VOLUME 25 • NUMBER 6 FCW.COM

Strategy and Business Management for Government Leaders | March 28, 2011 FCW.COM

And the winners are... BOTTLENECK.GOV

SOLVED.

Today, government agencies rely on optimized connectivity. We get it. With dedicated account managers, solution architects and partnerships with leading vendors like Cisco, Brocade and Avaya,wecanhelpyoudesignandbuildasolutionthat’sfast,flexibleandsecure.Onenetwork, reliable, with bandwidth and communication for all.

Get things moving at CDWG.com/networking

©2011CDWGovernmentLLC.CDW®, CDW•G® andPEOPLEWHOGETIT™aretrademarksofCDWLLC. Rising to the challenge...again

his year’s Federal 100 awards be it the earthquake in Haiti or the Deep- program is a reminder that water Horizon oil spill — when time is excellent work goes on, even of the essence and options are limited. It’s in the toughest of times. the art of the possible raised to its highest TAnd times were tough in 2010, make no form. mistake about that. Civilian agencies and Federal 100 winners oft en seem to look their contractors felt the pinch of budget at the world from a unique perspective. It’s uncertainty as the year progressed and not that they don’t see obstacles. But they Congress could not reach agreement on come at problems from a slightly diff erent an appropriations bill. Many defense agen- angle. Th ey see ways around obstacles that cies also faced austere times, as two wars others might have missed. Th at vision and continued to demand a steady fl ow of their ability to share it is what makes them resources. Yet the 2011 Federal 100 award leaders. winners rose to the challenge. But the most important distinguishing Th ey developed strategies to ease the mark of Federal 100 winners is simple: federal government’s transition to cloud Th ey step up. Th at’s something we see computing. Th ey improved the quality again and again in the nominations we of care provided to our service members receive. Th e work that results in a Federal returning from combat. Th ey gave federal 100 award is oft en something that is dif- offi cials a crash course in how to protect fi cult, time-consuming and, in many cases, themselves against an imminent cyberse- beyond the winner’s job description. But curity threat. And they even put together they step up to it and get the job done. It’s national programs to nurture the next that simple. generation of cybersecurity experts. Aft er 22 years of the Federal 100 awards Th at’s one of the marks of Federal 100 program, you would think we had seen winners every year: Th ey have an uncanny it all. But this year’s program just goes to ability to fi gure out how to get a job done show that excellence never gets old. with whatever resources are available. Th at quality is especially valuable in a crisis — — John Monroe Editor-in-Chief

March 28, 2011 FCW.COM 3 FCW.COM VOLUME 25 • NUMBER 6

EDITOR-IN-CHIEF MANAGING EDITOR/PRINT John Stein Monroe Terri J. Huck

MANAGING EDITOR/ SENIOR EDITORS DAILY REPORT Matthew Weigelt Michael Hardy John Zyskowski

EDITOR-AT-LARGE Wyatt Kash

In Th is Special Issue STAFF WRITERS Amber Corrin, Henry Kenyon, Alyah Khan, Alice Lipowicz, Dan Rowinski

CONTRIBUTING WRITERS 6 8 Alan Joch, John Moore, Brian Robinson COLUMNISTS 2011 Federal 100 judges Winners list Chris Bronk, Steve Kelman CREATIVE DIRECTOR DIRECTOR OF OPERATIONS 26 Jeff Langkau Michael Protos ART DIRECTOR ASSISTANT ART DIRECTOR Winners profi les Sam Votsis Dragutin Cvijanovic COPY EDITORS Whitt Flora, Donald White

16 WEB DESIGN Biswarup Bhattacharjee, Martin Peace George Bressler EDITOR-IN-CHIEF/ONLINE A new twist on disaster response Susan Miller

WEB PRODUCERS 18 Heather Kuldell, Alysha Sideman, Natalie Willis Robert D. Childs IT education changing by degrees PRESIDENT AND GROUP EDITOR-IN-CHIEF 20 Anne Armstrong VP/GROUP PUBLISHER Lt. Col. Al Di Leonardo Jennifer Weiss PUBLISHER A mandate to innovate Larry Fishbein

DIRECTOR OF MARKETING 22 Mark J. Feldman Devin B. Holmes New connections for combat vets

PRESIDENT AND CHIEF EXECUTIVE OFFICER 24 Neal Vitale SENIOR VICE PRESIDENT AND CHIEF FINANCIAL OFFICER Capt. Mike Ryan Richard Vitale Data sharing makes a splash EXECUTIVE VICE PRESIDENT Michael J. Valenti

58 SENIOR VICE PRESIDENT, AUDIENCE DEVELOPMENT & DIGITAL MEDIA Back Talk Abraham M. Langer VICE PRESIDENT, FINANCE & ADMINISTRATION Christopher M. Coates

VICE PRESIDENT, INFORMATION TECHNOLOGY& APPLICATION DEVELOPMENT Erik A. Lindgren

VICE PRESIDENT, ATTENDEE MARKETING Carmel McDonagh

VICE PRESIDENT, EVENT OPERATIONS David F. Myers

CHAIRMAN OF THE BOARD Jeffrey S. Klein

HOW TO REACH THE STAFF You can reach staff members of 1105 Government Information Group. A list of staff members can be found online at www.fcw.com.

E-mail: Staff members can be reached by using the naming convention of fi rst initial followed by their last name @1105govinfo.com. COVER ILLUSTRATION BY DRAGUTIN CVIJANOVIC Falls Church Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. ET) (703) 876-5100; Fax (703) 876-5126 3141 Fairview Park Dr., Suite 777, Falls Church, VA 22042

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT) (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

Federal Computer Week (ISSN 0893-052X) is published 23 times a year, two issues in Jan. through Nov. and one issue in Dec by 1105 Media, Inc., 9201 Oakdale Avenue, Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $125.00, International $165.00. Annual digital subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $125.00, International $125.00. Subscription inquiries, back issue requests, and address changes: Mail to: Federal Computer Week, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (866) 293-3194 for U.S. & Canada; (847) 763-9560 for International, fax (847) 763-9564. POSTMASTER: Send address changes to Federal Computer Week, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

4 March 28, 2011 FCW.COM The 4G mobile offi ce with built-in peace of mind. What does 4G get you? Freedom from worry on the road. Because when government employees are on the go, security follows. You can run apps securely, download massive fi les and access surveillance systems safely and quickly. Thanks to fast 4G speed with unlimited 4G data. Only on the Now Network.™ sprint.com/4G 1-800-SPRINT-1 (1-800-777-4681)

Access to secure applications

Download large fi les

Track workers and assets

Support surveillance systems

Networx Enterprise Contract (for maximum cost e f fi c i e n c y )

Sprint 3G/4G USB U600

“Sprint showed the biggest improvement in customer experience across 14 industries.” –Forrester Research Report: Customer Experience Index 2010

May require up to a $36 activation fee/line, credit approval and deposit per line. Up to a $200 early termination fee/line applies. Coverage is not available everywhere. The Sprint 4G Network reaches over 70 markets and counting, on select devices. The Sprint 3G Network reaches over 271 million people. See sprint.com/4G for details. Not all services are available on 4G, and coverage may default to 3G/separate network where 4G is unavailable. Offers not available in all markets/retail locations or for all phones/networks. Pricing, offer terms, fees and features may vary for existing customers not eligible for upgrade. Other restrictions apply. See store or sprint.com/4G for details. ©2011 Sprint. Sprint and the logo are trademarks of Sprint. Th e 2011 Judges

Th e editors of Federal Computer Week thank the following people, who donated their expertise, energy and time in the selection process for this year’s Federal 100 awards.

Robert Carey Th omas M. Davis Bruce McConnell Deputy CIO and Deputy Assistant Director of Federal Government Senior Counselor for the National Secretary of Defense for Aff airs Protection and Programs Directorate Information Management, Deloitt e and Touche Homeland Security Department Integration and Technology Formerly chairman of the House Govern- Bruce McConnell advises DHS on strat- Defense Department ment Reform Committ ee, Tom Davis egy and policy to protect and increase the Given his extensive career at DOD, Robert retired from Congress in 2008 aft er work- resilience of critical infrastructure, with Carey understands IT’s role in a global ing on several key IT and procurement particular att ention to cybersecurity. From organization. He is helping to lead the measures, including the Federal Acquisi- 2000 to 2008, he created, built and sold consolidation of DOD’s IT enterprise and tion Reform Act and the Services Acquisi- two boutique consulting fi rms, McConnell building on his previous experience as tion Reform Act. He was also chairman of International and Government Futures. CIO at the Navy and director of strategy the National Republican Congressional Before those ventures, McConnell was and policy at the Navy’s Fleet Cyber Committ ee in 2000 and 2002. chief of information policy and technology Command. at the Offi ce of Management and Budget. Teresa Carlson Former Intelligence Community CIO Stan Z. Soloway Vice President of the Global Public Offi ce of the Director of National President and CEO Sector Intelligence Professional Services Council Amazon Web Services Priscilla Guthrie is chairwoman of the In the 1990s, Stan Soloway served concur- Teresa Carlson brings more than 20 years Cyber Panel of the Strategic Command’s rently as deputy undersecretary of Defense of business experience to bear in assessing Strategic Advisory Group. Before that, she for acquisition reform and director of the accomplishments of IT leaders. Before was CIO for the Intelligence Community Secretary of Defense William Cohen’s her current position at Amazon, she was under Director of National Intelligence Defense Reform Initiative. In 2001, he vice president of federal government busi- Dennis Blair. Guthrie rose to that position took the helm at the Professional Services ness at Microsoft , where she won a Federal aft er serving as deputy assistant secretary Council, where he provides thought 100 award for her work. of Defense and deputy CIO at the Defense leadership on government acquisition, Department. procurement, outsourcing and privatiza- Dan Chenok tion issues. Senior Fellow David McClure IBM Center for the Business Associate Administrator for Citizen David M. Wennergren of Government Services and Innovative Technologies Assistant Deputy Chief Management At IBM, Dan Chenok is responsible for General Services Administration Offi cer thought leadership in the area of govern- David McClure is in the vanguard of the Defense Department ment technology, acquisition and manage- Obama administration’s high-profi le ef- Dave Wennergren’s role is to champion ment improvements. He started his career forts to make the government more acces- DOD’s eff orts to bett er synchronize, in government, serving as branch chief for sible to the public. He came to GSA from integrate, coordinate and improve business information policy and technology at the Gartner, where he served as managing operations. Previously, he served as deputy Offi ce of Management and Budget before vice president of the government research assistant secretary of Defense for informa- moving to the private sector in 2003. team. He also had an 18-year career at the tion management, integration and technol- Government Accountability Offi ce, where ogy and deputy CIO. He has also been the he conducted wide-ranging reviews of Navy’s CIO and spent fi ve years as vice major systems development. chairman of the CIO Council.

6 March 28, 2011 FCW.COM Every day, government and commercial cyber networks are at risk of being compromised. Protecting them requires comprehensive cybersecurity solutions. Leveraging advanced security technologies and experience garnered from its vast internal network, Boeing’s expertise includes cyber capabilities across a wide array of commercial, defense, space and security systems. The result is customized, integrated solutions that ensure cybersecurity at every level. Susie Adams Mary Davie Jan L. Janssen Chris Painter Microsoft Federal General Services Administration National Reconnaissance Offi ce National Security Staff

Lisa Akers Ted Davies Ronald C. Jones George J. Pedersen ASI Government Unisys National Oceanic and Atmospheric ManTech International Administration, Department of Deborah Alderson Charles J. De Sanno Commerce Lawrence Pemberton Science Applications International Department of Veterans Aff airs Department of the Navy Corporation Shawn K. Kingsberry Rear Adm. Edward H. Deets III Recovery Accountability and Paul E. Petersen Dmitri Alperovitch U.S. Navy Transparency Board State of Tennessee McAfee Lt. Col. Al Di Leonardo Joseph F. Klimavicz Michael Reardon Michael J. Anastasio, Jr. U.S. Special Operations Command National Oceanic and Atmospheric Department of Labor General Services Administration Administration, Department of Donna Dodson Commerce Jim Rinaldi Charles R. Armstrong National Institute of Standards and NASA Customs and Border Protection Technology, Department of Commerce Steve Krauss Department of Homeland Security Pragmatics Alec Ross Martha A. Dorris Department of State Frank H. Baitman General Services Administration Social Security Administration Offi ce of Management and Budget Capt. Mike Ryan Jamie Dos Santos U.S. Coast Guard Tim Baldridge Terremark Federal Group Col. Gary E. Langston NASA U.S. Army James W. Sheaff er Holly D. Elwood CSC Eric Berman Environmental Protection Agency Maria Levesque Federal Emergency Management Defense Intelligence Agency Chris Smith Agency, Department of Homeland Gerald Ford Department of Agriculture Security Transportation Security Administration Katie Lewin Department of Homeland Security General Services Administration David C. Songco Daisy Bhagowalia National Institutes of Health General Services Administration Joyce France Lt. Gen. William T. Lord Department of Defense U.S. Air Force Richard Spires Sameer Bhalotra Department of Homeland Security National Security Staff Lt. Gen. Kathleen M. Gainey Yvonne Lowe Joint Staff Offi ce of the Director of National Brenda S. Sprague Debra Bond Department of Defense Intelligence Department of State Offi ce of Management and Budget Kurt Garbars Jane Holl Lute Harold E. “Pete” Stark Neil Bonner General Services Administration Department of Homeland Security U.S. Postal Service Transportation Security Administration Department of Homeland Security Michael Erik Garcia William J. Lynn III Elayne Starkey Department of Homeland Security Department of Defense State of Delaware Maj. Gen. Mark S. Bowman U.S. Army Neil Gaudreau Andrew B. Maner Adm. James G. Stavridis Department of the Navy IBM Department of Defense George Bressler Customs and Border Protection Danielle Germain Maj. Gen. Wendy M. Masiello Dennis L. Stolkey Department of Homeland Security National Academy of Public U.S. Air Force Hewlett-Packard Enterprise Services Administration Evan Burfi eld Elizabeth McGrath Keith D. Thurston Synteractive Bev Godwin Department of Defense General Services Administration General Services Administration Mary Ellen Callahan Seán McGurk William J. Tinston Department of Homeland Security Gary “Gus” Guissanie Department of Homeland Security Defense Logistics Agency Department of Defense Gen. Peter Chiarelli Shelley Metzenbaum Jim Trafi cant U.S. Army Davis Hake Offi ce of Management and Budget Harris Offi ce of Rep. Jim Langevin Robert D. Childs U.S. House of Representatives David Mihalchik Pete Tseronis National Defense University Google Federal Department of Energy John Hillen AJ Clark Global Defense Technology & Brandon Milhorn Jonathan Underly Thermopylae Sciences and Systems, Inc. Senate Homeland Security and Department of Defense Technology Governmental Aff airs Committee Col. Claude Hines Anjella Vargas-Rosales Brook Colangelo Department of Defense Carey Miller Centers for Disease Control and Executive Offi ce of the President Deloitte and Touche Prevention Trey Hodgkins Kathy P. Conrad TechAmerica Kelly Miller Adrienne Walker Jeff erson Consulting Group National Security Agency Offi ce of Management and Budget Tim Hoechst Matt Coose Agilex Sherrill Nicely Kimberly K. Watson Department of Homeland Security Central Intelligence Agency National Security Agency Devin B. Holmes Linda Cureton Business Executives for National Jake Olcott NASA Security Senate Commerce Committee

Mac Curtis Michael Howell Thomas O’Reilly Vangent Offi ce of Management and Budget Department of Justice

8 March 28, 2011 FCW.COM Cybersecurity

Q&A with industry leaders

Faced with attacks that are becoming more frequent and increasingly more sophisticated, government is urgently trying to improve its cybersecurity. Exactly how it should do that, what threats it needs to guard against, and what resources it should devote are just some of the murky issues that have to be tackled.

THE STAND: Cybersecurity examines these issues through the eyes of three experienced veterans of the field, who share their views on the cybersecurity challenges, how the nature of the threats is changing, and what the government should be doing to mitigate them.

