Skip Navigation Links
FITARA Implementation Symposium II
Army Cyber Innovation Challenge
FITARA Implementation Symposium III
AFEI Supported Events
Past Events
Working Groups
Industry Advisory Group (IAG)
Outcome Driven Government
PM-ISE Working Groups
Section 804 Task Force
AFEI Awards
2015 Nomination Schedule and Process
Award History
What We Do
Contact Us

 Supply Chain Cyber Risk Forum 


 Cyber Threats - Changing Risk Management Paradigms 

Event Number



 12/7/2010  to 12/7/2010 


 Army Navy Club, Washington DC 


 Betsy Lauer, [email protected] 



Location:  Army Navy Club - Farragut Square, Washington, D.C.

Time:  8:00 AM till 12:30 PM

Cyber threats are changing our traditional perceptions and paradigms regarding supply chain risk management (SCRM).

This half-day forum focuses on the evolving definition and reality of supply chain risk management in the ubiquitously connected world of today.

The topic can be summarized in a statement from an essay by Deputy Secretary of Defense William Lynn that appeared in Foreign Affairs:

"The risk of compromise in the manufacturing process is very real and is perhaps the least understood cyber threat."

Supply chain reliance on information systems creates new vulnerabilities that challenge well-defined supply chain trust models through the introduction of interdependencies and complexities that are not well understood and are as dynamic as the technology.  

This symposium addresses the following questions:

  • What are the unintended consequences of physical and cyber intersections for supply chains?
  • How are real issues in this space defined and differentiated from non-issues?
  • What are new policies and models for trusting suppliers, their supply chains and systems?
  • Are current policies and those under consideration regarding suppliers and counterfeiting really going to be effective?

Risk management in the physical aspects of supply chains is well understood.  However, the ubiquitous use of information technology across the spectrum of supply chains introduces potential vulnerabilities that are not well understood.  For example, the insertion of malware in replacement boards for controllers or network servers is nearly impossible to detect until it causes a problem.  The intersection of physical supply chains and cyber threats introduces a new class of risk and vulnerability.

The Agenda

8:00 AM


Ms. Jennifer Bisceglie, President & Founder, Interos Solutions, Inc.
Keynote Speaker

Mr. Mitchell Komaroff, Director, Trusted Mission Systems and Networks, DoD CIO


 8:45 AM

Panel - the Art of Defining Supply Chain Risk





Mr. Steve Lipner, Microsoft, Chairman of SAFECode

Mr. Larry Clinton, President, Internet Security Alliance

Mr. Jeffrey Troy, Deputy Assistant Director, Cyber Division, FBI

Mr. Mark Crawford, Senior Trade & Industry Analyst, Office of Technology Evaluation, Bureau of Industry and Security, U.S. Department of Commerce

Moderated by Ms. Jennifer Bisceglie, Interos Solutions, Inc.

 9:45 AM Break
10:00 AM

Panel - Perspectives on Industry


Hon. Jacques Gansler, Ph.D., Roger C. Lipitz Chair in Public Policy and Private Enterprise, University of Maryland

Dr. Linton Wells II, Director, Center for Technology and National Security Policy, National Defense University

Ms. Glenda TurnerSenior Principal Cybersecurity Engineer, MITRE

Mr. French Caldwell, Gartner Analyst

Moderated by Mr. Dallas Hale, Agile Edge Technologies

 11:00 AM

Panel - Getting the Policy Right


Ms. Deborah Parkinson, Professional Staff Member, Senate Homeland Security and Governmental Affairs Committee, U.S. Senate

Mr. Trey Hodgkins, Vice President, National Security & Procurement Policy, TechAmerica

Mr. Andrew Howell, Partner, Monument Policy Group LLC, Alliance for Gray Market and Counterfeit Abatement

Mr. Mitchell Komaroff, Director, Trusted Mission Systems and Networks, DoD CIO

Moderated by Mr. Robert Dix, Juniper Networks

12:00 PM

Closing Keynote


Jenny Menna, Director, Critical Infrastructure Cyber Protection & Awareness, National Cyber Security Division, Department of Homeland Security





The Army Navy Club
901 17th Street NW
Washington, DC 20006
(202)- 534-3191

Registration is now closed as the event is over-capacity. Please contact Betsy at 703-247-9473 for additional information. 


Government Employee / Academia


Industry / Individual Member


Industry / Individual Non-Member



Registration Policy
Please do not fax or mail any registrations after December 1, 2010.  After this date, please bring your registration form with you to the conference to register onsite.  Registrations will not be taken over the phone.  Payment must be made at the time of registration.

Cancellation Policy
Cancellations received before November 12, 2010 will receive a full refund.  Cancellations received between November 13 and December 1, 2010 will receive a refund minus a $75 cancellation fee.  No refunds will be given for cancellations received after December 1, 2010.  Substitutions are welcome in lieu of cancellations. Substitutions and cancellations must be made in writing to [email protected].

For Attendees


This symposium brings together policy makers and subject matter experts to begin to explore how to address this increasingly serious issue.

The purpose of the symposium is to:

  • Build a framework for understanding and defining the problem
  • Identify current approaches to addressing the risk from cyber vulnerabilities
  • Learn from industry and government best practices

Who should attend?

  • Experts in IT, manufacturing and logistics communities concerned with cyber vulnerabilities in their supplier base
  • Those involved with supply chain assurance for critical infrastructure, business and government operations, homeland security and defense.
  • Policy authorities involved with developing and setting government and corporate supply chain security and assurance policies.
  • Those concerned with determining , evaluating, mitigating and managing supply base risk.
  • Vendors concerned with detecting and defeating counterfeits and disruptive threats.

By attending you will gain insight on critical efforts such as:

  • National Strategy for Trusted Identities in Cyberspace
  • Implementation of initiatives stemming from the National Cyber Incident Response Plan
  • Piloting Supply Chain Risk Management Practices for Federal Information Systems
  • Approaches to trusted supplier initiatives (DoD Trusted Foundries Program)
  • Supply Chain Assurance Guidance