISP) from the Federal Acquisition Regulation (FAR)
clause to include status of pending Industrial Security Letters (ISLs) and recent guidance from industry.
12:30 - 1:30 PM
Lunch
This session will provide a walk-through of DCSA's most commonly identified instances of National Industrial Security Program Operations
Manual (NISPOM) non-compliance at industry facilities.
This session will provide an update on the DCSA Security Rating Scorecard, which was jointly developed with the National Industrial Security
Program Policy Accountability Council (NISPPAC) and fully implemented on October 1, 2024.
This session will provide unique insights, metrics, and updates from Background Investigations (BI), Adjudication Vetting Services (AVS),
and the National Background Investigation Services (NBIS).
Summary of the day with information about the next day's sessions.
When
What
Who
Introduction to Day 2 of the conference from DCSA's premier provider of security training..
10:15 - 11:15 AM
This session will provide unique insight into the integrated partnership between the Military Departments (MILDEPS), the DCSA,
and Industry partners to protect people, facilities, systems and data.
11:30 -12:30 PM
This session will be offered by two BTAC SMES and will provide an overview of Shaw and Seller's Critical Pathway to Insider Risk and will discuss individual and organizational behaviors of concern as recognizing behaviors is often a barrier to effective insider risk reporting. Strategies for effective threat management will also be covered.
12:30 - 1:00 PM
Lunch
Come learn about the NCCS application, how to onboards, and how the application processes DD254s.
This session will cover where we are today with Controlled Unclassified Information (CUI) and Cybersecurity Maturity Model Certification (CMMC).
This session will cover the DCSA's processes for vetting Foreign Ownership, Control, or Influence (FOCI) and beneficial ownership in the National
Industrial Security Program (NISP), extending this capability to pre-award vetting and the unclassified domain.
Close-out remarks from the Deputy Director.