Additional questions and responses are available with the full report online at www.fcw.com/STANDcybersecurity2011

1105 Government Information Group Custom Report Northrop Grumman on Cybe

Tim McKnight Vice President and Chief Information Security Officer, Northrop Grumman Corporation

1. How has the nature of Clearly we’ve seen some of the more advanced intrusion tactics and techniques cybersecurity threats changed aimed at the military and defense industrial based targets spilling over into the broader in the past few years? How do industry. And we’re seeing these advanced techniques being used by less sophisticated you see them changing over attackers, be they mercenaries for hire, organized crime, or hacktivists. the next 3-5 years? We’re also beginning to see the development of more destructive capabilities. It’s one thing for an intruder to maintain persistent access to a network and steal information, but it’s a completely different threat to get into a network in order to change or destroy information and systems. Our concern is that, somewhat like a nuclear arms race, one of those advanced cyber weapons is one day going to get into the wrong hands, intentionally or not, and do real damage.

2) How would you rate the Priorities across the government are varied. Some are focused on criminal cyber understanding of the nature of threats, others on threats from advanced nation states. these threats by government But, as far as understanding the importance of the issues, it’s trending in the right organizations? direction. Some of the federal regulatory changes that require a certain amount of spending on cybersecurity resources are helping. However, it’s one thing for people to understand they are being attacked daily, it’s another to realize those attacks are regularly successful.

3. What are some of the biggest The biggest challenge is the lack of qualified information security professionals. Without challenges the government faces the right people, more technology won’t do much good. over the next couple of years The second is the need for government direction and policy, and an understanding of who in in tackling cybersecurity? Are government does what. Only when that is clear will government be coordinated enough to these more technical in nature, successfully respond to a Hurricane Katrina type of cyber event. We must invest in R&D to or cultural? defend against the attacks we are seeing now, not to mention future threats that aren’t being ad- dressed by some of the common off-the-shelf (COTS) security software. It used to be that COTS could handle 90 percent of the threats. Today it is more like 60 percent and the gap is widening. That’s why we started the Northrop Grumman Cybersecurity Research Consortium, a unique partnership with three world-class universities – Carnegie Mellon, MIT, and Purdue – that are addressing the cybersecurity challenges of the future. We are also making major R&D investments in modeling and simulation, situational awareness, and cloud security.

4. Congress has proposed a Yes! One of the biggest issues with FISMA and the systems they certify is that they are rewrite of FISMA to better secure on day-one, but when audited again, they become progressively less so. Over time, reflect cybersecurity concerns. new applications are loaded, configurations change and vulnerabilities open up. A much Is this really necessary? What more rigorous and cost-effective solution is needed. do you see as the major issues Continuous monitoring is the right direction. It’s more cost effective than many other that need to be tackled? approaches and a better verification of an agency’s security. Offerings like the Justice Department’s Cyber Security Assessment and Management Program, developed by Northrop Grumman, provides agencies a holistic Certification & Accreditation approach.

1105 Government Information Group Custom Report bersecurity

5. How well is the government’s Last year, the government issued FAR and DFAR regulations that added several procurement process geared cybersecurity provisions, which was a positive step. Our concern now is how this will flow to the needs of cybersecurity? through the supply chain. For large systems integrators like Northrop Grumman, we can What, if anything, needs to afford to build security into the program and we recognize that secure systems are critical change and why? to the quality of our products. But the second, third and fourth tier companies don’t have the cybersecurity teams or budgets to allow for that. This is a real problem. Another concern is making sure the procurement regulations are flexible enough not to lock in certain vendors, technologies or techniques. They need to drive a best-in-industry approach to delivering secure systems to customers in a cost effective manner. Most acquisition executives and program professionals have historically not dealt with cybersecurity as a critical item in the selection process. Training, education and awareness are needed. That’s very important!

6) One of the key weaknesses The lack of trained cybersecurity professionals is alarming. Building tomorrow’s workforce that has been identified is the is a passion of mine. I recently joined the National Board of Information Security Examiners, a lack of trained cybersecurity not-for-profit focused on solving this very dilemma. professionals in government. Engaging industry and government with academia is critical. We need to encourage the Do you agree? What, if next generation to pursue this field and, since the likelihood of a Sputnik-like event that will anything, can be done to generate an influx to this profession is slim, we’ll need to find other ways. mitigate this? In the near-term, U.S. Cyber Command and DHS are rotating in trained professionals, or people they can train up. This is a start, but more collaboration is needed and a comprehensive human capital plan should be developed to align with our nation’s future goals. At Northrop Grumman, we’re committed to grooming the next generation of cyber professionals. Programs like CyberPatriot III, in which we serve as presenting sponsor, our Cybersecurity Research Consortium, our newly launched Cyber Academy, and our engagement with universities nationwide are all ways that we’re creating energy around the cybersecurity profession.

7. What are some of the unique At Northrop Grumman, we set ourselves apart by continually evolving a full spectrum abilities that your company view of cyberspace operations, bringing together the exploitative, defensive and offensive brings to this space? tactics and capabilities toward that one end goal of cybersecurity. Our decades-long expertise cuts across every sector: intelligence, defense, civil, commercial and state and local. We have demonstrated our ability to integrate disparate networks of all levels of classification into effectively managed cyber systems, focused on the mission of the enterprise. Our relationships with major universities and customers ensure that cooperative R&D is at the top of our agenda. We have a large number of programs in play that are focused on solving the various pieces of the cybersecurity problem. These include our robust federated cyber test ranges in the U.S. and the U.K., where we adapt technologies to address the evolving threats and use those environments to help educate our customers. Underpinning these efforts is our workforce. We have more than 1800 Certified Information Systems Security Professionals. We provide rotational opportunities across programs as well to diversify employees and bring ‘best of breed’ solutions to our customer space. We are also extremely focused on continuous training and grooming the next generation because that endeavor is pivotal to our future success.

Additional questions and responses are available with the full report online at www.fcw.com/STANDcybersecurity2011

1105 Government Information Group Custom Report General Dynamics C4 Syste

Bill Ross Director, Cyber Mission Assurance Systems, General Dynamics C4 Systems

1. How has the nature of Cybersecurity threats have become much more organized and industrialized. There’s cybersecurity threats changed been an entire ecosytem that’s been established around the industrialization of cyber in the past few years? How do threats. It’s almost become a service offering and, as the real and perceived value of you see them changing over cyber targets increases, we’re seeing a corresponding increase in the investment being the next 3-5 years? made in new and innovative cyber threats. Over the next 3-5 years cloud computing will establish itself but, while clouds have advantages, they’re also going to become huge targets. Once you centralize all your key assets and resources you paint a big, red bullseye on them. We’re also seeing mobile devices become more prevalent as general purpose computing platforms, and the security for those has lagged. Threats will specifically target mobile devices in the future, so you are going to see a significant thrust to counter them. And there’ll be more social engineering attacks. So you are going to see more emphasis on automated solutions for those, and how to tie them into overall threat mitigation activities.

2) How would you rate the It’s a mixed bag. The awareness is definitely increasing simply through osmosis, understanding of the nature of given some of the big news stories recently and the emphasis being placed on this these threats by government topic within government. But it’s still embryonic in terms of the understanding of organizations? what the real threat entails. It’s still too focused on compliance, static metrics and traditional security controls and not as much on the dynamic defense and the active command and control of the enterprise based on detected threats and malicious behavior.

3. What are some of the biggest I think they are both, though I think cultural is going to be the toughest nut to crack, challenges the government faces balancing the need for access to information and for openness with the need to promote over the next couple of years responsibility within the user community. You are only as good as your weakest link, so in tackling cybersecurity? Are teaching people the culture of what it means to be stewards within the cyber domain is these more technical in nature, going to be a huge challenge. or cultural? Technically there are big mountains to climb as well, primarily in getting the community at large to rally around standards that promote interoperability and the real time sharing of threat activity. There’s an enormous amount of innovation going on out there, and a myriad of widgets and tools have been developed to solve point cybersecurity needs. Getting these to talk with each other, and providing some sort of open architecture and framework in which these tools can work together, is the biggest challenge. The information assurance community is accelerating towards standards for cybersecurity. The question is, how quickly will these standards be adopted and operationalized across the broad community?

1105 Government Information Group Custom Report tems on Cybersecurity

4. Congress has proposed a The Federal Information Security Management Act (FISMA) as it was written nearly 10 rewrite of FISMA to better years ago was a good step forward in promoting security standards and guidelines. It reflect cybersecurity concerns. established some compliance and metrics so we could report on security. Now, given the Is this really necessary? What dynamic environment of cybersecurity threats, we have to go to the next phase of how we do you see as the major issues monitor the effectiveness of cybersecurity measures. How do we dynamically defend that need to be tackled? ourselves, as opposed to statically defending based on ‘cyber hygiene’ like firewalls and virus protection software? Then how do we measure that to see how effective it is? We have to get out of the check-the-box mode that the current FISMA has promoted. Now we need to get into that closed loop measurement process where we actually can see the change in security posture and dynamically assess the effectiveness of controls and changes. Start managing security on a day-to-day basis.

5. How well is the government’s Many agencies are starting to realize that they cannot live with a process that takes six, procurement process geared 12 or even 18 months cradle-to-grave and react to threats that pop up every 30, 60 or 90 days. to the needs of cybersecurity? There are some models government agencies could effectively incorporate. An upcoming What, if anything, needs to program out of the Air Force called Agile Cyber Technology, for example, is primarily focused change and why? on how the Air Force can quickly prove new technologies and integrate them into proof of concepts so they can be rapidly deployed. In terms of contracting, there needs to be the ability to quickly turn them around in that 30 to 90 day period. And we need cybersecurity to be an embedded part of the thinking on these contracts, in terms of how these contracts are managed from that dynamic cybersecurity perspective.

6) One of the key weaknesses We need more professionals who can perform true cybersecurity analytics. People that has been identified is the who can take various sources of information and sensor data and actually ascertain the lack of trained cybersecurity nature of an attack and what the appropriate response should be. professionals in government. More standardization of training – along the lines of what the information assurance com- Do you agree? What, if munity has done with Certified Information Systems Security Professionals – would bridge anything, can be done to the gap between general purpose IT security professionals and these cyber analysts. And mitigate this? then a separate government career path should be created to show people how they can progress from being an IT security practitioner to a cyber analyst. That would go a long way.

7. What are some of the unique It’s our long history in the government space and the unique technologies and abilities that your company capabilities we bring, either through those we have developed inside the company or brings to this space? through the trusted partnerships we’ve formed to deliver holistic enterprise security management capabilities. For many years, we’ve provided the tools and integrated systems to manage security infra- structure and assets for DoD and intelligence community customers. We’re uniquely positioned to extend these solutions with additional cyber defense capabilities, and now we’re taking these tools and solutions into new markets, both in the federal space and private industry. The other unique thing we bring is the ability to harvest and leverage mature tools and capabilities in the command and control space. The biggest gap our customers have in the cyber domain is the ability to develop actionable intelligence from the enormous amount of cyber sensor data they have at their disposal. We have a number of unique tools and capabilities that have been applied to solve this problem within the battle management space that we can bring to bear on this problem.

Additional questions and responses are available with the full report online at www.fcw.com/STANDcybersecurity2011

1105 Government Information Group Custom Report Lockheed Martin on Cybers

Rick Doten Chief Scientist, Cyber Security, Lockheed Martin Information Systems & Global Solutions

1. How has the nature of There is more of a focus by adversaries on targeted intrusions with specific goals. cybersecurity threats changed Years ago, the adversary wasn’t as focused about what they wanted, so they would in the past few years? How do compromise a system, poke around to find what was valuable, and get out. Today, they you see them changing over are very purposeful. Over the next few years, I think we’ll see that evolving even more, as the next 3-5 years? they spend more time learning about targets before an intrusion instead of just looking for vulnerabilities to get in. Another trend is these intrusions look like normal traffic, which makes it harder to identify. We as an industry have to get away from relying on identifying signatures of malicious traffic or files, and towards more of a behavior or intelligence-based indicators approach. But the largest challenge is not so much the technology the adversaries are creating and using, as much as the operational organization and the execution they now bring to intrusions. What organizations have traditionally done, which has been focusing on technology answers with point solutions, is certainly not going to help them in the future.

2) How would you rate the Most people on the front lines doing security operations get it, but depending on understanding of the nature of the risk maturity of their organization, others up the chain may not. So, many of the these threats by government technical leadership are content with checking the boxes to say security controls organizations? are present, but not validating their effectiveness based on their organizational risks. I found that the higher up in an agency the leadership understands their role in managing risk, particularly the risk of IT to their organization or mission, the more effective they have been in finding a way to secure it.

3. What are some of the biggest Technology is always the easy part, which unfortunately is why it’s always the first challenges the government faces solution that’s thrown at a problem. But the real challenge is the people and process over the next couple of years side. Getting qualified people who are trained and understand their role, and then having in tackling cybersecurity? Are a process for them to manage the risk and do their job effectively, takes commitment. these more technical in nature, There is leadership who really get it, but may not be able to execute very well because or cultural? of the technical or political environment they are in. Some government leaders understand the changing threat and what they need to do, but are challenged in being able to implement comprehensive solutions quickly. With the right people and process, we can move away from a technology-driven approach to managing threats and towards a more risk based approach. The same is true with identification and remediation of intrusions. It’s not just about identifying that there is a compromise, but understanding the extent and what the adversary’s intent is.

1105 Government Information Group Custom Report rsecurity

4. Congress has proposed a Yes, looking at FISMA is very necessary because, in its current state, it hasn’t really rewrite of FISMA to better been effective in reducing security compromises up to this point. It implemented and reflect cybersecurity concerns. promoted a checkbox security mentality, taking a snapshot in time as to whether an Is this really necessary? What agency has certain controls in place. It doesn’t help with determining if those controls do you see as the major issues are effective, or if they are the correct ones to protect the mission. that need to be tackled? What’s needed instead is a more tailored, risk-based approach that will stress understanding the risk to the mission, to the organization, and to the users. It should provide the process of evaluating the security plan and controls to help reduce those risks, a continuous compliance model to get away from the snapshot approach and, finally, auditing to make sure they are effective and appropriate.

5. How well is the government’s This is a huge problem. Many programs don’t consider their organizational responsibility for procurement process geared cybersecurity, so they defer to minimum requirements when developing an RFP. There’s to the needs of cybersecurity? no consideration for the interconnectivity of systems, sharing of data, and the changing What, if anything, needs to threats, and the procurement process hasn’t evolved to accommodate this. change and why? I see agencies asking for the same security requirements they have for the past five years. So, it becomes a struggle for companies such as ours to suggest how to build security into a proposal due to cost. There should be a cybersecurity component in every single RFP. Every organization should have its security team be a part of every acquisition to identify the risk profile in the service or product that is being acquired, and what it will take to manage those risks. We need security integrated into the procurement early. It’s much tougher and more expensive to bolt it on after implementation.

6) One of the key weaknesses Yes, we do have a lack of trained professionals, but cybersecurity professionals are that has been identified is the specialists within their own specialty. So, it’s not a talent management path that scales like lack of trained cybersecurity traditional staff positions. It’s more like a pyramid, with very few high-end cybersecurity professionals in government. professionals who are experts in the appropriate skills for a particular need. Do you agree? What, if We need a lot of people coming in at the bottom who can work themselves up this anything, can be done to pyramid. Today, the problem is that all of us – government, contractors, and other mitigate this? commercial industries – are competing for the same people. Government needs to have a good career path for cybersecurity professionals, and it needs to find a way to pay them appropriately, perhaps with special incentives to bring them in.

7. What are some of the unique We understand the nature of our customer’s missions because we’ve been supporting abilities that your company their agencies for years. We provide a lot of R&D on new technologies, and test ways brings to this space? of integrating them securely. We are part of a cybersecurity alliance with over a dozen of the leading cybersecurity vendors, and we work with these companies to integrate unique solutions to solve our customers’ hard problems. We provide a lot of technologies for aeronautical, space, IT, and other technology, and our customers demand trust in each of these platforms. We have a strong central cyber security team to assist all of our business units to bake-in security, so our customers don’t have to worry if our platforms are secure. We also are leaders in our industry in combating advanced persistent threats. By leveraging an intelligence-driven approach to understanding cyber adversaries, we can help organizations mature their ability to defend against these growing sophisticated threats.

