Potomac Forum The Forum of Choice for Government & Industry Training Since 1982

The Forum of Choice for Government & Industry Training Since 1982

Implementing the President's Cybersecurity Executive Order (EO) Training Workshop

A "How To" Workshop to Implement the Requirements of the EO and its Reporting Requirements

Wednesday, July 12, 2017



Keynote Speaker


Dr. Ron Ross

NIST Fellow

Author of the NIST Risk Management Framework and numerous NIST Publications



Confirmed Guest Speakers:


Jarvis Rodgers

Information Technology Audit Director, Office of Inspector General (OIG)

U.S. Department of Health and Human Services (HHS)


Kirit Amin

Chief Information Officer (CIO)

U.S. International Trade Commission (USITC)



Additional guest speakers awaiting confirmation.



Wednesday, July 12, 2017

Meeting Location: 
Willard InterContinental Hotel

Willard Intercontinental Hotel
1401 Pennsylvania Avenue N.W.
Washington 20004
United States

Metro Center (Red, Orange, Blue Lines). Use the exit marked “12th & F Sts” to exit onto F St., then continue straight two blocks and cross 14th St.


This workshop will focus on the President’s EO on Cybersecurity and discuss its requirements.  A key requirement is the implementation of NIST’s Cybersecurity Framework (CSF).  We will present an understanding of the CSF and NIST’s Risk Management Framework (RMF) which is a key component of the CSF. The CSF and RMF are critical for the federal government in its efforts to mitigate risk within enterprise information systems.  The workshop will provide detailed guidance on the integration of the CSF and RMF into a holistic Cybersecurity solution.  In addition, the workshop will address the EO reporting requirements for the first 90-day report and the other reports identified in the EO.            


Hear from industry experts and government officials tasked with implementing robust cybersecurity and risk management strategies along with learning how NIST’s CSF and RMF can be effectively implemented to reduce the risk of cyber-attacks. Listen to a government panel of CIOs and CISOs to understand the challenges they are facing on a day-to-day basis and how implementation of NIST’s CSF and RMF helps them identify the risks and what it takes to mitigate those risks. Gaining insights from the panel and peer interactions at the workshop should be invaluable in implementing the President’s EO and moving the needle forward in improving federal cybersecurity.

What You Will Learn: 

  • The approach used by the NIST RMF
  • The value of the integration of the NIST RMF with the NIST CSF
  • Development of agency Risk Management Strategies
  • Changes in federal information system authorization requirements and guidelines
  • Guidance into what agencies can expect from the NIST RMF and new CSF processes
  • Importance of Risk Assessments (RA), Security Control Assessments (SCA), and Security Testing & Evaluation (ST&E)
  • Security control categorization and how it is used to manage risk
  • NIST SP 800-53A, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans; NIST SP 800-37 Rev. 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach and NIST SP 800-39 Managing Information Security Risk
  • Reporting requirements for the Executive Order
  • Best practices for responding to the Executive Order
Why You Should Attend: 

  • Network with risk management, security and CIO colleagues
  • Gain a better understanding of the May 11th Presidential Executive Order on Cybersecurity
  • Review the key steps within the NIST RMF and CSF
  • Obtain practical knowledge of how NIST RMF and CSF are incorporated into information system security
  • Gain insight into conducting and implementing the NIST RMF and CSF in your organization
  • Collect information on how NIST frameworks can be leveraged to enhance the security of your organization
  • Learn how risk management and cybersecurity are essential for regulatory compliance
Who Should Attend: 

  • CIOs, CISOs, and Staff
  • IT security and risk management practitioners
  • IGs and Staff
  • Program Managers responsible for risk management
  • Government Employees who want to better understand risk management
  • Industry and Contractors who support risk management for the government
  • All government and industry members who need to better understand risk management 



Registration and Continental Breakfast




Art Chantker, President, Potomac Forum



Keynote Speaker: 
Dr. Ron Ross, NIST Fellow, Author of the NIST Risk Management Framework and  numerous NIST Publications




Refreshment Break



NIST Risk Management Framework and Cyber Threat Landscape  -

Integration of NIST Risk Management with Cybersecurity Framework

  • Overview of the NIST RMF and CSF Frameworks
  • Integration of risk management into cybersecurity processes
  • Understanding of compliance-based vs. risk-based governance structure


Dave Simprini, Grant Thornton



Understanding NIST Risk Management Framework
Step 1: Categorize

Step 2: Select
Step 3: Implement

  • Process for categorization information systems and data
  • Understanding of different types of security controls
  • Implementation strategies for security controls


Noel Nazario, Grant Thornton


12:00 PM

Networking Luncheon


CIO/CISO/OIG Government Panel Discussion: Operational and Compliance Challenges and Best Practices for Risk Management
  • What are the differences in perspectives of Risk Management
  • How can IGs help their agencies address Risk Management
  • How have CISOs integrated Risk Management into their agency’s Enterprise Risk Management


Moderator: John Lainhart, Director, Grant Thornton



- Jarvis Rodgers, Information Technology Audit Director, Office of Inspector General (OIG), U.S. Department of Health and Human Services (HHS)

- Kirit Amin, Chief Information Officer (CIO), U.S. International Trade Commission (USITC)


Additional panelists awaiting confirmation.



