May 2: Pre-Conference Workshops and Welcoming Reception

Monday, May 2

7:00AM–4:00PM: Registration
8:00AM–9:00AM: Breakfast

 

 

Export Controls, Academia, and Research: The Twain Shall Meet:

9:00AM–4:00PM; Ben Ballroom  1–3

Karen Nies-Vogel, Office of Exporter Services, BIS
Tatyana Yeremina, Office of Exporter Services, BIS
Miranda Sieg, Office of Enforcement Analysis, BIS
Kirsten Mortimer, Office of Export Services, BIS
Wesley Johnson, Office of Nonproliferation and Treaty Compliance, BIS

This workshop, specifically developed to address the intersection of the Export Administration Regulations’ (EAR) controls with academic and research environments, will start with an overview of key terms and concepts under the EAR (e.g., “published,” “release”) and include segments on fundamental research, collaborative research, deemed exports and other issues that exist in academic and research environments. The workshop will also include discussions of export compliance and enforcement, plus case studies, exercises, and discussion. Speakers will include BIS policy, regulatory compliance, and enforcement personnel. BIS’s workshop is geared toward university export compliance officers with medium-to-long-term experience in the field.

 

 

 

Managing Cybersecurity at an Academic Institution:

1:00PM–4:00PM; Ben Ballroom 4–5

Mike Cullen, Baker Tilly
Matt Gilbert, Baker Tilly
Emily Pender, University of Southern California

Complex terms related to data protection and privacy are cropping up across the spectrum of research agreements. Unfortunately, there are so many disparate security and privacy terms that it is difficult to figure out what requirements apply to each specific case. It is important to be able to work across the research community to create effective understanding, systems, and controls to protect research data. This workshop will engage participants in an interactive conversation focused on two objectives. First, we will provide updates on the latest developments regarding Controlled Unclassified Information (CUI), Export Controls, Cybersecurity Maturity Model Certification (CMMC) Version 2.0, NIST standards, and other research data security developments and what that means for your institution. Second, we will discuss the most challenging aspects of meeting these requirements in the higher education environment. At the end of the workshop, participants will:

  • Understand the latest research data security developments and how it impacts higher education
  • Understand how peer institutions address these requirements and support impacted stakeholders
  • Have gained insight into specific questions on these developments and how specific requirements impact individual institutions
  • Take away a list of challenging requirements and potential solutions

 

 

Welcome Reception

Lower Lobby area of Sheraton Philadelphia University City Hotel

Sponsored By:

icon-arrowicon-circlesicon-docicon-downloadicon-externalicon-lettericon-lockicon-magnifiericon-pdficon-phoneicon-resourceicon-xls