Additional questions and responses are available with the full report online at www.fcw.com/STANDcybersecurity2011

1105 Government Information Group Custom Report disas

A Customs and Border Protection disaster drill showed the government how to harness social media in an emergency PHOTO CREDIT HERE CREDIT PHOTO

16 March 28, 2011 FCW.COM AGEORGE new BRESSLER twist on aster response

As told to Alice Lipowicz

George Bressler’s plans for a relatively simple earthquake simula- also had a humanitarian and disaster relief cloud provided by tion exercise with authorities in Mexico quickly mushroomed into InRelief.org. Th e Red Cross tested a satellite-based global-area something bigger when he issued an invitation for anyone to join network for Internet connectivity in the fi eld. in. His open approach expanded participation across national We had Twitt er and Facebook, and the question is how do and organizational boundaries and gave the agency insight into you transform the massive amounts of information coming in the complexities of using social media in a real disaster. Th e result from those communities into an actionable framework. How was a valuable exercise in marshaling community resources and do you aggregate and share it through good visual analytics? mapping vital information to save lives. Th e [Global Positioning System] applications can map where xercise 24 (X24) was developed as a 24-hour mul- people in need are, what they have and what they need — tiple-agency virtual exercise exploring collaborative whether to identify where someone is trapped, where the Esolutions, including cloud computing and social bridge is out, where the roads are open. Also to let the people media, for disaster response. We started planning know where the shelters are and how to get help. Th e point is with 20 people and fi ve agencies, and it grew to more than to get to the people in need. We are here to serve. 12,500 people and 90 organizations in 79 countries. We had robust activity on Facebook, Twitt er and Google Th e initial concept of operations was to simulate an earth- Groups, and we found that with social media, it was not quake in Mexicali, Mexico, near San Diego so we could draw as controllable as a traditional exercise. In a real disaster, participation from both sides of the border and to host the you have thousands of people using Facebook and Twitt er social media event at the Immersive Visualization Center at to discuss what is occurring, so that is the reality. It is the San Diego State University. I put out a mission and a vision ground truth. Th ere were cascading eff ects as all the diff er- and said, “Let’s explore solutions together,” and the project ent groups got engaged. kept growing. It was an open invitation for anyone to join us. We found that social media two-way communications It became dynamic and evolved rapidly on its own. positively aff ected relationships in the operations center. At We had the United Nations involved with indigenous popu- the same time, social media does not replace the cell phone or lations in fl ood zones. We had the commanding admiral of the command and control structure. Th e challenge for CBP is Mexico, 2nd Navy Region, who wanted us to add a tsunami that we do not yet have an offi cial policy on how to do opera- to the scenario, so we did. Somalia’s ambassador to China tions in the social media space as an agency. called into the visualization center to provide guidance with For X24, my budget was zero. X24 relied on open-source services for displaced people. We had fi refi ghters and people tools such as GeoChat and OpenStreetMap. I want to get away sending in [virtual] blankets and food. from proprietary technologies. A wide range of collaborative technologies were applied, Th e next X24 Europe is with the incredible leaders at U.S. including geo-location tools such as GeoChat, which transmits European Command with a simulated disaster in the Balkans. information in low-bandwidth situations, and CrisisCom- X24 is truly unique and will continue to evolve. It is an open col-

ROBERT BENSON/AURORA SELECT BENSON/AURORA ROBERT mons, which puts geo-tags on tweets and other messages. We laboration space that has never been done before in this way.

March 28, 2011 FCW.COM 17 National Defense University’s iCollege is fi nding new ways to train government technology leaders ITROBERT education D. CHILDS changing by degr

As told to Amber Corrin

As chancellor of the National Defense University’s Information the master’s degree — it pulls everything together. Resources Management College, Robert Childs is helping mod- Th e pilot group’s fi rst graduates will fi nish in June; they’re ernize the way government leaders learn, collaborate and work. extremely excited. Th ey get more excited about it than I do, and He has positioned the iCollege as a central hub of cyber education, I get prett y excited. We also talk to the people in their agencies, and this summer, it will confer its fi rst master’s degrees in govern- both colleagues and supervisors, and we get the same response ment information leadership. Certifi cate programs are under way everywhere — that the program is having a dramatic impact. in information assurance, enterprise architecture and CIO skills. We examine federal policy and the direction it’s moving. Th e courses Childs has helped develop are more than primers We pay att ention to laws Congress is looking at. We tie into on today’s hot topics — they represent a fundamental change in the international community, the federal community and the military and government education. private-sector community. We’re bringing in best practices all ft er the Offi ce of the Secretary of Defense directed the time. We’re redesigning courses all the time. us to take a look at potential cyber and chief tech- For a long time, agencies have wanted a shift . A master’s A nology offi cer training curricula, we pulled together degree can signify education rather than training. Granting a focus group of key stakeholders to get feedback. this master’s degree in government information leadership We’ve been working with organizations like the federal CIO has moved us into a new category of the way people look at us. Council, the Defense Department and Defense Information Th e overall mission of the university is to educate military Systems Agency CIOs, National Security Agency, Army CIO, and civilian leaders through teaching, research and outreach — Army Cyber Command, Homeland Security Department, outreach in areas of national resources [and] military strategy. Offi ce of the Director of National Intelligence, the White Th at now increasingly includes cyber. House cyber offi ce, and a number [of people] from the private Everything today is done in a collaborative way. Th ere are sector and foreign countries as well. very few of us who can work in isolation. We take collaboration Th ere is a clear strategy we employ to [develop a] curricu- very seriously at the college. We intentionally have projects lum: Bring these people in for their input, have them defi ne it that require work across boundaries and across time. Many on a macro level, put it together and then run it back by them times, students have said, “Hey, let me just do it on my own,” to see if we have hit the target. and my answer to that is no. Why should you do it on your Our leadership is constantly involved in fi nding out what own when you’re eventually going to have to work in a collab- program needs are out there in the workforce, and that’s what orative environment? We’re creating a learning environment really led us to the government information leadership mas- that simulates the work environment you’re going to be in. ter’s degree program. Th ese are the people who go through Th e bott om line is our mission is to prepare leaders to use the program and pick up not just competencies of managing a info and IT for a strategic advantage. Information creates network enterprise but also what technologies are used; how diplomacy. We have a wonderful crossroads where we can you manage the process; fi nding new, innovative techniques continually engage stakeholders, whether they are govern-

and strategies that are out there. Th at’s the real importance of ment or industry leaders. HAMID ZAID

18 March 28, 2011 FCW.COM grees

March 28, 2011 FCW.COM 19 A Lt.mandate Col. Al Di Leonardo to innovate A start-up-like operation has provided intelligence analysts with a faster, more reliable way to process data

As told to Henry Kenyon

Lt. Col. Al Di Leonardo has spent the past fi ve years building highly talented team, who stayed with the cell until we were a new approach to analyzing intelligence data at the Special fi rmly established in multiple communities. Operations Command. Th e result is the Skope Cell, which is It was the highly talented and passionate leadership team now being used to solve the command’s most pressing counter- that I helped assemble that broke down barriers and bureau- terrorism challenges. His team has developed technologies and cracies to create a unique, integrated intelligence model. It processes that streamline data gathering and analysis and relay proved that the right ideas and environment — combined trusted information where it is needed most. Th e cell has grown with access to data and technology, chartered with a mandate to support users throughout the Defense Department and the to innovate — can act as an agent of change in USSOCOM Intelligence Community (IC) and is meeting needs that were not and the IC. being fi lled by traditional intelligence analysis techniques. It has Collaboration was the key to innovation, and I was com- become what many analysts and senior offi cers call a world-class, mitt ed to transitioning the Skope Cell’s capabilities to other innovative intelligence organization. organizations. We were asked to brief every combatant com- ur innovation cell was essentially a start-up com- mand and intelligence agency in the past fi ve years, and we’ve pany in the special operations community. Th e transitioned tools across the DOD via Web access and other Oconcept behind our “business” was not initially means. We also had some of our ideas used and developed in embraced by many in the DOD and the IC. Indeed, diff erent forms by many intelligence agencies, ranging from as with any start-up venture, there was no guarantee we’d something as mundane as sett ing up a fl oor plan for collabora- achieve success. tion to the innovative technology applications we’ve developed I knew that the Skope Cell had a good customer in US- and employ on a daily basis. SOCOM and great ideas that could be operationalized. Our As others began to use our ideas and tools, we started to success didn’t happen overnight. It took many years, and I become a brand name within the IC and USSOCOM as one had the privilege to stay with the cell until we consistently of the most productive analytical innovation cells within the achieved success with our cutt ing-edge analytical techniques U.S. government. We were originally known for geospatial and algorithms. It required a series of success stories — not hot-spott ing techniques that are commonplace today in the just technology innovations — to convince most. Soon we IC. As time passed, we continued to develop various innova- were routinely telling others about our business model. tive tools and techniques in social networking and geospatial We would not have overcome the natural bureaucratic and data technologies. hurdles without support from senior offi cers in USSOCOM, Yet, I always go back to the power of the team and the fl ex- the director of the National Geospatial-Intelligence Agency, ible technology environment that we created at Skope. Today, and a handful of operators and analysts who saw the poten- we are bett er known for high-quality analytics than for any tial and provided us time in their respective organizations particular technique, and we have demonstrated this through to fi ne-tune our techniques and capabilities. In the end, our product, process and soft ware application sharing across the

ultimate success was largely due to the perseverance of our DOD and IC. HAMID ZAID

20 March 28, 2011 FCW.COM March 28, 2011 FCW.COM 21 Warrior Gateway off ers veterans unprecedented access to community service providers NewDEVIN B. HOLMES connections for combat vets

As told to Michael Hardy

Devin Holmes is the brains behind Warrior Gateway, a vital happening in states and communities. source of information for returning combat veterans. He att acked Th e surveys revealed that veterans and service providers a mountain of inconsistent data to create the Web portal, which oft en had no idea how to connect with one another. connects veterans returning home fr om war zones to nonprofi t We didn’t fi nd anywhere that the voice of the customer, organizations and other sources of help in their local communi- the voice of the veteran, was being used to help others make ties. By linking private and public entities via the portal, Holmes decisions. Like restaurants are [rated] on Yelp, like movies are has redefi ned how veterans search for assistance and empowered [reviewed] on Rott en Tomatoes — why couldn’t you use that them to share their experiences and resources with one another. same business model? Holmes works for the nonprofi t, nonpartisan Business Execu- We had made our technology platform decision in 2009 as tives for National Security, whose members lend their business part of this research. As a technology-centric organization, we expertise to help the government enhance the country’s security. recognized that one of the challenges was going to be how we hen our men and women come home, they’re collect information in disparate formats and put it into one not coming home to government programs, repository and make it easy to search. Wthey’re coming home to a community. Th e We ultimately chose a company called MarkLogic. Th eir problem was with people coming back from platform allowed us to take disparate, unstructured data sources war, how could we bring communities together? Not only and put it into a structure we could utilize and make it easy how do those people know about those services, but how for people to search. do those services know about those people? Our technology challenges were not platform-oriented; our Th e real core project got kicked off in 2009, which is when I technology challenges were data-oriented. We were pulling was hired to run it. We were given a set of problem statements data initially from half a dozen data sources. It was all diff er- that were to become what really formed the core of Warrior ent levels of quality. Gateway. Th e fi rst one was: How am I as an individual to know [Aft er improving the quality of the data,] we started build- what’s available in my community? Th e second was: How do ing the private beta [version] in early January of 2010. In 10 I know who’s good at what they do? Th e third was: How do days, we had the private beta up and running. On March 15, we know what the gaps are, what’s missing? And the fourth we launched WarriorGateway.org as a public beta. was about communication: How do we get the information We started with about 15,000 unique profi les of organiza- in front of the right person at the right time? tions and providers. We’re currently up to, I believe, 42,000. We spent 2009 doing a lot of research. We talked to veter- We think that we are less than 10 percent of the way there. Our ans, those who had transitioned already. We talked to military goal for the end of this year is to be at 100,000 or above. We spouses. We talked to the state directors of veterans aff airs. think that the upward level of where it will be is somewhere

We wanted to get more of a local perspective on what was north of 600,000 or 700,000 programs. BAROUH STAN

22 March 28, 2011 FCW.COM COVER STORY PHOTO CREDIT HERE CREDIT PHOTO

March 28, 2011 FCW.COM 23 SOA technology forges powerful links across the Coast Guard and with external partners

CAPT. MIKE RYAN Data sharing makes a splash As told to Brian Robinson

Capt. Mike Ryan took command of the Coast Guard’s Operations use. It also reinforced with our senior leaders why they made Systems Center in 2008 as the service was seeking to modernize its the right business decisions in years prior to make that truly a IT infr astructure. Under his leadership, the center developed the vital capability for our service and the nation’s public. Semper Paratus Enterprise Architecture Realization (SPEAR) Semper Paratus is the Coast Guard mott o, so SPEAR’s the label service-oriented architecture, which will save the Coast Guard that we’ve applied to help our personnel and system sponsors millions of dollars. It has already improved data sharing and identify with the SOA framework. We sett led on a foundation enhanced the service’s response to incidents, such as the Deepwater of asynchronous messaging rather than some other fl avor of Horizon oil spill. SOA because we wanted all our key stakeholders to understand hen that spill of national signifi cance took place, that’s how we were going to [do] business. And we also used the we obviously recognized there was going to publish-and-subscribe methodology so our customers could Wbe a large thirst for information, particularly reuse the code sets. maritime domain information. Because the SPEAR has become pervasive throughout all segments of the SOA framework was in place, it really became a matt er of just Coast Guard’s IT community and has helped remove many of hearing from the operational community what information the artifi cial barriers that had developed between various facili- they believed they needed. Th en our technical staff was able ties. It’s brought the CIOs of the fi eld-level units closer together. to quickly identify sources for that information and establish a On that front, SPEAR has been a huge force multiplier. new service to allow that dataset to fl ow across our enterprise It’s also had a major eff ect in other areas. We have a lot of joint service bus. ventures with the Acquisition Directorate, for example, and as In the not too distant past, the way you dealt with these types they go out and interface with industry on new procurements, of data needs was with a very manually intensive process of they are bringing these new principles to the table. [SPEAR has] extracting data from various systems, putt ing it into spreadsheets also opened a lot of doors and created partnerships with other and then providing that static content back to somebody who people, from those driving the boats to those running shore-side had to manipulate it into something useful. operations. It’s been an initiative that’s really transcended all the During Deepwater Horizon, our senior leaders were receiv- organizational boundaries. ing frequent updates about the kind of information the Coast But Deepwater Horizon, when people saw the eff ect of pro- Guard was gett ing and how we were using SPEAR to get valu- viding time-critical and urgent data during a major disaster, has able information out to the response community about such raised SPEAR’s profi le much higher. Without a doubt, across all things as where vessels were, what capabilities were available, my system teams and across all my program sponsors, when I what was happening with the oil plume and so on. now sit at the table and say there’s the opportunity for them to It was clearly a case where not only my command but other use SOA principles to get access and rights to datasets that can elements in the Coast Guard and in government really lever- provide value, they understand what we are talking about and aged data sharing and information access to put it to its best that it doesn’t have to be something overwhelming.

