2019 National Cyber Summit

Summit Speaker Jocquette Blue

Session Information

Facility Management Considerations in Cybersecurity—Tips for Achieving Compliance
Wednesday, June 5, 2019 1:15 p.m. - 2:00 p.m.
Organizational information assets are threatened by an array of sources, both internal and external. Many attack methods and mitigation measures involve facility operations. Facility managers must consider everything from physical security to contractor network access. They are also often responsible for ensuring appropriate controls and documentation are in place. The Department of Defense and NIST have teamed up to create control requirements for companies and DoD contractors whose networks must comply with the Defense Federal Acquisition Regulation Supplement (DFARS) or adhere to the Risk Management Framework (RMF). Based on completion of more than 85 DFARS compliance processes and nearly a dozen RMF accreditations, we have found that organizations often overlook threats and vulnerabilities that exist at the physical level and facilities often lack the controls and documentation required for compliance. Cybersecurity risks faced by companies require new approaches to security. DFARS and RMF processes and controls present one way for companies to assess their security posture and “bake in” information security to their operations. Examples of cybersecurity regulations and federal guidance related to facility management include having proper documentation of when people enter and leave physical facilities, video surveillance, restricting mobile or storage devices, role-based training, access authorizations through access control devices (e.g. keys, badges, cipher locks), environmental controls (e.g. temperature in server rooms), storage site protection, and having a plan to continually monitor flow of resources and sensitive information, both hard copies and digital formats. Subcontractors and vendors are often subject to regulations and security-related responsibilities as well. We discuss strategies in which Facility Managers and Security Officers can collaborate with IT to create an organization-wide “culture of security” as well as confront challenges posed by cyber criminals and governance regulation and control. Additionally, we introduce the basic components of DFARS and RMF, and practical first steps to achieve compliance and accreditation.
Jocquette Blue photo
Jocquette Blue
Senior Cybersecurity Analyst
H2L Solutions
Jocquette Blue is a Security Analyst of H2L Solutions, Inc. Jocquette AKA “Jackie” served eight years in the California National Guard and United States Army Reserve. She worked for four years at Wounded Warrior Project as a Technical Trainer instructing military veterans and their spouses A+, Network+, and Security+ prior to attending the University of Alabama in Huntsville where she received a master’s degree in Cybersecurity.
Irene Garcia-Goan photo
Irene Garcia-Goan
Sr. Cybersecurity Analyst
H2L Solutions
Irene Goan a the Senior Cybersecurity Analyst at H2L Solutions, Inc., a native Texan, she served over twenty years in the United States Air Force. Irene has proved to be an exceptional leader not only in the military, serving on active duty during the Gulf, Iraq, and Afghanistan conflicts/wars and during the 9/11 attacks. She is highly sought after and is quickly becoming the “go to” person for Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 and Risk Management Framework (RMF). Irene obtained an undergraduate degree in Information Systems and has earned three master’s Degrees; each in Human Resources Development, Management and Cybersecurity.
Jonathan Hard photo
Jonathan Hard
Chief Operating Office and President
H2L Solutions
Jonathan Hard is the CEO and President of H2L Solutions, Inc. In the past four years, he has successfully conducted over 150 security assessments, gap analysis and provided compliance solutions. Jonathan is a sought-after speaker in the field, and has presented to Infragard, ISACA, ASIS, NCMA, NCMS regional conference and many other events on the subject of Safeguarding Covered Defense Information in compliance with DFARS 252.204-7012 clause. Jonathan has been an information technology and security professional since 2008. Prior to founding H2L, Jonathan served as a Cyber Security Engineer in the Defense Industry. He also was in the Alabama National Guard for 12 years; during that time, he graduated from Infantry Officer Basic Course, Ranger school, Airborne school, and completed a tour in Iraq as an Infantry officer.


