From the AEGIS e-Journal, Volume 7 Number 5, May 2004
National OPSEC Conference and Exhibition The annual national OPSEC security conference and exhibition, sponsored by the Interagency OPSEC Support Staff (IOSS) in association with the OPSEC Professionals Society (OPS) is being held this year in Baltimore, Maryland from June 6th through June 11th. The OPSEC conference is the premier gathering of those whose expertise is the identification and protection of critical information. If you are concerned about the protection of your proprietary information, or protection from economic espionage, you ought to go (or send someone) to this conference. We have attached the provisional schedule, and urge you go: At $385 – and including a few lunches – it is the informational bargain of the year. The conference registration information is to be found at https://www.iaevents.com/NatOpsec04/newinfo.cfm. For those who wish to become members of the OPSEC Professionals Society, an application can be found at http://www.opsec.org/memberapp.html. Conference and Exhibition Schedule (subject to change) Sunday, 6 June 2004 1500-1900 Registration and Social
Monday, 7 June 2004 0700 Registration Open 0700-1700 Exhibits open 0800- 0930 D*I*C*E “Now More Than Ever” 0930-0945 Exhibits Break 0930-1130 Hidden Universes of Information on the Internet OPSE 1300 for DHS OPSE 1300 for DOD Overview of CI Threat in the U.S. Protecting Tomorrow’s Warfighting Systems Today No Session 1130-1230 Luncheon Speaker – “Violence in the Workplace Protecting Our People in Changing Times” ÆGIS, May 2004 5 1230-1300 Exhibits Break 1300-1700 Hidden Universes of Information on the Internet continues OPSE 1300 for DHS continues OPSE 1300 for DOD continues Overview of CI Threat in the U.S. continues Protecting Tomorrow’s Warfighting Systems Today continues Designing Awareness Training Workshop
Tuesday, 8 June 2004 0700-1700 Registration & Exhibits Open 0800-0815 Opening Remarks 0815-0900 Opening Keynote Speaker 0915-1015 How Legislators Contribute to the War on Terrorism OSD Vision for OPSEC Homeland Security History of OPSEC 1030-1130 Defense Cyber Crime Center DOD OPSEC Support Elements DHS OPSEC Program Teaching Security to the Scientific Community 11:45-1330 National OPSEC Awards Presentation and Luncheon 1345-1515 Hierarchy of OPSEC Homeland Security Through the Eyes of OPSEC Army Approach to Research Protection OPSEC Award Program Panel Discussion 1530-1700 Homeland Security Commercial OPSEC Navy and Marines Army Air Force Joint Commands ÆGIS, May 2004 6
Wednesday, 9 June 2004 Breakout Sessions 0800-0900 Keynote Presentation: “Dawn Over Baghdad”
Threat DoD Public Safety Homeland Security Shared IA 0915-1045 In Harm’s Way 1st IO Applying OPSEC to Fire and Police Special Operations DHS Speaker (TBD) Legacy Speakers Guerillas in the Net 1100-1200 Catching al- Qaida: Operational Methodology Assessment & Security Implications Air Force Efforts in OPSEC Lessons Learned Applying OPSEC to Criminal Investigations (Intentionally left blank) Information Operations Solutions to Analytical Risk Management 1200-1330 LUNCH: Special Keynote Speaker 1345-1445 Threat to U.S. Information Systems Applying OPSEC to Force Protection Domestic Terrorism: A National Overview (Intentionally left blank) OPSEC Planning for Military Operations 1500-1600 Understanding the Holy War Mentality: Perspectives from Within Do You Feel Lucky? Open source, the wild card of the modern battlefield Spies Vs. The U.S. Infrastructure Vulnerabilities Freedom of Information Act: Curse or Cure for OPSEC? Have We Bugged Our Own Offices?
ÆGIS, May 2004 7
Thursday, 10 June 2004 Breakout Sessions 0800-0900 Keynote Presentation: “The Other Force Protection”
Threat DoD Public Safety Homeland Security Shared IA 0915-1030 Threat to U.S. Information Systems Do You Feel Lucky? Open source, the wild card of the modern battlefield Domestic Terrorism: A National Overview Infrastructure Vulnerabilities Freedom of Information Act: Curse or Cure for OPSEC? 1030-1130 Understanding the American Holy War Mentality: Perspectives from Within Applying OPSEC to Force Protection Spies Vs. The U.S. (Intentionally left blank) OPSEC Planning for Military Operations Have We Bugged Our Own Offices? 1130-1300 Lunch “Was God on Vacation? – Memoir of a Holocaust Survivor” 1315-1415 Catching al- Qaida: Operational Methodology Assessment & Security Implications Air Force Efforts in OPSEC Lessons Learned Applying OPSEC to Criminal Investigations (Intentionally left blank) Information Operations Solutions to Analytical Risk Management 1430-1600 In Harm’s Way 1st IO Applying OPSEC to Fire and Police Special Operations DHS Speaker (TBD) Legacy Speakers Guerillas in the Net
ÆGIS, May 2004 8
Friday, 11 June 2004 Workshops 0800-1000 Identity Theft 1015-1200 Designing Awareness Training Personal Opsec Personal Computer OPSEC OPSEC Applied to Program Protection Planning Motivation Through Communication