24 March 28, 2011 FCW.COM h DAVID WEIGOLD DAVID

March 28, 2011 FCW.COM 25 Susie Adams tions. offi cials used Dmitri Alperovitch Web hosting services and stor- Chief Technology Offi cer the document to help develop a Vice President of Threat Research age as commodities. It also saves Microsoft Federal 25-point plan for transforming McAfee agencies the time and expense of Th e list of true gurus in the fed- the government’s approach to IT. Dmitri Alperovitch was the man conducting their own authori- eral IT community is short, but Akers eagerly volunteered to on the spot when Google and zation and accreditation of ven- Microsoft Federal’s Susie Adams lead the organization’s response other organizations in the private dors. But the unusual approach is defi nitely on it. despite the demands of her day and public sectors came under meant that participants on both Adams uses her 25 years of IT job because she recognized the cyberatt acks last year. sides had many questions. Anas- experience to help agencies maxi- importance of giving members a Alperovitch, who leads tasio handled the award process mize their IT investments. In 2010, voice in the government’s reform McAfee’s work in Internet threat adroitly and continues to manage her most visible role was promot- eff orts. Akers helped bridge the intelligence analysis, correla- the contract with the same skill ing cloud computing in govern- gap between government and tion and visualization, was able and effi ciency. ment by demonstrating to agency industry at a time when both to identify the vulnerabilities He is making sure GSA’s Fed- leaders how a seemingly complex sectors are grappling with major exploited by the att ackers follow- eral Acquisition Service stays true prospect could easily become a acquisition and management ing the disclosure of the att acks to its mission of providing the way to reduce costs and increase problems. in January by Google. Micro- highest quality and best value to effi ciency. soft subsequently patched the agency customers while keeping Adams is adept at showing Deborah Alderson vulnerabilities. up with technological advances. agency leaders how to address President, Defense Solutions Group Alperovitch and his team at security and privacy concerns Science Applications McAfee reached out to govern- when moving IT operations into International Corp. ment agencies, conducting more a cloud environment. Her work Deborah Alderson is no stranger to than 50 in-person meetings and dovetailed with federal CIO Vivek working well with others. SAIC’s conference calls to help determine Kundra’s eff orts to encourage agen- Defense Solutions Group has sup- if the agencies had been aff ected cies to adopt cloud computing. ported major IT initiatives for the by the att acks. Defense Department, other federal Alperovitch dubbed the inci- Lisa Akers agencies and some state-level orga- dent Operation Aurora, a name President, Acquisition nizations, earning an exemplary derived from the fi le path on the Solutions Division reputation across a broad spectrum att acker’s computer; the name ASI Government of technology fi elds. has stuck. When White House officials Not content to rest on those asked industry how the govern- laurels, Alderson was actively Michael J. Anastasio Jr. ment could improve IT acquisi- involved throughout 2010 in sev- Director, Strategic Solutions tion and program management, eral organizations, including the Contracts Division Lisa Akers recognized a golden Army’s BRA C relocation eff orts at General Services Administration opportunity. the Aberdeen Proving Ground and Michael Anastasio has been a key She was one of two people put as a board member of Women in player in the eff ort to demystify in charge of the American Council Aerospace. She also served as execu- cloud computing and make the for Technology/Industry Advi- tive sponsor of the SAIC Women’s necessary tools readily available sory Council’s response. Akers and Multi-Cultural Networks and to agency leaders. and her government counterpart chair of the company’s University He led the eff ort to create the solicited input from the organiza- Relations Council, which teams Infrastructure as a Service con- tion’s members and distilled their with academia and introduces tract, a multiple-award blanket fi ndings into key recommenda- youngsters to careers in technology. purchase agreement that off ers

Susie Adams Lisa Akers Deborah Alderson Dmitri Alperovitch Michael J. Anastasio Jr.

26 March 28, 2011 FCW.COM

Charles R. Armstrong services more accessible,” said siasm and practical approach to essential to the government’s Assistant Commissioner/CIO federal CIO Vivek Kundra. identity management, federal smart online operations but costs it Offi ce of Information and Technology In addition, Baitman is mod- ID cards are smarter than ever. precisely zero. Customs and Border Protection ernizing SSA’s call centers under Th e previously fee-based pro- Homeland Security Department the Citizen Access Routing Eric Berman gram that handles the top-level It almost sounds like the plot for Enterprise through 2020 pro- Program Manager, Hazards U.S. .gov domains lost money for GSA. a comic strip: Charles Armstrong gram, which will support the 80 Federal Emergency Management Th en Bhagowalia developed a is gett ing a trophy for protecting million calls placed annually to Agency new business model that allows us from the Canadians. SSA’s toll-free number. He also Homeland Security Department an outside contractor to keep the More specifically, however, implemented a comprehensive Eric Berman breathed new life domain registration fees for ser- he’s gett ing the award because soft ware design that enhanced into FEMA’s sophisticated risk vices rendered. he helped rebuild the communi- SSA’s website for increased inter- analysis and mapping technology Th e program has been secured cations and tracking defenses for action with the public, and he and, by doing so, made the tool a and encrypted and has had no the 5,500-mile northern border. led a campaign to improve the global standard. data loss, security breach or out- And that, not the more publicized agency’s ability to engage with Hazus, which FEMA uses age since she’s managed it, with border with Mexico, is widely retirees online. to calculate probable damages a staff of just six. Th at reliability seen as the riskiest the U.S. has from natural disasters, is highly was the primary reason the fed- when it comes to terrorist activity. Tim Baldridge sensitive to user inputs, and past eral, state, local and tribal gov- Th at world-class detection sys- Computer Scientist inconsistencies led senior offi cials ernment community committ ed tem can automatically capture Marshall Space Flight Center to suspend the program in 2005. to the Web as its main means of and inform DHS about potential NASA Last year, with a modest budget communication and outreach. terrorist breaches of the border Tim Baldridge has a passion for and no direct staff , Berman rebuilt in less than a minute, compared identity management, and the fed- Hazus by incorporating quality to nearly 12 hours previously. eral government is bett er off for it. control, standard operating pro- Along the way, Armstrong has As chairman of the Federal cedures and scientifi c peer review. also trimmed costs out of CBP’s Identity, Credential and Access Th anks to Berman’s hard work, IT infrastructure, transforming Management Subcommittee’s Hazus was used in Haiti to help it into a lean and tech-savvy Architecture Working Group, he with recovery and rebuilding aft er organization. helped ensure the use and security that country’s devastating earth- of solutions based on open stan- quake, Chilean offi cials intend to Frank H. Baitman dards by developing federal profi les develop a Hazus-like tool to deal CIO that deal with privacy concerns. with earthquakes in their country, Social Security Administration He also furthered develop- and CNN now uses Hazus to let Frank Baitman eagerly volunteered ment of the Personal Identity the public know what to expect to serve as co-chairman of the CIO Verifi cation Interoperability for from impending hurricanes. Council’s Accessibility Commit- Non-Federal Issuers to ensure the tee, which helps agencies comply trustworthiness and interoperabil- Daisy Bhagowalia with the legal requirement to pro- ity of credentials issued by outside Program Manager vide access to online resources entities. Baldridge also leads the .gov Domain Registration Program and IT for people with disabilities. Interagency Advisory Board that Federal Acquisition Service “Frank has taken a leader- gives government and industry General Services Administration ship role at SSA to advance the an opportunity to collaborate on Talk about doing more with less. president’s commitment to use identity management challenges. Daisy Bhagowalia developed and technology to make government Th anks to Baldridge’s enthu- implemented a program that is

Charles R. Armstrong Frank H. Baitman Tim Baldridge Eric Berman Daisy Bhagowalia

28 March 28, 2011 FCW.COM WWW.VANGENT.COM

4 OUT OF 10 AMERICANS CONNECT WITH VANGENT ...BUT NEVER KNOW IT.

That’s because we work behind the scenes every day to design, build and operate mission critical systems that transform the wayour customers serve the public. Like developing an electronic processing system that enabled information sharing among multiple agencies, improved quality through better data capture and data exchange capabilities. And, we also reduced processing times from eight months to one day, all while saving our customer 30% in operating costs.

To learn more visit www.vangent.com/4outof10. Sameer Bhalotra ily halted all fi nancial systems Maj. Gen. Mark S. Bowman online, cross-border disaster drill Deputy Cybersecurity Coordinator modernization and then rede- Director of Architecture, Operations, that incorporated cloud com- National Security Staff signed those programs to lower Networks and Space puting, social media, geospatial Sameer Bhalotra has played a key their risk and cost and increase U.S. Army mapping tools and open-source role in establishing relationships accountability for failure. Maj. Gen. Mark Bowman would applications. among the White House’s cyber- Th e result has been smaller have won the Federal 100 award Th e drill — which simulated security coordinator, agencies and projects with clearer goals, a focus if he had done nothing beyond a complex emergency involving Congress. on agencies’ most critical business leading the redesign of the Army’s multiple earthquakes, a tsunami, Th e coordination of cyberse- needs and greater transparency Signal Regiment. fi res, food shortages and cholera curity eff orts between the White in project oversight. Th e policy But he also played a key role in outbreaks — involved 12,500 House and agencies is a massive has saved $1.6 billion and pro- data-center consolidation eff orts participants in 79 countries. Th e undertaking. Bhalotra was a key moted a culture of accountability that will save the Army an esti- exercise demonstrated numerous player in developing the National in federal IT. mated 75 percent on data-center ways in which the federal govern- Strategy for Trusted Identities spending. And he led an initiative ment could use social media to in Cyberspace, the National Neil Bonner to bring voice-over-IP technol- respond to disasters. A follow- Cyber Incident Response Plan IT Specialist ogy to the Army’s three four-star up exercise, hosted by the Euro- and Cyber Storm III. He also Transportation Security headquarters in the continental pean Command and called X24 developed a legislative strategy Administration . Europe, was scheduled for this in response to signifi cant congres- Homeland Security Department Still, there’s no denying the month. sional interest in cybersecurity. The next time you’re traveling importance of the work he did in Bhalotra has been involved in and use your iPhone to check communications. “His redesign declassifying the Comprehensive wait times for the security lines, of the Signal Regiment concept National Cybersecurity Initiative, you can thank Neil Bonner. He has been instrumental in how the launching the National Initiative created the technical architecture Army provides communications for Cybersecurity Education and for the My TSA app, which was the to warfi ghters on the ground,” promoting the implementation fi rst iPhone application launched said Robert Carey, deputy CIO of Einstein 2 to detect malicious by DHS. It been downloaded by at the Defense Department. Bow- network activity. more than 200,000 travelers. man is “modernizing how the Apparently, innovation is sec- Army approaches IT from the Debra Bond ond nature to Bonner. He also ground up.” Deputy Controller worked with two colleagues to Offi ce of Management and Budget develop TSA’s IdeaFactory appli- George Bressler “Bold” and “imaginative” are cation to capture votes, ratings Program Manager not the fi rst words that come to and comments on employee- Customs and Border Protection mind when talking about federal submitt ed ideas for improving Homeland Security Department fi nancial systems management, the agency. George Bressler is in charge of but Debra Bond has made them In addition, he put together emergency management for the synonymous with the fi eld. the technical platform for TSA’s San Diego district of CBP, but his Charged with overhauling the public blog and integrated it into infl uence extends much further, in way government treats a range the agency’s Web content. And terms of both the scale and innova- of fi nancial issues and radically he got the job done in four weeks tion of the emergency prepared- improving performance, she with no budget and using only ness drills he directs. spearheaded development of internal resources. In September 2010, Bressler an OMB policy that temporar- directed Exercise 24 (X24), an

Sameer Bhalotra Debra Bond Neil Bonner Maj. Gen. Mark S. Bowman George Bressler

30 March 28, 2011 FCW.COM Evan Burfi eld tive discussions, she hustled to Robert D. Childs the essence. So Clark led a team Chairman and CEO get those advisers the necessary Chancellor, iCollege of developers to create a 3-D Web Synteractive security clearances, which wasn’t National Defense University portal where users could create, Evan Burfi eld is one of a grow- easy because the government had It sounds like the work of someone share and layer spatial data. ing number of federal contractors never formed such a group before. with serious star power: att racting Th e 3D User Defi ned Oper- gaining a reputation for innova- As a result of Callahan’s eff orts, speakers such as Vivek Kundra and ating Picture was based on a tive approaches to Web 2.0 and the group has been able to provide Gen. James Cartwright; hosting Google Earth browser plug-in Semantic Web technologies. input to Obama administration conferences in London, Dubai, and commercial crowdsourcing He helped developed a robust, offi cials as they wrestle with mat- Singapore and Kuala Lumpur; and tools. It linked more than 2,000 user-centric platform for Recov- ters of cybersecurity, privacy and advising NATO on choosing a humanitarian and disaster relief ery.gov, which was created to track civil liberties. Also, as the govern- CIO. But for Robert Childs, it’s management experts, enabling expenditures under the econom- ment’s senior privacy offi cial, Cal- all in a day’s work. them to quickly create maps and ic stimulus law. Th e site delivers lahan has ensured that privacy is Besides snagging the govern- other visual data to help coordi- near-real-time data feeds to the an integral part of cybersecurity. ment’s top luminaries and hosting nate relief eff orts. public while enabling in-depth conferences on global cyberse- analysis by the press and congres- Gen. Peter Chiarelli curity and critical infrastructure, sional staff members. Recovery. Vice Chief of Staff Childs has led the charge for gov was one of the fi rst federal U.S. Army NDU’s master’s degree in gov- websites hosted in the cloud. Gen. Pete Chiarelli is eff ective- ernment information leadership Burfi eld also helped Treasury. ly the chief operating offi cer of and certifi cate programs in CIO gov expand into Web 2.0 capa- a $240 billion enterprise. But and chief technology offi cer lead- bilities, including faceted search when it comes to improving the ership. His eff orts are changing to give users more fl exibility in services and care off ered to soldiers the way military and other federal exploring available data. The and their families, Chiarelli is an leaders learn and govern. incorporation of Semantic Web indomitable Army of one. “Bob’s eff orts have brought features means the site will be He has championed the use of critical information assurance able to off er more dynamic ways virtual and telehealth-based treat- know-how to warfighters and to access data in the future. ment of victims of post-traumatic other frontline DOD operators,” stress and brain injury, greatly said John Grimes, former CIO at Mary Ellen Callahan increasing the treatment options the Defense Department. Chief Privacy Offi cer available to soldiers in the United Homeland Security Department States and in batt le zones. AJ Clark Putt ing eff ective cyber defenses in Chiarelli also led a joint eff ort President place is not easy, in part because of with the National Institute of Thermopylae Sciences protests from privacy advocates. Mental Health to develop a data- and Technology Mary Ellen Callahan’s foresight base of information collected by In the wake of the earthquake that has helped ease many of those the nation’s largest mental health devastated Haiti last year, AJ Clark concerns. study. Th at massive eff ort will had to work fast. She assembled a formidable help researchers bett er under- Th e U.S. Southern Command group of advisers to shape the stand the human brain and could needed a tool to facilitate the fl ow government’s privacy policies eventually lead to new treatments of information between the vari- and programs. To make sure for problems that affl ict soldiers. ous organizations participating in they could engage in substan- the relief eff orts, and time was of

EvanName Burfi eld Mary EllenName Callahan Gen. PeterName Chiarelli RobertName D. Childs NameAJ Clark

March 28, 2011 FCW.COM 31 Brook Colangelo for improving the IT Dashboard. Linda Cureton households to ensure that no one CIO Th e recommendations served as CIO was missed or counted more than Executive Offi ce of the President a catalyst for the Offi ce of Man- NASA once. By meeting every service- When Brook Colangelo stepped agement and Budget’s IT man- When it comes to Linda Cureton, level agreement, Vangent earned into the CIO position, he agement reform plan released in CIO could just as well mean chief a government contracting rarity launched a program to modern- December 2010. innovation offi cer. — a 100 percent performance fee. ize the technology infrastructure, At Jeff erson Consulting, Con- She has been a powerful force Curtis also serves as chair- improve its reliability and off er rad leads the fi rm’s federal mar- behind NASA’s adoption of cloud man of the Professional Services bett er support for remote work- keting and business consulting computing, social media and col- Council. ers. practice. laboration platforms. She also He went about his job with an helped lead the development and eye toward ensuring that White Matt Coose deployment of the agency’s open- House staff members had the Director government plan, which earned tools they needed to do their jobs Federal Network Security Branch the top scores in an independent eff ectively. Th e back-to-back bliz- Homeland Security Department assessment by a watchdog group. zards that hit the Washington, With the oft en confusing to-and- And she set up NASA’s fi rst IT D.C., area in February 2010 pro- fro about the needs and priori- Summit so government and vided an unexpected test of the ties for the federal approach to industry representatives could new system. Th anks to Colan- cybersecurity, the fact that the share best practices and innova- gelo’s eff orts, 60 percent of White government does have security, tions in IT. House employees were able to and a certain clarity about how With Cureton, innovation complete mission-critical work to improve it, can be laid at Matt begins at home. She is widely from home while much of the Coose’s feet. regarded as one of the savviest city was shut down. Undeterred by the uncertain- social media users in the upper “He’s keenly aware of the criti- ties produced by the debate, he ranks of government and a vocal cal need for 24/7 IT support for led a multiagency eff ort to assess advocate of blogs, Facebook, customers,” said Katy Kale, direc- governmentwide needs, con- LinkedIn and other Web 2.0 tools. tor of White House operations. ducting interviews with every agency CIO, and then managed Mac Curtis Kathy P. Conrad collaboration among government President and CEO Senior Vice President leaders to come up with practical Vangent Jeff erson Consulting Group cybersecurity policy and techni- If you want to know anything Kathy Conrad has been an active, cal solutions. about the 2010 census, Mac eff ective leader in the federal IT With input from thought lead- Curtis can probably give you community for a long time, and ers across government, he led the the answer. her work last year as vice chair- development of a federal base- His company partnered with woman of TechAmerica’s Federal line cybersecurity road map that Lockheed Martin to success- IT Dashboard Task Group con- established the groundwork for fully process nearly half of the tinues that legacy. future improvements, and along 134 million 2010 census forms. In that role, she facilitated the way changed the way that In addition, Curtis helped in-depth sessions with industry government leaders think about manage more than 2 million calls executives and government advis- outcome-based, metrics-driven from people with questions about ers to develop a succinct set of cybersecurity. the forms, not counting the sever- compelling recommendations al million follow-up calls made to