Understanding NIST Risk Management Framework 
Step 4: Assess
Step 5: Authorize
Step 6: Monitor
  • Components of an information system Authority to Operate (ATO)
  • Understanding of differences between C&A and A&A practices
  • Incorporation of risk and security control assessments as part of continuous monitoring

Jessica Saunders, Grant Thornton



Refreshment Break



Cybersecurity Overview – Latest information on Government Cybersecurity Initiatives
  • Where does cyber security fit within an agency?
  • What are some cyber security common misconceptions?
  • What are the common information system security pitfalls?
Glenn Keaveny, Grant Thornton


Open Group Discussion: Lessons Learned from the 90-day Cybersecurity Executive Order Assessment Process


Wrap-up and Q&A


Workshop Adjourns



Post Workshop Discussions with Instructors on Specific Individual Topics


Registration Information: 



  Early Bird Registration Fee AFTER JUNE 17
Government Employees:
(Federal, State or Local Government Issued ID)

 $ $695 

Special Reduced Rates in Support of Government Budget Reductions

 $ $895
Team Rate for both Government and Industry: Send a government team to learn together. Register two government employees from the same office at the same time and the third person receives $100 off the current government rate. Team rate applies to every tiered registration fee.
Industry and Contractors:
(Including contractors on-site and in direct support of government agencies).
 $ $895  $ $995

Registration Includes: Presentations, Workshop Notebook, Continental Breakfast, All Day Refreshments and Hosted Luncheon

Keynote Speaker: 

Ronald (Ron) Ross


National Institute of Standards and Technology

Ron Ross is a Fellow at the National Institute of Standards and Technology. His focus areas include information security, systems security engineering, and risk management. Dr. Ross leads the Federal Information Security Modernization Act (FISMA) Implementation Project, which includes the development of security standards and guidelines for the federal government, contractors, and the United States critical infrastructure. His current publications include Federal Information Processing Standards (FIPS) 199 (security categorization), FIPS 200 (security requirements), and NIST Special Publication (SP) 800-39 (enterprise risk management), SP 800-53 (security and privacy controls), SP 800-53A (security assessment), SP 800-37 (Risk Management Framework), SP 800-30 (risk assessment), SP 800-160 (systems security engineering), and SP 800-171 (security requirements for nonfederal systems and organizations). Dr. Ross also leads the Joint Task Force, an interagency partnership with the Department of Defense, Office of the Director National Intelligence, U.S. Intelligence Community, and the Committee on National Security Systems, with responsibility for the development of the Unified Information Security Framework for the federal government and its contractors.



Dr. Ross previously served as the Director of the National Information Assurance Partnership, a joint activity of NIST and the National Security Agency. In addition to his responsibilities at NIST, Dr. Ross supports the U.S. State Department in the international outreach program for information security and critical infrastructure protection. He has also lectured at many universities and colleges across the country including the Massachusetts Institute of Technology, Dartmouth College, Stanford University, the George Washington University, and the Naval Postgraduate School. A graduate of the United States Military Academy at West Point, Dr. Ross served in many leadership and technical positions during his twenty-year career in the United States Army. While assigned to the National Security Agency, Dr. Ross received the Scientific Achievement Award for his work on an inter-agency national security project and was awarded the Defense Superior Service Medal upon his departure from the agency. Dr. Ross is a four-time recipient of the Federal 100 award for his leadership and technical contributions to critical information security projects affecting the federal government and is a recipient of the Presidential Rank Award. He has also received the Department of Commerce Gold and Silver Medal Awards and has been inducted into the Information Systems Security Association Hall of Fame and given its highest honor of Distinguished Fellow. In addition, Dr. Ross has been inducted into the National Cyber Security Hall of Fame.



Dr. Ross has received numerous private sector cybersecurity awards including the Partnership for Public Service Samuel J. Heyman Service to America Medal for Homeland Security and Law Enforcement, Applied Computer Security Associates Distinguished Practitioner Award, Government Computer News Government Executive of the Year Award, Vanguard Chairman’s Award, Government Technology Research Alliance Award, InformationWeek’s Government CIO 50 Award, Billington Cybersecurity Leadership Award, ISACA National Capital Area Conyers Award, ISACA Joseph J. Wasserman Award, Symantec Cyber 7 Award, SC Magazine’s Cyber Security Luminaries, (ISC)2 Inaugural Lynn F. McNulty Tribute Award, 1105 Media Gov30 Award, and three-time Top 10 Influencers in Government IT Security.