Meet Our NCS 2019 Speakers

Jocquette Blue Photo Jocquette Blue Senior Cybersecurity Analyst H2L Solutions
Paige Boshell Photo Paige Boshell Managing Member Privacy Counsel LLC
Wayne Burke Photo Wayne Burke Vice President and Co-Founder Cyber2 Labs, LLC
Paul Coggin Photo Paul Coggin Cyber Security Research Scientist Financial Institution
Brian Contos Photo Brian Contos CISO Verodin
Randall Cottrell Photo Randall Cottrell Chief Executive Officer Bluejireh Incorporated
Joshua Crumbaugh Photo Joshua Crumbaugh Chief Hacker/Chief Operating Officer PeopleSec® LLC
Ben Curry Photo Ben Curry Chief Architect, Managing Partner Summit 7 Systems
Robert Decicco Photo Robert Decicco MD Digital Intelligence
Byron DeLoach Photo Byron DeLoach Director of Adaptive Services Cybriant
Bryan Dickens Photo Bryan Dickens Chief Operating Officer Cybint Solutions
Nicholas Downer Photo Nicholas Downer Systems Security Engineer/Instructor Millennium
Major Bradley Eames Photo Major Bradley Eames 47CTS OL-A Deputy Commander 47 Cyberspace Test Squadron
Toni Eberhart Photo Toni Eberhart Executive Director Urban Engine
Rita Edwards Photo Rita Edwards Featured Cyber Security Instructor CyberProtex
Scott Edwards Photo Scott Edwards President Summit 7 Systems
Shawn Edwards Photo Shawn Edwards Cyber Adversarial Engineer The MITRE Corporation
Irene Garcia-Goan Photo Irene Garcia-Goan Sr. Cybersecurity Analyst H2L Solutions
Travis Green Photo Travis Green
Miss SueAnne Griffith Photo Miss SueAnne Griffith Research Engineer University of Alabama Huntsville
Jonathan Hard Photo Jonathan Hard Chief Operating Office and President H2L Solutions
Mr. Christopher Hawkins Photo Mr. Christopher Hawkins Director of Business Development Scalable Network Technologies
Matt Henson Photo Matt Henson CEO Trade Collaboration Engine
Sean Hopkins Photo Sean Hopkins Red Team Security Engineer Millennium Corporation
Jason Hough Photo Jason Hough Director of Information Security Mission Multiplier
Dr. DJ Hovermale Photo Dr. DJ Hovermale Senior Cyber Operations Training Analyst, Principal SAIC
Chris Hutto Photo Chris Hutto Jr. Cybersecurity Engineer Mission Multiplier
Dr. Michaela Iorga Photo Dr. Michaela Iorga Senior Security Technical Lead NIST
Ray Kelly Photo Ray Kelly Security Architect Micro Focus
Ben McGee Photo Ben McGee CyberProtex Featured Cyber Security Instructor
Dr. Wesley McGrew Photo Dr. Wesley McGrew Director of Cyber Operations HORNE Cyber
Chris McLain Photo Chris McLain Information Technical Department Honda Manufacturing of Alabama, LLC
Jamie Miller Photo Jamie Miller CEO/President Mission Multiplier
Charlene Mowery CISM, PE Photo Charlene Mowery CISM, PE Vice President of Global Business and Marketing, Cybersecurity SME Ultra Electronics, 3eTI
Sonia Mundra Photo Sonia Mundra President Chenega Analytic Business Solutions, LLC (CABS)
Dr. Charline Nixon Photo Dr. Charline Nixon Dean EC-Council University
Dr. Ashley Podhradsky Photo Dr. Ashley Podhradsky Associate Dean and Associate Professor Dakota State University
Michael Portera Photo Michael Portera Red Team Security Engineer Millennium Corporation
Jonathan Risto Photo Jonathan Risto
Robert Rounsavall Photo Robert Rounsavall Co Founder Trapezoid, Inc.
Kell Rozman Photo Kell Rozman Security Software Engineering Senior Manager Toyota Motor North America
Antonio (Tony) Rucci Photo Antonio (Tony) Rucci Director, InfoSec & Threat Intelligence GRIDSMART Technologies
Brian Ruf CISSP, PMP Photo Brian Ruf CISSP, PMP FedRAMP PMO SME FedRAMP/GSA
Greg Schaffer Photo Greg Schaffer Principal vCISO Services, LLC
Dr. David Schippers Photo Dr. David Schippers Chair - Assistant Professor Walsh College
Jake Schneider Photo Jake Schneider Director of Cyber Technologies GaN Corporation
Winn Schwartau Photo Winn Schwartau Chief Visionary Officer Winn Schwartau LLC
Jeffrey Shapiro Photo Jeffrey Shapiro Senior Cyber Operations Training Analyst, Principal SAIC
Dr. Joshua Stroschein Photo Dr. Joshua Stroschein Training and Academic Outreach Open Information Security Foundation
Mr. Jeff Uphues Photo Mr. Jeff Uphues CEO DC BLOX
Trevor Vaughan Photo Trevor Vaughan Vice President Engineering Onyx Point, Inc.
Paul Wagner Photo Paul Wagner Assistant Professor of Practice University of Arizona
Dr. Brad Wardman Photo Dr. Brad Wardman Head of Threat Intelligence PayPal
Peter Weishaar Photo Peter Weishaar Enterprise Learning Specialist ITProTV
Mark Whigham Photo Mark Whigham Instructor Calhoun Community College
Wes Widner III Photo Wes Widner III Senior Cloud Engineer CrowdStrike
Shirley Zhao Photo Shirley Zhao Principal Program Manager, Product Security Governance Blackberry
Roy Zur Photo Roy Zur CEO and Founder Cybint Solutions and New York Center for Cyber Security

View AgendaView Speaker Listing


Attend NCS 2019 to meet and hear speakers like this!

Register Now