Brook Colangelo Kathy P. Conrad Matt Coose Linda Cureton Mac Curtis

32 March 28, 2011 FCW.COM

Mary Davie contract — for e-mail and col- With a $2 billion annual bud- Lt. Col. Al Di Leonardo Assistant Commissioner laboration tools at the General get and a 5,000-person staff , De Intelligence Offi cer General Services Administration Services Administration. The Sanno keeps the computers hum- U.S. Special Operations Command In recent years, people have been program is expected to result in ming and the cyber bugs out of Lt. Col. Al Di Leonardo is the talking more and more about the a 50 percent cost savings over the VA’s huge health, benefi ts and entrepreneur behind the Skope importance of transparency in fi ve years. cemeteries systems. Cell, an innovative approach acquisition. Th ey also have been But he also remains a tire- to intelligence analysis that has marveling at the advances in social less advocate of putt ing people Rear Adm. Edward H. caught on big in the Defense media. Mary Davie saw the con- fi rst. Last year, he formed two Deets III Department. nection and put the two together groups at Unisys: the People Commander Built around nine-person to create the Bett erBuy Project. Initiatives Board, which seeks Naval Network Warfare Command teams, the Skope Cell uses stream- Recruiting the American to foster an employee-focused U.S. Navy lined data gathering and analysis to Council for Technology/Industry environment at the company, and In the Defense Department’s mis- fi lter data and provide users with Advisory Council and the Nation- U-Give, which raises funds for sion to modernize systems and timely, high-quality information. al Academy of Public Adminis- disaster relief eff orts worldwide take on an ever-evolving cyber In 2010, the Skope Cell developed tration as partners, Davie led an and collects food donations for threat, Rear Adm. Edward Deets more than 30 tools for predictive eff ort to create the social media- local homeless shelters, among is breaking new ground and lead- technology analysis now used by based acquisition tool. It allowed other activities. ing eff orts to achieve decision various DOD commands and the for public input on requests for superiority — the ability to make National Security Agency. proposals, promoting collabora- Charles J. De Sanno eff ective decisions faster than the Th e Skope Cell demonstrated tion and participation from vari- Executive Director of Enterprise adversary. that it was more fl exible and pro- ous sectors and experts. Technology and Infrastructure Deets led an aggressive Cyber duced more valuable data than While in charge of assisted Engineering Asset Reduction and Security ini- standard 50-person intelligence acquisition services in GSA’s Fed- Veterans Aff airs Department tiative that identifi ed 1,200 Navy groups. In the fi ve years that the eral Acquisition Service, Davie Charles De Sanno is not only IT systems that lacked adequate eff ort was under Di Leonardo’s proved to a risk-averse acquisition adept at keeping one of the larg- defenses. Besides improving secu- direction, it went from start-up community that social media and est IT enterprises in the world up rity, he saved $20 million and status at the Special Operations contracting work well together. and running around the clock, but eliminated more than 900 unnec- Command to a model that is now he is also savvy about continu- essary networks. in use across DOD. Ted Davies ally applying strategic changes “Rear Adm. Deets has been President, Federal Systems to make systems more eff ective. focused on improving network Unisys Last year, he reduced the num- support to the warfighters Ted Davies understands that the ber of VA data centers from 175 while mitigating security risks most successful IT companies to 87 for substantial cost savings to all Global Information Grid balance the demand to develop while maintaining an astonishing users,” said Janice Haith, the good technology with their need 99.99 percent availability of the Navy’s director of assessments to develop good talent. systems hosted at the centers. and compliance. “His initiatives In 2010, Davies embraced the He also installed new soft ware have improved the overall opera- government’s cloud-fi rst program to give administrators visibility tional and security of posture of and led Unisys in developing a into all 300,000 computers on the the Navy, DOD and the federal suite of secure cloud solutions. VA’s networks, thereby improv- government.” In partnership with Google, Uni- ing the security and reliabil- sys won the fi rst enterprisewide ity of the department’s desktop cloud-based soft ware-as-a-service infrastructure.

Mary Davie Ted Davies Charles J. De Sanno Rear Adm. Edward H. Deets III Lt. Col. Al Di Leonardo

34 March 28, 2011 FCW.COM Donna Dodson leadership, within GSA and across Holly D. Elwood nation, for TSA to know who’s Chief, Division government, on the administra- Project Manager who when people are boarding National Institute of Standards and tion’s open government initiative. Environmentally Preferable airplanes. Technology Dorris was “the person I Purchasing Team With few resources to help him Commerce Department depended upon...to think stra- Environmental Protection Agency and with a very limited budget, In recent years, NIST has had a tegically about our next step to Holly Elwood is a rising star in Ford took on a derelict Secure big say in how government uses provide government informa- the movement toward green IT Flight program and personally technology and secures its IT, so tion to the public,” said David procurement. She helped create developed the contract require- it’s a testament to Donna Dodson’s McClure, associate administrator the world’s largest rating system ments, change control policies, quiet leadership that its infl uence for citizen services and innova- for sustainable electronics — the technical team and other things is now even greater. tive technologies at GSA. “She Electronic Product Environmental needed to re-energize the proj- She has displayed a clear provides a steady hand, an envi- Assessment Tool (EPEAT) — and ect that handles TSA’s no-fl y list. understanding of how to engage ronment where innovation can she coordinates the Institute of Secure Flight now matches more with the White House, intelli- blossom and the strategic vision Electrical and Electronics Engi- than 2 million names daily against gence agencies and industry on to move citizen services forward.” neers’ green electronic standards the watch list. cybersecurity. Dodson became through her leadership of infl uen- Ford also applied his magic the glue that held all the sides Jamie Dos Santos tial working groups. touch to the Consolidated Screen- together. In the process, she made President and CEO In 2010, she helped push those ing Gateway, which helps stream- NIST’s security policies, best Terremark Federal Group standards beyond computers and line threat assessment operations. practices and tools more eff ective. Selling their products is the pri- monitors to include imaging equip- Many organizations have been mary passion of most government ment and TVs, and she launched vying for leadership of the cyber- contractors and the people who new working groups that focus on security debate and could have work for them. So when someone improving energy effi ciency and submerged NIST’s more practical puts a lot of work into producing reducing toxic content in servers sensibility. By speaking authori- game-changing results with very and handheld devices. tatively and carrying a padded litt le money on the line, it gets Because of her eff orts, federal stick, Dodson has become one noticed. offi cials now buy millions of elec- of the most trusted government Jamie Dos Santos commit- tronic products that meet IEEE advisers on cybersecurity. ted her time and her company’s standards. And her impact reaches resources to shepherding a pilot beyond the United States to more Martha A. Dorris program through to completion than 41 foreign governments that Deputy Assistant Administrator to show how network-monitoring register EPEAT products, includ- General Services Administration technologies can protect agency ing China and the European Union. Th e Offi ce of Citizen Services is networks. the front door for citizen engage- She shuttled between the Gerald Ford ment. Martha Dorris is one of the Homeland Security Depart- General Manager for Technology people that the Obama adminis- ment, the Defense Department Offi ce of Transportation Threat tration counts on to swing that and Capitol Hill, sharing insights Assessment and Credentialing door open. and strategies for how the tech- Transportation Security Th e numbers speak volumes: nologies could help. It’s the kind Administration Th e Offi ce of Citizen Services of handholding you don’t oft en Homeland Security Department logged more than 183 million see from senior executives, but it Gerald Ford knows who’s who. contacts with the public last year. resulted in a measurable boost to Or at least he has made it possible, She also has provided strategic network security. through sheer grit and determi-

Donna Dodson Martha A. Dorris Jamie Dos Santos Holly D. Elwood Gerald Ford

March 28, 2011 FCW.COM 35 Joyce France freely among federal agencies. Michael Erik Garcia collect the information needed Director, CIO Management Services Th e program includes exec- Cybersecurity Strategist for the program. And despite the Defense Department utive-level and multiple inter- Homeland Security Department daunting nature of the task, not Joyce France is paving the way agency teams, and it has already Th e Obama administration leaned only did he deliver the program’s for the next generation of the fed- demonstrated its feasibility on on Michael Erik Garcia last year initial operating capability on time, eral government’s IT workforce. seven projects. Eventually, the when it came to ensuring that the he got it done early. In support of the CIO Council, approach could be expanded to National Strategy for Trusted Iden- His eff orts have provided DOD France led an analysis of trends bring industry and private orga- tities in Cyberspace program accu- and Marine Corps personnel with among federal IT employees to nizations into the system. rately refl ected the economics of an operationally realistic environ- help develop a strategy to integrate cybersecurity in online commerce. ment in which to train, test and the growing numbers of the mil- Kurt Garbars Garcia helped to direct inter- exercise cyber-specifi c skills and lennial generation entering gov- Senior Agency Information agency collaboration and private- capabilities without exposing the ernment service. Security Offi cer sector outreach around NSTIC. organizations’ networks to risk. This detailed examination General Services Administration In particular, he received kudos of the “Net Generation” as a Kurt Garbars played a lead role in for navigating through more than future component of the federal gett ing multiple agencies to agree 4,000 comments submitt ed with IT workforce revealed insights on a set of processes that could the public draft of NSTIC, which into motivations, expectations revolutionize how information was released last summer. and skills that can be captured security is applied across govern- Garcia’s involvement helps and harnessed to support the ment, especially in the burgeoning position the government as a government. Th e study’s result- area of cloud computing. source for reliable, secure online ing conclusions and “to do” list As chairman of a multiagen- identity management, which for federal agencies will open the cy working group authorized by many observers consider to be a door for young IT employees to the CIO Council, Garbars spent game-changing strategy in secur- fl ourish. eight months developing con- ing electronic transactions that trols, guidelines and processes are increasingly important to the Lt. Gen. Kathleen M. for the Federal Risk and Autho- nation’s economy. Gainey rization Management Program. Director for Logistics FedRA MP will allow agencies Neil Gaudreau Joint Staff to share the risks and costs asso- Head of the Cyber Security Branch Defense Department ciated with the assessment and Information Assurance Division Talk about a logistics challenge. accreditation of cloud comput- Headquarters, Marine Corps Lt. Gen. Kathleen Gainey took ing products and services. Under Navy Department on the task of assembling a team FedRA MP, those activities could An IT test bed will never be exactly of leaders from across the govern- be conducted once and used by the same as reality, but to be of any ment to identify ways of improving other agencies. use, it bett er be close. So when the federal logistics systems. Garbars built consensus Marine Corps was designated the Th e challenge was formidable. around the program based on executive agent for the Defense At a time when funds for logis- the National Institute of Stan- Department Information Assur- tics are dwindling, the demand dards and Technology’s Special ance Range, offi cials chose Neil for faster processes is on the rise. Publication 800-53, which helps Gaudreau to get it up and running. Th e solution? A whole-of-gov- secure cloud computing products Gaudreau led a team of con- ernment system in which assets, and services. tractors and DOD personnel and information and ideas can fl ow worked with a broader group to

Joyce France Lt. Gen. Kathleen M. Gainey Kurt Garbars Michael Erik Garcia Neil Gaudreau

36 March 28, 2011 FCW.COM

Danielle Germain gov NOW and IdeaScale, and Davis Hake cybersecurity acquisitions — Director, Collaboration Project worked out terms of service so Legislative Assistant Zytel and Signature Government National Academy of Public agencies can use Facebook, You- Offi ce of Rep. Jim Langevin Solutions — in 2010. Administration Tube and other social media sites. House of Representatives Away from the offi ce, Hillen’s Danielle Germain’s leadership Last year, Godwin led the way Davis Hake is arguably the House’s commitment to the IT industry helped make the Collaboration in creating GSA’s Challenge.gov hardest-working aide, at least when is exemplifi ed by his participa- Project the place to go for inde- website, which makes it easy for it comes to making cybersecurity tion on numerous advisory com- pendent expertise on using Web agencies to hold contests to spur issues accessible for fellow staff ers mittees and boards, including 2.0 technologies in the federal innovative solutions to govern- and lawmakers. the Chief of Naval Operations government. ment problems. She negotiated He is the driving force behind Executive Panel and the Executive Germain is responsible for a no-cost contract and delivered the House Cybersecurity Caucus, Committ ee and Board of Direc- developing methodologies, cre- the platform in 60 days. Th e web- which his boss, Rep. Jim Langevin tors of the Professional Services ating tools, and documenting best site has now hosted more than 50 (D-R.I.), co-leads. Hake keeps Council. practices that help government challenges with participants from people on both sides of the aisle become more transparent, par- 170 countries. informed through weekly e-mail ticipatory and collaborative. In updates and cyber information the past year, she led numerous Gary “Gus” Guissanie briefi ngs for industry and gov- online initiatives aimed at using Acting Deputy Assistant Secretary ernment, which he holds in the technology to engage stakeholders for Cyber, Identity and Information Capitol Visitor Center to make and generate ideas to solve targeted Assurance them convenient for staff ers. management challenges. Defense Department Back in Rhode Island, Hake Germain has been the driving When WikiLeaks dumped a launched the fi rst statewide high force behind building an under- huge load of classifi ed informa- school cybersecurity talent search standing of Web 2.0 in govern- tion online last year, DOD offi - as part of the U.S. Cyber Chal- ment. Her eff orts to integrate those cials quickly began the hunt for an lenge, which off ers young people tools into NAPA’s management answer to the insider threat and its the chance to win recognition, studies have led the organiza- implications for information secu- scholarships and opportunities tion to new ways of providing rity. It was lucky that Gus Guissanie for further learning. management knowledge to the was around. government. Any solution to the leaks John Hillen required using complex technology President and CEO Bev Godwin while allowing people to continue Global Defense Technology and Director, Center for New Media and sharing information. Guissanie, Systems Citizen Engagement who is equally at home with the John Hillen has been the prime General Services Administration technology and policy require- mover behind Global Defense In the fast-moving world of new ments of the job, became the Technology and Systems’ trans- media, Bev Godwin is an adroit linchpin for discussions between formation into a collaborative early adopter who has been at DOD, the White House’s National partner in tackling the nation’s the forefront of helping GSA and Security Staff , intelligence agencies most critical counterterrorism other agencies stay in step with and other interested parties. and cybersecurity priorities. social networking and collabora- Guissanie’s leadership facilitated Under his leadership, GTEC tion tools. the accelerated deployment of solu- has significantly expanded its She has facilitated the use of tions to guard against future insider business development pipeline new digital tools, including Apps. threats at the department. while adding two significant