During his military career, Dr. Ross served as a White House aide and a senior technical advisor to the Department of the Army. He is a graduate of the Defense Systems Management College and holds Masters and Ph.D. degrees in Computer Science from the U.S. Naval Postgraduate School specializing in artificial intelligence and robotics.

Guest Speakers: 

Jarvis Rodgers

Information Technology Audit Director

Office of Inspector General (OIG)

U.S. Department of Health and Human Services (HHS)


Jarvis Rodgers is the Information Technology Audit Director at the Department of Health and Human Services (HHS), Office of Inspector General (OIG). Jarvis leads a team of talented IT auditors and security analysts who conduct independent IT audits and penetration tests of HHS’s 12 operating divisions and grant recipients. A key component of IT auditing includes an evaluation of internal controls and risk assessments. Jarvis has 15 years of experience conducting IT audits of large and small agencies: Department of Agriculture, Department of Interior, National Credit Union Administration and The Pension Benefit Guaranty Corporation.


Jarvis holds a bachelor’s degree in Computer Information Systems and a master’s degree in Business Administration. He is also a Certified Information Systems Auditor and a Certified Information Systems Security Professional.

Kirit Amin, PMP

Chief Information Officer,

U.S. International Trade Commission


Kirit Amin was named US International Trade Commission (USITC) , Chief Information Officer (CIO) in December 2014. He works directly for the Board of Commissioners and has already mapped out the Data Center , Cloud and shared services strategy as well as the road map for the modernization of the commission’s IT infrastructure and mission critical systems.


Kirit was the U.S. Department of Commerce, Deputy Chief Information Officer and Chief Technology Officer (CTO) from November 2012 until his move to USITC in December 2014. He provided leadership and strategic technology implementation, fulfilling the CIO and Department’s IT operational mission, while expanding the use of Department-wide shared services, cloud implementation and emerging technologies.


Prior to joining the Department of Commerce, Mr. Amin served as the Chief Technology and Innovation Officer at HUD where he provided valuable leadership and vision to help define its 5 year IT Transformation initiatives, acquisition strategy for HUDNET, HUD’s next generation Enterprise Infrastructure including WAN, Data Center and end user functions, shared services strategy and implementation, as well as cloud strategy and implementation.


Prior to HUD, Amin was the Chief Information Officer for the Bureau of Consular Affairs (CA), for nearly five years where his leadership was instrumental in transforming the US State Department, Office of Consular Systems and Technology’s [CST] IT operations consisting of a multitude of overlapping legacy systems, to an exemplar cutting edge IT operation, that was recognized as one of the most innovative and successful IT shops in the Federal Government. He served as a senior advisor and participant for various interagency/international groups.


During his long and successful career in the Federal IT private sector at organizations such as Nortel/PEC, Infotec, CSC etc. serving Federal Departments such as DOA, DHS, DOI, DOT, VA, DOJ, the USAF, DIA, etc.


David Simprini

Senior Manager
Global Public Sector
Grant Thornton LLP

Mr. Simprini has experience auditing NIST-governed IT controls, Federal Information System Controls Audit Manual (FISCAM) controls, A-123 Controls, Sarbanes-Oxley compliance controls, segregation of duties, data migration, Enterprise Resource Planning (ERP) implementations, performance audits, and internal audit functions for clients from a broad spectrum of industries including Aerospace and Defense, Financial Services, Entertainment and Media, and Technology. He also has experience in planning integrated Federal financial audits, executing all phases of field work. As the lead IT Manager on the first independent external financial statement audit of any kind for the USMC, Mr. Simprini assisted with the planning and development of the overall audit approach, scoping assessment, and modified FISCAM IT test program. Throughout the testing phase, he led teams in field work at USMC financial centers and their associated financial and reporting IT Systems.

Noel A. Nazario

Director, Global Public Sector

Grant Thortnon

Noel is a Director in the Public Sector Practice of Grant Thornton’s Alexandria office. He is a member of the Information Assurance and Cybersecurity group .  


Noel has more than 30 years of experience in IT management and security audit management, cyber security and Information Technology (IT) assessments, IT standards development, and IT program management. Noel is a Cybersecurity leader with extensive experience developing security technology, assessing systems security, and helping organizations optimize their cybersecurity efforts to better support mission and business objectives. Prior to joining Grant Thornton, Noel served as Senior Manager at Ernst & Young and as a manager at KPMG. Prior to that, he served as an Electronic Engineer within the Computer Security Division of National Institute of Standards and Technology (NIST).


Noel serves on the board of the National Capital Region Chapter of ISACA.


Noel received his Master of Science in Computer Science from the Johns Hopkins University.
Noel received his Bachelor of Sciences in Computer Engineering from the University of Puerto Rico.


Professional qualifications and memberships
•    Certified Information Systems Auditor (CISA), ISACA
•    Certified Information Systems Security Professional (CISSP)

John Lainhart

Director, Global Public Sector

Grant Thornton

John is a Director in the Public Sector Practice of Grant Thornton’s Alexandria office. He is a member of the Information Assurance and Cybersecurity group. 


John has 45+ years of U.S. federal government experience in IT Governance, Security, Privacy, IT Risk Management, IT Value, and Cybersecurity.  He has 30+ years of experience as an IT auditor and culminated his public sector career serving as the first Inspector General and Officer of the U.S. House of Representatives. He joined PwC consulting service as the Partner responsible for providing Security and IT Management services to the U.S. Public Sector and served as the Partner, Cybersecurity & Privacy Services Leader for the U.S. Public Sector when IBM acquired PwC’s consulting business until retiring in June 2016.


John serves on the Board of Directors of George Washington University’s Center for Cyber and Homeland Security. John is active in the ISACA community, and currently serves as Advisor to the ISACA Board of Directors. He previously served as Co-chair of the COBIT 5 Task Force and served on the AICPA’s Assurance Services Executive Committee and was instrumental in the development of the AICPA’s Trust Services and SSAE No. 16.



M.A., Management and Supervision, Central Michigan University, 1976

B.A., Business Administration, Davis & Elkins College, 1969

Wharton Information Systems Program, Wharton School of Finance, 1974


Professional qualifications and memberships

  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Certified in Risk and Information Systems Control (CRISC)
  • Certified in the Governance of Information Technology (CGEIT)
  • Certified Information Privacy Professional/Government (CIPP/G)
  • Certified Information Privacy Professional/U.S. (CIPP/US)


Jessica Saunders

Manager, Global Public Sector

Grant Thornton


Jessica is a manager in the Public Sector Practice of Grant Thornton’s Alexandria office. She is a member of the Information Assurance and Cybersecurity group.


Jessica has more than five years of experience in IT audit/Information Assurance, Internal Controls reviews, IT Security, and Risk Management for Federal agencies from a broad spectrum of industries including Healthcare, Civilian, Defense and Financial Services. Jessica has supported various federal government financial statement audit, A-123, Federal Information Systems Management Act (FISMA), Security Diagnostics, and Statements on Standards of Attestation Engagements (SSAE) 16 /18 engagements.


Jessica is an active member of the National Capital Region Chapter of ISACA, Association of Government Accountants (AGA) and American Society of Military Comptroller (ASMC).


Jessica received her Bachelor of Science in Accounting, Minor Legal Environment of Business from Pennsylvania State University in 2010.


Professional qualifications and memberships

  • Certified Information Systems Auditor (CISA), ISACA
  • Certified Public Accountant (CPA)
  • Certified Defense Financial Manager (CDFM)

Glenn Keaveny

Director, Cybersecurity

Grant Thornton

Glenn Keaveny recently joined Grant Thorton’s US Public Sector practice, serving as Director, Cybersecurity. Glenn is a CISSP and CEH with over 15 years of experience in Cybersecurity Operations, Vulnerability/Penetration Testing and Cybersecurity Management.  His application background and operations management experience in challenging environments such as defense and healthcare provides a unique basis for his cyber expertise.  Prior to joining Grant Thornton he led and managed Security Operations and Monitoring services for Deloitte.  Prior to that he was the Security Officer for the Defense Information Systems (DISA) Field Security Office (FSO).  He was responsible for security operations of the FSO field activity as well as a team of over 30 cyber security professionals who conducted security operations and monitoring as well as Cyber Command Readiness Inspections (CCRI) similar to civilian vulnerability assessments.  He also managed a team of full time attack and penetration testers who operated year round on sites and systems around the globe.

Cancellation Policy: 

Confirmed registrations who cancel within 3 business days of the program will be subject to a $250 cancellation fee. Registrations cancelled after the program starts are subject to the full registration fee. Substitutions can be made at any time. In the event a particular training workshop is cancelled, the liability of Potomac Forum, Ltd is limited to refund of any prepaid registration fee.

  • © 2017 Potomac Forum Ltd. All Rights Reserved
    Copyright also covers all workshop agendas and descriptions
  • 400 N. Washington Street, Suite 300, Alexandria, VA 22314