Danielle Germain Bev Godwin Gary “Gus” Guissanie Davis Hake John Hillen

38 March 28, 2011 FCW.COM Col. Claude Hines of former government offi cials the Federal Data Center Consoli- political appointees in the Execu- Deputy Program Executive Offi cer and senior industry representa- dation Initiative. tive Offi ce of the President. His for Innovation and Delivery tives to develop the recommen- colleagues described him as the Military Health System dations. As the meetings became Devin B. Holmes “unsung hero” who makes admin- Defense Department more frequent and the pressure of Executive Director, Warrior Gateway istration programs eff ective in the Col. Claude Hines has proven that completing the work continued to Business Executives for National agencies. he has the political, technical and build, Hodgkins recognized the Security “Mike’s years of experience organizational fi nesse to handle the importance of the project and By developing Warrior Gateway, a and comprehensive knowledge toughest IT challenges. voluntarily postponed a sched- Web portal for connecting veterans of government IT gave OMB In 2010, he played a leading uled vacation. to health and other services, Devin a steady, sure rudder to steer role in the establishment of a TechAmerica delivered its Holmes has provided a lifeline of through complex IT policy and medical center in Chicago that report to OMB last Oct. 25, and hope for a community that had guidance issues,” said David is a joint eff ort of the Defense the agency incorporated many of come to believe itself forgott en. McClure, associate administrator and Veterans Aff airs departments the organization’s recommenda- Studies have shown that many for citizen services and innova- to give medical professionals tions into its reform plan. veterans are never contacted by tive technologies at the General the tools and support they need community or other institutions Services Administration. to provide care to wounded Tim Hoechst to help with their reintegration warriors. Chief Technology Offi cer into civilian life, and before War- Hines also held a critical lead- Agilex rior Gateway, veterans had few ership position on a joint DOD/ Tim Hoechst is an innovation ways of fi nding that help on their VA electronic medical records sys- evangelist. own. tem. He is the go-to guy for a $900 In 2010, he led Agilex’s eff orts Warrior Gateway uses Web million portfolio of more than to more rapidly introduce the 2.0 and open data technologies 75 initiatives for DOD’s medical federal government to the new to gather an enormous amount information systems, and he is generation of smart phones and of information about medical and responsible for innovation and tablets, demonstrating that prod- other support that’s available to delivery of IT throughout the ucts such as iPads and iPhones veterans. Th e portal presents that Military Health System. can play a role in enterprise- valuable, usable information in a level systems. Along the same single location. Trey Hodgkins lines, Hoechst has championed Senior Vice President of National the cause of the agile method of Michael Howell Security and Procurement Policy soft ware development. Deputy Administrator for TechAmerica Hoechst also manages the E-Government Trey Hodgkins was assigned a company’s Technology Innova- Offi ce of Management and Budget daunting task: Give Office of tion Center, an in-house research Th e deputy administrator position Management and Budget offi cials and product development facility, doesn’t get much glory. Michael recommendations for improving while helping to develop semantic Howell has a host of statutory IT acquisition and program man- analytics solutions that automate responsibilities for OMB and the agement — and do it in 60 days. information analysis for national day-to-day management of the Hodgkins and TechAmerica security requirements. organization in the offi ce. Howell jumped on the opportunity to As if all that were not enough, augmented that by serving in a participate in OMB’s project, Hoechst was kept busy working critical role as the career federal despite the tight timeframe. with agencies to identify the tech- employee liaison between the Hodgkins gathered a commission nology they needed to implement departments and agencies and the

Col. ClaudeName Hines TreyName Hodgkins TimName Hoechst DevinName B. Holmes MichaelName Howell

March 28, 2011 FCW.COM 39 Jan L. Janssen Weather Service can monitor Joseph F. Klimavicz day job at Pragmatics. His vision Director Twitt er for any postings about CIO and Director of High for the organization has helped Ground Enterprise Directorate severe weather conditions around Performance Computing and transform it into an important National Reconnaissance Offi ce the country and incorporate Communications forum for notables such as fed- Government leaders who keep that information into its offi cial National Oceanic and Atmospheric eral CIO Vivek Kundra to hear harping about the need for effi - warnings. Administration industry’s views. ciency should make sure they Jones also has promoted inno- Commerce Department In the past year, the chapter have Jan Janssen’s details in their vative uses of the Web and social Joseph Klimavicz has a passion has grown, expanded the scope contact lists. media throughout government. for making the most efficient of its off erings, and increased its A dozen legacy go-forward He was instrumental in writing and eff ective IT tools available donations to the Children’s Inn ground systems at the NRO one of the first federal social to NOAA scientists so they can and other charitable programs. did the job, but having evolved media policies and has been a provide the best science and ser- Furthermore, by increasing the independently of each other, they passionate advocate for Section vices to government customers. size of the board and bringing in a blocked any broad enterprisewide 508 accessibility standards. He was a government leader professional management fi rm to investment in infrastructure and during the Deepwater Horizon help run the chapter, Krauss has operations. Th ey were eff ective, Shawn K. Kingsberry oil spill and quickly got the sci- turned what had been a sporadi- but ineffi cient. Deputy CIO entifi c community to agree to use cally eff ective organization into Janssen defi ned a new archi- Recovery Accountability and GeoPlatform.gov as the offi cial a businesslike, results-oriented tecture for the NRO ground sys- Transparency Board federal source for map-based data entity. tem, charted an implementation Shawn Kingsberry has provided regarding the spill. Aft er that ini- plan, and built the cross-agency, vision and leadership in develop- tial step, he opened the website cross-government team needed to ing and deploying all the IT used to the public less than two weeks execute it. Th e result is an NRO by the Recovery Accountability aft er the hardware and soft ware ground enterprise that uses just and Transparency Board. were commissioned. four commercially based systems As a senior executive for the Klimavicz also continued his that will allow for more easily board, Kingsberry led the eff ort eff orts to push his organization to shared data and a far higher oper- to launch Recovery.gov and a meet the aggressive milestones of ating effi ciency. number of other websites in a NOAA’s IT strategic plan, create very short time to comply with partnerships with other federal Ronald C. Jones the mandates of the American agencies and increase NOAA Web Manager/Internet Projects Recovery and Reinvestment Act scientists’ access to high-perfor- Specialist of 2009. mance computing resources. National Oceanic and Atmospheric In May 2010, Kingsberry was Administration recognized by the board’s chair- Steve Krauss Commerce Department man and federal CIO Vivek Kun- Director of Corporate Development Twitt er is becoming a standard dra for making Recovery.gov the Pragmatics feature for agency communica- fi rst governmentwide informa- Under Steve Krauss’ leadership, tions, but Ron Jones took it a few tion system to be fully migrated AFCEA International’s Bethesda, steps further at the National Oce- to the public cloud. Th e migration Md., chapter has stepped up its anic and Atmospheric Adminis- took only 22 days to complete — infl uence in government IT circles. tration, turning it into a poten- another federal milestone. Krauss, who recently joined tially life-saving tool. Censeo Consulting Group, devot- Using standards that Jones ed countless hours to serving as developed, NOAA’s National the chapter’s president outside his

Jan L. Janssen Ronald C. Jones Shawn K. Kingsberry Joseph F. Klimavicz Steve Krauss

40 March 28, 2011 FCW.COM GIVINGCREDITWHERE I.T.’S DUE.

© 2011 Lockheed Martin Corporation

THIS IS HOW Lockheed Martin is proud to be a supporter of the Federal 100 Awards Gala. Congratulations to all of this year’s winners. Information technology is the backbone of every federal agency. Thanks to your work, government works better. For all Americans. lockheedmartin.com/how Vivek Kundra installations around the world. given the constraints, timelines Lt. Gen. William T. Lord Federal CIO and Administrator of Langston has been instrumen- and organizational adversity,” said Chief of Warfi ghting Integration E-Government and IT tal in keeping Army communica- Michael Mestrovich, DIA’s senior and CIO Offi ce of Management and Budget tions and networks running amid technology offi cer for innovation U.S. Air Force Vivek Kundra has been an large-scale movement through and CIO. “Maria’s project direct- Lt. Gen. William Lord is building impact player. Since joining Base Realignment and Closure ly impacts warfi ghters, analysts a communications framework for the Obama administration as activity. He also is leading the and other mission partners at network-centric operations that the government’s first CIO, development of a plan to con- remote sites, including Iraq and will help the Defense Depart- Kundra has been in constant solidate more than 260 Army Afghanistan.” ment in its ongoing quest for motion, championing one ini- data centers. interoperability. tiative aft er another, including “Gary is a technically brilliant, Katie Lewin Besides designing a federated cloud computing, transpar- totally dedicated IT leader,” said Director, Cloud Computing Program Air Force enterprise architecture ency, metrics and data center Mike Krieger, acting Army CIO. General Services Administration that was the fi rst to be certifi ed by consolidation. “His advice is sought by numer- Katie Lewin has been a driving the Defense Department’s Archi- But in December 2010, Kun- ous three- and four-star [gener- force behind all the major cloud tecture and Standards Review dra got everyone’s att ention — als] because it is logical, direct computing programs that GSA Group, Lord is leading the devel- inside the Washington Beltway and fl awless.” manages. Last year, she oversaw opment of a comprehensive aerial and beyond — when he rolled multiple projects crucial to the layer network that will support out the administration’s much- Maria Levesque adoption of cloud computing joint, real-time communications anticipated 25-point plan for Defense Counterintelligence and across government with limited on the batt lefi eld. reforming IT management. Th e Human Intelligence Center staff and budget. He is pushing the development initiative, which pulls together Defense Intelligence Agency She played a critical role in of departmentwide IT standards some ideas that have been fl oated When charged with shift ing key GSA’s Infrastructure as a Service that will establish the price of before, provides an IT road map technology to a private cloud contract and the Federal Risk and admission for joint warfi ghting for the next two years. It focuses and meeting objectives for reduc- Authorization Management Pro- and industry partnerships in on shorter procurement cycles, ing the number of federal data gram. IaaS allows agencies to buy cyberspace. bett er program management and centers, Maria Levesque saw an Web hosting, virtual machines “He has fought through and improved government/industry opportunity to streamline com- and storage as commodities delivered this construct to ensure communications. plex communications systems. and only pay for what they use. DOD investments are interoper- Kundra got kudos for spear- She designed and deployed a FedRA MP is designed to stan- able and fi t together,” said Robert heading an extensive outreach wide-area network optimization dardize the security assessments Carey, deputy CIO at DOD. eff ort that gave industry groups project to 50 locations world- of cloud computing services and and agency stakeholders ample wide, and she did it in a record products. opportunity to weigh in on the 120 days. Th e project yielded In addition to developing plan. major effi ciencies without costly methods and tools for agencies bandwidth upgrades and enabled to use in adopting cloud com- Col. Gary E. Langston faster fi elding of data-heavy, mul- puting, she also helped identify Chief of the Information Infrastructure timedia IT applications to remote policy issues that could impede Integration Division locations that previously would agencies’ progress. U.S. Army have required expensive, com- Call Col. Gary Langston the tie plicated infrastructure improve- that binds: He’s responsible for ments. maintaining the communications “Maria accomplished some- operations that connect Army thing believed to be undoable

Vivek Kundra Col. Gary E. Langston Maria Levesque Katie Lewin Lt. Gen. William T. Lord

42 March 28, 2011 FCW.COM Public Sector Leaders

20 of the 20 Top Global Governments

20 of the 20 Top U.S. Counties

20 of the 20 Top U.S. Cities

All 15 U.S. Federal Cabinet Agencies

All 50 U.S. States

Get Better Results With Oracle

oracle.com/goto/government or call 1.800.633.0584

Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Yvonne Lowe general for peacebuilding support tion. In addition, his leadership in the NetCents 2 program, which Deputy Associate Director of at the United Nations has also business transformation and IT made it fi rst awards in November. National Intelligence and Director of served on the National Security acquisition reform is profoundly She is credited with increas- the Business Transformation Offi ce Council under two presidents. improving the department’s abil- ing small business opportunities, Offi ce of the Director of National Now Lute is applying her remark- ity to deliver capabilities more improving the level of competition Intelligence able leadership skills to one of rapidly. and stepping up contractor over- Yvonne Lowe works for one of the the primary batt les of our times: sight. She is fi ercely committ ed to most secretive federal agencies, so safeguarding cyberspace. Andrew B. Maner delivering services with eff ective her accomplishments wouldn’t In 2010, she used her role as Vice President and Partner oversight and a minimal amount ordinarily draw attention. But deputy secretary at DHS to cham- IBM of bureaucratic burden. her success in modernizing intel- pion the importance of cyberse- Andrew Maner has helped make But she also put a lot of ligence business operations is hard curity as an essential homeland IBM leaders feel pretty smart thought into the future of Air to overlook. security issue, even making sure about buying National Interest Force procurement, helping to Lowe was charged with trans- it was included as one of fi ve mis- Security Co. in March 2010. craft fi eld training, career educa- forming business operations for sion areas for the department in Maner, who had been NISC’s tion requirements and future force the Intelligence Community, the Quadrennial Homeland Secu- CEO, stayed on to become the structure for Air Force contracting which is composed of 16 orga- rity Review. unit’s business leader, responsible personnel. nizations, each with its own for some 1,000 employees in the business processes. She quickly William J. Lynn III energy, intelligence and federal emerged as a skillful leader. She Deputy Secretary of Defense health care areas. Under his lead- brought employees together and Defense Department ership, the company recorded a worked with key agencies and A major proponent for strength- 15 percent increase in contract members of the community to ening the United States’ posture commitment in fi scal 2010. establish common ground and in cyberspace, William Lynn has But Maner is not all busi- create a streamlined, cohesive focused attention on defend- ness. He plays an active role in strategy. ing military and commercial IT the community and is a major “Yvonne brought leadership, infrastructure. participant in the National Guard experience and technological He authored a comprehen- Youth Foundation, the Paralyzed knowledge to work across the dif- sive layered defense strategy to Veterans of America Foundation ferent communities and disparate manage cyberspace threats, devel- and the Armed Forces Founda- agencies,” said Priscilla Guthrie, oped a strong partnership with tion, where he serves as a member former Intelligence Community the Homeland Security Depart- of the board of directors. CIO at ODNI. “She turned the ment for sharing personnel and place around. It was just magical information to bett er coordinate Maj. Gen. Wendy M. to watch her do this.” operations and defense of the Masiello nation’s IT infrastructure, and Program Executive Offi cer for Jane Holl Lute championed security enhance- Combat and Mission Support, Offi ce Deputy Secretary ments and partnerships across of the Assistant Secretary Homeland Security Department industry and government. U.S. Air Force Jane Holl Lute’s experience in war He also drove the eff ective use Maj. Gen. Wendy Masiello deliv- zone strategies and confl ict resolu- of social media and other Inter- ers. Specifi cally, she delivers on tion is serving her well as the top net-based capabilities to improve more than $184 billion in existing offi cial for cybersecurity at DHS. the department’s ability to eff ec- and planned services contracts Th e former assistant secretary- tively and securely share informa- across the Air Force, including

Yvonne Lowe Jane Holl Lute William J. Lynn III Andrew B. Maner Maj. Gen. Wendy M. Masiello

44 March 28, 2011 FCW.COM

Elizabeth McGrath before Congress more than two in aligning themselves with the Brandon Milhorn Deputy Chief Management Offi cer dozen times last year to explain administration’s new emphasis Minority Staff Director Defense Department control systems security to tech- on performance. Senate Homeland Security and Elizabeth McGrath has been on nical and general audiences. He “She is not only a key driver Governmental Aff airs Committee a quest to transform DOD’s anti- also directed DHS teams that behind the progress being made at Brandon Milhorn was the driv- quated business and IT processes. conducted more than 50 assess- many agencies but also an invalu- ing force behind the Protecting McGrath has already removed ments and were dispatched 13 able resource for agencies seek- Cyberspace as a National Asset the department’s personnel secu- times to investigate and help cor- ing, but struggling, to meet the Act of 2010, which was reported rity clearance program from the rect cyber incidents and att acks objectives OMB has established,” out of committ ee late last year and Government Accountability on critical infrastructure. Some said Stan Soloway, president and forms the basis for the Senate’s Offi ce’s high-risk list — the fi rst of those incidents involved the CEO of the Professional Services expected action this year. time a high-risk DOD program Stuxnet worm, a sophisticated Council. Th e bill would create an Offi ce has been removed from GAO’s and targeted piece of malware that of Cyber Policy at the White list. And her groundbreaking was designed to interfere with the David Mihalchik House and bolster government eff orts in streamlining the gov- operation of machinery at Iran’s Strategy and Business and private-sector efforts to ernment security clearance pro- nuclear power plants. Development Lead develop and implement cyber- cess reduced waiting times from McGurk’s in-depth knowledge Google Federal security policies and priorities. an average of 74 days in 2009 and ability to explain complex David Mihalchik is Google Feder- It is already aff ecting the way the to roughly nine days in 2010. technology have put him at the al’s go-to-guy on issues related to government thinks about cyber- McGrath is also pioneering joint forefront of the investigation and cloud computing in government. security and IT. electronic health record devel- public discussion of emerging An important part of his work Milhorn was also instrumental opment between DOD and the cyber threats. in the past year was ensuring in streamlining the Homeland Veterans Aff airs Department. Google’s compliance with Federal Security Department’s manage- “She’s radically changing how Shelley Metzenbaum Information Security Manage- ment processes and improving IT acquisition is gett ing done, Associate Director for Performance ment Act requirements. It was a its procurement and acquisition reshaping and invigorating the and Personnel Management major milestone in cloud comput- policies. As a result, Milhorn is DOD/VA partnership, creating Offi ce of Management and Budget ing for industry and the govern- not only elevating the importance an end-to-end process focus for Shelley Metzenbaum is a vital and ment. Google’s e-mail application of cybersecurity, he’s also working DOD and instilling a results-ori- valued resource for agencies as was the fi rst in the industry to to ensure that the government ented culture,” said Dave Wen- they carry out the Obama admin- complete FISMA certifi cation for runs bett er. nergren, DOD’s assistant deputy istration’s performance manage- a multitenant cloud application. chief management offi cer. ment agenda. Mihalchik always takes the Metzenbaum is OMB’s day- long view of what is best for Seán McGurk to-day lead on that ambitious his government clients, and his Director of the Control Systems initiative, which seeks to insti- patience pays off . “It took a long Security Program tute true performance manage- period working with the Google National Cyber Security Division ment governmentwide. She engineers as well as with people Homeland Security Department works with individual agencies in the General Services Adminis- Seán McGurk has become DHS’ to develop meaningful metrics tration and other agencies,” Mike spokesman for the security of for their work and mechanisms Bradshaw, director of Google Fed- systems that control electric- to track and report on their prog- eral, said of Mihalchik’s eff orts. ity generation and other critical ress. She brings deep knowledge processes. and equally deep appreciation He spoke in public and testifi ed for the challenges agencies face

Elizabeth McGrath Seán McGurk Shelley Metzenbaum David Mihalchik Brandon Milhorn

46 March 28, 2011 FCW.COM

Carey Miller improvements in the Intelligence ture solution for all federal law enforcement agencies to share Technology Risk Director Community’s information envi- agencies operating classified information about activities that Deloitte and Touche ronment to support deployed systems. could be terrorism-related. Carey Miller played a key role forces and headquarters lead- O’Reilly is responsible for in one of the most important ers. His persistence, practicality Jake Olcott implementing the process at all cybersecurity activities of 2010: and solid engineering know-how Counsel 72 fusion centers nationwide the development of the Homeland kept the team on track. Miller has Senate Commerce Committee and every federal agency. He Security Department’s National been a key player in the conver- Jake Olcott was a key player worked tirelessly to educate the Strategy for Trusted Identities in gence of those environments in behind the scenes as lawmakers law enforcement community on Cyberspace. part because of his experience as got focused on cybersecurity. the value of standardized infor- She directed the team that former chief engineer at NSA. He worked with experts in mation sharing while demonstrat- supported DHS in developing He improved the environ- government and industry to ing an unwavering commitment the strategy, which paves the way ment’s architecture and engineer- develop ideas that helped shape to privacy and civil liberties. for a framework for establishing ing while driving the community a bill from Olcott ’s boss, Sen. With a combination of per- confi dence in who’s on the other to use existing capabilities and Jay Rockefeller (D-W.Va.), and suasion, persistence and passion, end of any Internet connection. ensuring that any new efforts Sen. Olympia Snowe (R-Maine) he convinced often reluctant It aims to do so by adopting support the shared environment. intended to serve as a compan- agencies to undertake extensive commercial, user-friendly and ion to an already-introduced employee training and rewrite voluntary identity credentials to Sherrill Nicely bill from Sen. Joseph Lieber- policies to comply with the ini- enable more secure and trust- Acting CIO man (I-Conn.) and Sen. Susan tiative. By the end of 2010, 13 worthy online transactions while CIA Collins (R-Maine). sites had fully implemented the ensuring privacy. An advocate for improved and eff ec- Olcott’s diplomatic work initiative, fi ve sites had established Miller seamlessly linked com- tive security strategies in a variety of with the private sector helped initial operating capabilities, and plex work streams, provided out- government and industry forums, to resolve a controversy that had 30 sites had taken the fi rst steps reach coordination and managed Sherrill Nicely’s personal leader- developed over a provision in toward participation. communications across multi- ship on the Committ ee for National the Lieberman-Collins bill that ple agencies. She worked with Security Systems has resulted in a would have given the president more than 70 stakeholder groups renewed focus on aligning informa- the power to order the shutdown nationwide to aid in developing tion security and identity manage- of portions of the Internet in the strategy and its associated ment requirements across the federal some emergency circumstanc- implementation road map. government. es. Ultimately, Senate Majority Th rough her personal eff orts, Leader Harry Reid (D-Nev.) Kelly Miller the U.S. government now operates chose to develop a consensus Deputy CIO under a single set of security con- bill rather than trying to pass the National Security Agency trols. Th is work, codifi ed in NIST Lieberman-Collins legislation. Kelly Miller hasn’t shied away from 800-53 and related documents, the daunting task of aligning IT provides a guide for government Thomas O’Reilly environments for the Defense agencies to align their eff orts and Director, Nationwide Suspicious Department and Intelligence allows industry to build interoper- Activity Reporting Initiative Community to ensure they have able security applications for the Justice Department a sound and eff ective architecture. entire federal sphere. Thomas O’Reilly took on the As part of a small team from Nicely also championed the monumental task of leading the the defense and intelligence adoption of a common smart Nationwide Suspicious Activity agencies, Miller engineered card and public-key infrastruc- Reporting Initiative, which enables

Carey Miller Kelly Miller Sherrill Nicely Jake Olcott Thomas O’Reilly

March 28, 2011 FCW.COM 47 Chris Painter federal government off erings. structure protection and privacy Michael Reardon Senior Director for Cybersecurity Th e company also had a 25 policies not only directly aff ects Supervisory Policy Adviser National Security Staff percent organic growth last year government networks, but also Offi ce of Disability Employment For the past two years, Christo- to more than 10,000 employees in areas such as electrical power Policy pher Painter was the mainstay 40 countries. Former Rep. Tom grids, fi nancial information net- Labor Department of the National Security Staff ’s Davis (R-Va.) has called the rise works, and information securi- Michael Reardon is a fi rm believer cyber directorate. of ManTech from a two-person ty for DOD personnel and the that the most eff ective policies are Painter, who came to the start-up in 1968 “a true entrepre- general public. created through collaboration. To White House from the Justice neurial success story.” that end, he has explored inno- Department’s Crime Section in Pedersen also holds leadership Paul E. Petersen vative ways to engage the public 2008, led the directorate until positions in a number of industry Strategic National Stockpile and agency partners in the policy- the arrival of as organizations. He is a member Coordinator making process. cybersecurity coordinator. Painter of the executive committ ee of Department of Health In 2010, he led the launch of took control of the directorate at the National Defense Industrial Tennessee ePolicyWorks, a collaborative a critical time, keeping the admin- Association and vice chairman Paul Petersen created the Tennes- eff ort among key stakeholders istration’s agenda on track despite of its Education and Lobbying see Countermeasure Response to address barriers to employment the chaos endemic to an incom- Committ ee. He also serves on Network, an IT system for man- for people with disabilities. It fea- ing administration that wants to the board of the Association for aging medical emergencies. In tures an online workspace where launch new policies and all the Enterprise Information. 2010, it registered, credentialed participants can contribute to the related changes to agency proce- and distributed H1N1 fl u counter- conversation about employment, dures and practices. Painter also Lawrence Pemberton measures to 132 hospitals and 374 disability and health care policy. spearheaded the declassifi cation Deputy Director, CIO Cybersecurity pharmacies in Tennessee. President has of the Comprehensive National and Critical Infrastructure Team Th e Web-based system can be called for government transparen- Cybersecurity Initiative. Navy Department shared by a variety of agencies and cy, citizen engagement and bett er Painter kept a steady hand on Lawrence Pemberton was just used in any browser-based format, collaboration, and ePolicyWorks the rudder until Schmidt relieved what the Navy needed in cyber- making it accessible from smart meets all three goals. Reardon laid him, giving Schmidt a solid plat- security: a guy who is not afraid phones, tablet PCs, netbooks and the groundwork for the eff ort form on which to build. Earlier of numbers. other portable devices. It can also without waiting for a mandate or this year, Secretary of State Hillary Pemberton took the lead on operate in a nonconnected cach- special guidance, and built it into Clinton picked Painter to lead developing more accurate metrics ing mode when Internet access a trailblazing model of govern- the newly created Offi ce of the for gauging the service’s com- is not available. ment effi ciency and transparency. Coordinator for Cyber Issues at pliance with the Federal Infor- Although emergency patient the State Department. mation Security Management and evacuee tracking falls out- Act oversight and the Defense side the purview of state Strategic George J. Pedersen Department’s Cyber, Identity and National Stockpile coordinators, CEO and Chairman Information Assurance Strategy. Petersen decided to add that capa- ManTech International He also shared his expertise with bility to his system. His leadership In 2010, George Pedersen led the DOD Information Assur- and work in that area is paving ManTech through three mergers ance Program and the Offi ce of the way for other federal, state and acquisitions that expanded Management and Budget as they and local emergency managers the company’s cybersecurity and developed a fi nal list of metrics to to develop similar systems. command, control, communi- be applied across the government. cations, computer, intelligence, His oversight of Navy infor- surveillance and reconnaissance mation assurance, critical infra-

Chris Painter George J. Pedersen Lawrence Pemberton Paul E. Petersen Michael Reardon

48 March 28, 2011 FCW.COM THE KNOWLEDGE MANAGEMENT CONFERENCE & EXPOSITION will focus Register Today on information sharing, collaboration tools, strategies, and technology solutions to help solve and SAVE $200! new government mandates such as transparency Use Discount Code: KMAD1 and inter-and intra-agency collaboration. www.FOSEInstitute.org/KM May 2-4, 2011

The Ritz-Carlton, Tysons Corner Q McLean, VA

PRODUCED BY Jim Rinaldi Numerous diplomatic advanc- James Sheaff er always seems to DHS remains committ ed to the CIO es were made in 2010 that includ- be on the spot. program. Jet Propulsion Lab ed a new-media component, and Last year was especially busy Smith put his reputation on NASA the shape of the nation’s engage- as Sheaff er helped with Maryland the line to ease privacy con- Jim Rinaldi oversees all the IT ment with the world has changed Gov. Martin O’Malley’s project cerns and get the system run- initiatives at the Jet Propulsion thanks to Ross’ eff orts. to establish the state as the epi- ning. Although much of Smith’s Lab, which is the lead U.S. center center for cybersecurity innova- work is classifi ed, he is credited for robotic exploration of the solar Capt. Mike Ryan tion. At the same time, Sheaff er with making the exercise a success system and currently operates Commanding Offi cer, Operations served on the Northern Virginia and providing a model for other 28 spacecraft and instruments Systems Center Technology Council team that agencies to emulate. in space. U.S. Coast Guard helped Arlington National Cem- He is a gift ed manager who Capt. Mike Ryan’s approach to etery resolve its recordkeeping has created an IT organization service-oriented architecture problems, and he was a member with a consulting bent. is a model for how to do SOA of the boards of NVTC and the “Jim set out to create a world- right. His team developed Sem- Professional Services Council. class IT organization, and he is per Paratus Enterprise Architec- His dedication to sustainabil- doing that,” said Tom Soderstrom, ture Realization to provide cost- ity and green IT helped CSC and chief technology offi cer for IT at eff ective, state-of-the-art mission its customers adopt many energy- the lab. “It is a consulting rela- support for the Coast Guard, and saving practices, which earned tionship with the customer as it’s already paying off . the company NVTC’s Green opposed to we provide the IT Ryan’s eff orts have improved Award. Moreover, Sheaff er has structure and they use it. Th at the reliability of systems while been instrumental in furthering is the real key, that we win the decreasing the amount of time CSC’s policy of hiring wounded customers one at a time. He chal- it takes to bring new services and disabled veterans. lenges everybody and makes them into production. In the wake of want to come to work.” the Deepwater Horizon oil spill, Chris Smith SPEAR enhanced the Coast CIO Alec Ross Guard’s ability to share informa- Agriculture Department Senior Adviser for Innovation tion in real time with incident Chris Smith led USDA through State Department managers, BP engineers, oceanog- the civilian government’s first As a senior adviser to Secretary of raphers, environmental scientists test of the Einstein 3 technol- State Hillary Clinton, Alec Ross and fi rst responders. ogy that’s designed to help detect has led a major transformation Ryan continually challenges and respond to cyberatt acks. Th e in diplomacy and international his team to come up with new eff ort required collaborating with relations by incorporating social and bett er ways to share data, the Homeland Security Depart- media. which has led other Homeland ment, the National Security Agen- Ross is an avid tweeter who Security Department agencies cy and USDA’s Networx service extends that type of communica- to look to SPEAR as a model. provider. tion on a global scale. His enthusi- Because it works by monitor- asm for new communication tools James W. Sheaff er ing e-mail traffi c coming into or has permeated State Department President, North American out of government networks, Ein- activities and fostered collabo- Public Sector stein has raised concerns about ration with partner nations and CSC domestic spying, especially given multinational groups. When there’s work to be done, NSA’s involvement. However,

JimName Rinaldi AlecName Ross Capt.Name Mike Ryan JamesName W. Sheaff er ChrisName Smith

50 March 28, 2011 FCW.COM David C. Songco government executives, he sharing with other agencies. And statewide online competition that CIO spearheaded the development she worked closely with Congress led to 15 highly qualifi ed students National Institute of Child Health and of an infl uential set of recom- to ensure that the agency had attending an intensive, hands- Human Development mendations that the Offi ce of legislative authority to implement on cyber camp at Wilmington National Institutes of Health Management and Budget used passport security measures. University. David Songco goes beyond his when formulating its 25-point IT She also recruited high school job description by emphasizing management reform plan. He also Harold E. “Pete” Stark teams for the U.S. Cyber Patriot customer service — not IT — as created a process for identifying Manager of Sarbanes-Oxley competition, including the only the top priority for his team. how CIOs could best implement Compliance and Process Improvement all-woman team, which was very In that vein, he recognized that those reforms. U.S. Postal Service successful in the competition. it’s important to have continuity In addition to helping to lead When the Sarbanes-Oxley Act Starkey has helped colleges in in positions that are crucial to the way as the Obama adminis- was giving the U.S. Postal Service her home state get engaged in accomplishing the organization’s tration seeks to transform the a headache, requiring the agency the National Collegiate Cyber mission. So he took on the task government’s IT, Spires has rein- to sort through IT implementa- Defense Competition, and she is of coordinating NICHD’s succes- vigorated the Best Practices Com- tion and compliance eff orts on preparing to launch a statewide sion management plan to mitigate mitt ee with the addition of several a giant scale, Pete Stark provided high school competition called the risk associated with vacan- other leading CIOs. the remedy. Cyber Foundations this year. cies in those positions. His plan Stark manages all IT-related As an advocate for budding includes a Leadership Training Brenda S. Sprague activities related to Sarbanes- cyber talent, Starkey has set the Workshop series to ensure that Deputy Assistant Secretary Oxley compliance, including bar high for her counterparts in people are ready to step into those for Passport Services establishing and directing an other states. jobs when needed. State Department internal IT audit activity and cre- Songco has also been instru- Brenda Sprague created a strategic ating and managing governance, mental in instituting virtual plan for the State Department’s risk and compliance processes. conferencing to enhance collab- passport services organization that Despite working with an anti- oration, and he leads the develop- will serve as a road map for tech- quated IT infrastructure, Stark’s ment of informatics to support nology implementation through team found solutions that were the National Children’s Study, 2014. eventually used elsewhere in the the largest and most detailed Th e plan ties together a variety organization, even for applica- study about children’s health and of activities to enhance passport tions that were not part of Sar- development. services and coordinates training banes-Oxley compliance. The so that employees will be able eff orts were so successful that the Richard Spires to use new systems as they are Navy sought advice from USPS CIO deployed. By creating a coherent for the military service’s internal Homeland Security Department strategy that blends the technolo- fi nancial accounting processes. As if he wasn’t busy enough over- gies with training, Sprague has seeing DHS’ $6.4 billion worth of ensured that all elements of the Elayne Starkey IT investments, Richard Spires strategy work together to improve Chief Security Offi cer took over as chairman of the CIO passport security. Delaware Council’s Best Practices Commit- She also accelerated the Elayne Starkey is all about helping tee last year. And he has quickly deployment of biometric tech- young people realize their talent in become the go-to guy on the nologies and document-scanning the fi eld of cyber defense. In 2010, council. systems to speed the passport she managed the nation’s fi rst col- Working with industry and issuance system and expand data legiate cyber camp and oversaw a

DavidName C. Songco RichardName Spires BrendaName S. Sprague Harold NameE. “Pete” Stark ElayneName Starkey

March 28, 2011 FCW.COM 51 Adm. James G. Stavridis past 14 quarters and is positioned services and innovative technolo- transforming health care — as a Commander, U.S. European to win major contracts from the gies at GSA. “He is the ultimate corporate executive who has built Command and NATO Supreme Allied Navy, NASA and the Centers for defi nition of the ‘go-to guy.’” a $100 million business and as a Commander, Europe Medicare and Medicaid Services. two-time liver transplant survivor. Defense Department Stolkey also has played an William J. Tinston Trafi cant directs Harris’ award- Adm. James Stavridis leads a com- active role in industry profes- Deputy Program Executive Offi cer winning Connect program, which mand of more than 100,000 per- sional groups, serving on the Defense Logistics Agency has been developing open-source sonnel scatt ered across nearly 11 boards of TechAmerica and the When DLA’s director of enter- software for the Health and million square miles of land and 13 Northern Virginia Technology prise solutions retired, William Human Services Department’s million square miles of ocean. One Council and actively participat- Tinston was not your typical act- Federal Health Architecture. FHA of the best ways to communicate ing in the Women’s Leadership ing director. Rather than simply will enable health care organiza- across such a vast swath of terri- Council and Black Employee holding the fort until a replace- tions to securely exchange patient tory is social networking. And no Leadership Council. He devotes ment was selected, Tinston did information via the Nationwide leader does it bett er than Stavridis. his few remaining spare hours to everything he could to ensure a Health Information Network. He uses tools such as Facebook the Susan G. Komen Race for the smooth transition. Trafi cant’s health care solu- and Twitt er to build cooperation Cure and NVTC’s Equal Footing During the transition, almost tions group provides enterprise abroad, communicate security Foundation. all key management positions imaging, information and com- strategies and maintain peace- turned over to newly promoted munications technology, infra- keeping operations. Keith D. Thurston personnel. Tinston mentored the structure, and informatics to gov- “Stavridis has interwoven Assistant Associate Administrator new employees and fi lled in as ernment and commercial health social media and strategic mes- General Services Administration acting program executive offi - care organizations. saging with national security Given his already considerable job cer as needed. Meanwhile, DLA’s Trafi cant also puts his busi- implications,” said Robert Carey, responsibilities, Keith Th urston 3,000-person IT team provided a ness development and leadership DOD’s deputy CIO. “He does all could easily have said he was too sustained 99 percent availability skills to good use as a director for the messaging himself.... He is a busy to absorb the expansion of for the agency’s networks and the United Network for Organ State Department tactician and the e-government agenda in 2010. business systems, which serve Sharing and as a member of the an instrument of the president But instead, he took the lead on military personnel worldwide. Healthcare Information and and defense secretary. Th is is a several major projects and worked Tinston also spearheaded a Management Systems Society transparent leader using IT as long hours to ensure their success. number of eff orts that expanded and AFCEA International. an instrument of national policy, His projects included Data. the agency’s network availability and that’s something that hasn’t gov, Performance.gov, the rede- to allow secure access by person- been seen before.” sign of CIO.gov and signifi cant nel in remote areas and upgraded functional expansion of the IT DLA’s Enterprise Business Sys- Dennis L. Stolkey Dashboard, among others. His tem, which is considered one of Senior Vice President, U.S. Public efforts have been essential to the Defense Department’s most Sector implementing laws and presi- successful enterprise resource Hewlett-Packard Enterprise Services dential directives. Furthermore, planning tools. Dennis Stolkey’s leadership of he developed many of the projects HP’s Enterprise Services division on a centralized basis to ease the Jim Trafi cant — formerly EDS — has produced burden on other agencies. Vice President and Senior Executive tangible results that any corpora- “Keith is a magic man who Account Manager for Healthcare tion would love to replicate. operates behind the scene and the Solutions Th e division has more than limelight,” said David McClure, Harris doubled its market growth in the associate administrator of citizen Jim Trafi cant is passionate about

Adm. James G. Stavridis Dennis L. Stolkey Keith D. Thurston William J. Tinston Jim Trafi cant

52 March 28, 2011 FCW.COM Get Certified and Take Your IT Career to the Next Level

There’s no better time to get certified. • CompTIA Network+ certification covers managing, maintaining, Getting certified can take your IT career troubleshooting, operating and to the next level—including more configuring basic network infrastructure and is the industry standard for opportunities, job security and increased networking professionals. recognition. • CompTIA A+ certification is the industry standard for computer support Go to governmenttrainingexchange.com to learn more and technicians covering installation, take advantage of special discounts of up to 20% off CompTIA preventative maintenance, networking, IT certification programs including CompTIA A+, CompTIA security and troubleshooting. Network+ and CompTIA Security+. • CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT covering system security, network infrastructure, access control and organizational security.

www.governmenttrainingexchange.com

Untitled-1 1 2/25/11 5:01 PM Pete Tseronis DOD operations, Underly based Vargas-Rosales had to bring with the State Department, Deputy Associate CIO the new Human Resources Enter- all her management, communi- National Institute of Standards Energy Department prise Information Web on service- cation and creative skills to bear and Technology, and Homeland Pete Tseronis has a reputation for oriented architecture and open to develop and complete a highly Security Department to create a making things happen, which is technologies — at a fraction of the risky project. What’s more, she framework for making decisions why his talents are in such high cost of DIMHRS. Th e approach brought it in on time and within about risk that integrates report- demand. has exceeded federal milestones budget. ing on compliance mandates, In addition to tackling cyber- and spurred a new DOD policy validation of security controls security activities at DOE, he led that business IT systems must Adrienne Walker and continuous-monitoring risk- the CIO Council’s IPv6 Task be delivered within 18 months. Policy Analyst scoring programs. Th e approach Force and served as president “Underly’s eff orts…will ripple Offi ce of Management and Budget will facilitate governmentwide of the Association for Federal throughout DOD and well into With her in-depth knowledge adoption of a comprehensive risk Information Resources Manage- the federal IT community,” said of IT capital planning, superior management tool. ment, where he strengthened ties Dennis Wisnosky, chief technol- organizational skills and plenty She also developed a scor- between government and indus- ogy offi cer and chief architect of respect from her colleagues, ing tool for security mandates try. He was the main sponsor of at DOD’s Offi ce of the Deputy Adrienne Walker was just the per- and metrics for critical security AFFIRM’s new IT Visionary Chief Management Offi cer. “Th e son OMB needed to take on what controls. Watson’s efforts are Series, a forum for industry and agile approach to development others might have considered an redefi ning how agencies secure federal leaders to discuss inno- demonstrated by HR EIW will impossible task. their systems and enhanc- vative practices and technolo- become the norm for enterprise OMB asked Walker to lead ing the effectiveness of their gies that enhance the business business information projects.” a high-profile, unprecedented security spending. of government. eff ort to modernize the IT capital “Pete is a personal believer Anjella Vargas-Rosales planning process and transform it in the value of bringing govern- Senior Management Offi cial from an annual snapshot-in-time ment and industry together to National Center for Immunization to a real-time, continuous cycle. solve our mutual challenges and and Respiratory Diseases Because of Walker’s leadership, understands the power of working Centers for Disease Control and the capital planning process now across organizations,” said Leslie Prevention helps OMB and agency CIOs Barry, vice president of govern- Th e last piece of CDC’s strategy for make smarter decisions about ment aff airs and business devel- providing the U.S. population with continuing, changing or stopping opment at GTSI. essential vaccines is now in place, their IT investments. thanks to Anjella Vargas-Rosales’ Jonathan Underly management of a large and highly Kimberly K. Watson Highly Qualifi ed Expert complex IT development. Technical Leader of the Vulnerability Business Transformation Agency The VTrckS system, which Analysis and Operations Group Defense Department went live in December 2010, Information Assurance Directorate Aft er the demise of the $1 bil- replaced a number of lumber- National Security Agency lion Defense Integrated Military ing legacy systems and now allows It’s not easy for someone to stand Human Resources System, Jona- for Web-based ordering of vac- out at the super-smart NSA, but than Underly was charged with cines, which will strengthen the Kimberly Watson manages to do creating a replacement. In the nation’s response to situations it — and, in the process, makes process, he helped transform the such as fl u pandemics and pro- good cybersecurity practices a way DOD does business. vide an assured supply for child realistic goal for agencies. In a departure from traditional immunizations. Last year, she collaborated

Pete Tseronis Jonathan Underly Anjella Vargas-Rosales Adrienne Walker Kimberly K. Watson

54 March 28, 2011 FCW.COM ARIA Resort & Casino May 9-11 City Center Las Vegas, Nevada 2011

It’s not a disaster if you have the right plan.

These days in business, only the strong survive. While some might weather a minor disruption, a disaster would mean the end of operations. That’s why you need a business continuity plan to keep your operations adaptive in times of change and resilient in the face of crisis. Contingency Planning & Management (CPM) is the only conference where you can fine-tune and reinforce your plan with the practical advice of leading national experts & COOP professionals who will share their hard learned lessons as they offer one-on-one, action-oriented advice. Remember, it’s not a disaster if you have the right plan. Join us. Register now.

PRODUCED BY: FOR MORE INFO OR TO REGISTER, GO TO: www.contingencyplanning.com TDWI Government MANAGING THE PUBLIC SECTOR Summit DATA EXPLOSION

Washington, D.C. // April 5, 2011

PROFESSIONALS THROUGHOUT GOVERNMENT ARE FACING DAUNTING CHALLENGES posed by the impending tsunami of big data and how to collect, secure, process, analyze, and act on critical information. Attend the inaugural TDWI Government Summit—an intensive, one-day tutorial event designed for busy government executives. Experienced instructors REGISTER TODAY will address priority trends for government IT and program management professionals and SPACE IS LIMITED! how these trends will impact your ability to understand and manage the information you have today—and tomorrow. SPECIAL PRICING– ONLY $495 FOR THE • Learn how government agencies are using social media to improve TDWI GOVERNMENT SUMMIT service delivery • Discover current and emerging technologies that meet government mandates for data management and security • Understand global trends in data management • Meet with public sector colleagues and industry thought leaders

tdwi.org/govtsummit2011

Untitled-1 1 3/1/11 10:18 AM INDEX OF ADVERTISERS Accenture www.accenture.com/federal ...... 27 THE POWER OF CONTENT MARKETING Boeing www.boeing.com ...... 7 CDW-G www.CDWG.com/networking ...... 2 GEICO www.geico.com ...... 30a-30d General Dynamics C4 Systems www.gdc4s.com ...... 12-13 IBM CORP www.ibm.com/facts ...... 60 Lockheed Martin www.lockheedmartin.com/how ...... 14-15, 41 ManTech International Corp. www.mantech.com ...... 33 Northrop Grumman www.northropgrumman.com/cybersecurity 10-11, 45 Oceus Networks Extend communication into interaction with authoritative www.oceusnetworks.com ...... 37 Oracle Corp content that delivers against your objectives and drives www.oracle.com/goto/government ...... 43 reader action. Content marketing allows companies to Sprint generate, or be associated with, content that is intrinsically www.sprint.com/4G ...... 5 VANGENT valuable and engaging to target audiences. www.vangent.com/4outof10 ...... 29 This index is provided as an additional service. The publisher does Go to: fcw.com/contentsolutions not assume any liability for errors or omissions.

■ MEDIA CONSULTANT EXECUTIVE DIRECTOR, Debbie Chernoff CONTENT SOLUTIONS (510) 834-4217 Stacy Money dchernoff @1105GovInfo.com (415) 450-1817 [email protected] ■ MEDIA CONSULTANT Mary Martin MARKETING DIRECTOR (703) 222-2977 Mark Feldman [email protected] (703) 876-5148 [email protected] Alaska, Hawaii ■ Noreen Walker (703) 876-5061 MARKETING MANAGER [email protected] Mario Marzette (703) 876-5067 ■ MEDIA CONSULTANT [email protected] ■ Tania Norris (410) 552-5899 PRODUCTION COORDINATOR [email protected] Lee Alexander (818) 814-5275 ■ MEDIA CONSULTANT [email protected] David Tucker (515) 256-0156 [email protected]

■ MEDIA CONSULTANT Matt Lally (973) 600-2749 [email protected]

©Copyright 2011 by 1105 Media, Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by writt en permission. Mail requests 1105 GOVERNMENT to “Permissions Editor,” c/o Federal Computer Week, 3141 Fairview Park Drive, Suite 777, Falls Church, VA 22042. Th e information in this magazine has not under- gone any formal testing by 1105 Media, Inc. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all envi- CORPORA TE HEADQUARTERS ronments. Technical inaccuracies may result from printing errors and/or new developments in the industry. Media Kits: Direct your Media Kit requests to Mark Feld- man, Marketing Director, 703-876-5148 (phone), 703-876-5128 (fax) [email protected] Reprints: For single article reprints (in minimum quantities of 9201 Oakdale Ave., Suite 101 250-500), e-prints, plaques and posters contact: PARS International Phone: 212-221-9595 E-mail: [email protected] www.magreprints.com/QuickQuote. Chatsworth, CA 91311 asp List Rental: Th is publication’s subscriber list, as well as other lists from 1105 Media, Inc., is available for rental. For more information, please contact our list manager, www.1105media.com Merit Direct. Phone: 914-368-1000; E-mail: [email protected]; Web: www.meritdirect.com/1105

March 28, 2011 FCW.COM 57 BACK TALK The Federal 100: Every year tells a story Th e Federal 100 awards program, viewed in retrospect, is like a family album to revive a term from pre-Flickr days. It off ers a hundred images of the people and events that made each year memorable. In our case, cartoonist John Klossner is a de facto archivist, att empting to capture the zeitgeist of the program each year in one cartoon. Here are some of his past snapshots.

Oct. 30, 2006 — The current debate about whether feds are overpaid would have baff led readers in 2006 as many federal agencies found themselves consistently outbid for IT talent.

March 21, 2005 — Klossner imagines how Hollywood might capture the drama behind Army Knowledge Online, with Vin Diesel starring as Tim Fong, who meets the AKO deadline by fl ying against the earth’s rotation to turn back time. March 23, 2009 — Second Life and other virtual worlds were looming in the public imagination in 2009. Now the technology seems so…dated.

58 March 28, 2011 FCW.COM See you next year at the 23rd Annual Federal 100 Awards Gala March 2012 Are you overpaying for Oracle Database? Hint: you’re overpaying for Oracle Database.

The fi rst thing to consider when thinking about DB2® for your business: it’s as low as 1/3 the cost of Oracle Database. Then consider DB2 on Power Systems™ with 3x the performance per core of Oracle Database on SPARC, in TPC-C and SAP SD benchmarks. Overall, an ironclad case for IBM. There’s more where that came from, too.

ibm.com/facts

COST based on publicly avail U.S. info on 2/10/2011 for IBM DB2 Advanced Enterprise Edition + Oracle software w/comparable capabilities. IBM: 100 Processor Value Units. Oracle: assumes 1.0 processor multiplier. Both incl. Y1 maint/support. PERFORMANCE: www.tpc.org as of 01/26/11 [IBM Power 780 (3 x 64 C)(24 Ch/192 C/768 Th); 10,366,254 tpmC; $1.38/tpmC; avail 10/13/10 v. Oracle SPARC SuperCluster w/T3-4 Servers (27 x 64 C)(108 Ch/1728 C/13824 Th); 30,249,688 tpmC; $1.01/tpmC; avail 6/1/11]. TPC-C is a trademark of Transaction Performance Processing Council. www.sap.com/solutions/benchmark/ as of 01/26/11 [IBM Power 795 (32 P/256 C/1024 Th); 126063 users/2-tier SAP ERP 6.0 pack4/AIX 7.1 + DB2 9.7; cert 2010046 v. Oracle SPARC Enterprise Server M9000 (64 P/256 C/512 Th); 39100 users/2-tier SAP ERP 6.0/Solaris 10, Oracle 10g; cert 2008042]. SAP is a registered trademark of SAP AG in Germany and several other countries. IBM, the IBM logo, ibm.com, DB2, Power Systems, Smarter Planet and the planet icon are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml. © International Business Machines Corporation 2011.