2021 8(a) National Security Showcase

Abstract Submissions and Biographical Sketches

#8a SHOWCASE

PRESENTED BY THANK YOU

SUPPORTING ORGANIZATIONS

SPONSORS JUNE 2021

Dear Colleagues,

Time and again, our community has proven that we are stronger together. Whether collaborating across the public and private sector or between larger and smaller organizations, we understand the value of leveraging diverse perspectives to achieve mission priorities. INSA’s inaugural 8(a) National Security Showcase reflects this commitment to community and collaboration. For two days, June 8-9, we will help foster business partnerships between Intelligence Community (IC) agencies, prime contractors, venture capitalists, and 8(a) businesses. Together, we will build a stronger and more resilient IC.

Companies designated under the 8(a) Business Development Program are small businesses principally owned by U.S. citizens who are socially and economically disadvantaged. Nearly 75 companies responded to INSA’s call for applications this spring, describing their innovative national security technologies, applications, or services. Thanks to the efforts of our Selection Committee, we narrowed the field to 24 companies who will showcase their innovations at our two-day program.

I extend my deepest thanks to all the people and organizations that contributed to the success of this endeavor. Specifically, INSA’s Foundation (INSF), Technology and Innovation Council, Acquisition Management Council, and the Fort Meade Alliance as well as the National 8(a) Association for their partnership.

In the subsequent pages, you will find all the Showcase applications, which include contact information, a description of the company’s experience, and capability overviews for each submission. Additionally, we have marked the 24 finalists who will present at INSA’s 2021 National Security Showcase. I encourage you to use this digital directory (and to share with colleagues!) to learn more about the many innovative capabilities offered by 8(a) companies, make connections, and help drive our national security mission forward.

Letitia A. Long Chairman Intelligence and National Security Alliance

INTELLIGENCE AND NATIONAL SECURITY ALLIANCE | ARLINGTON, VA 22203 | (703) 224-4672 THANK YOU

Thank you to all the INSA members who supported this program!

BRITNEY AMBERS JON LOVE

PAUL CHI TESS PALAO

JOHN FANT VIMESH PATEL

TONY FRAZIER MARY QUINN

LENORA GANT TERESA SMETZER

ALEXIS KOVALCHICK SHAINA TURNER

GARY LE HOWARD WEITZNER

MAJA LEHNUS

MEMBERS 2021 8(a) National Security Showcase | TABLE OF CONTENTS

ADVANCED TECHNOLOGY

Adaptive JASINT Consulting and 07 Tactics, LLC 19 Technologies, LLC

Advent Business 09 Company, Inc. 21 Positive Psyche Biz Corp: NLP Logix

11 Azul Engineering 23 Spathe Systems

Steel Point CP2S 13 25 Solutions

Technology and geoConvergence, LLC Communication Systems 15 27 (TECOMSYS)

z SofTech 17 INA Solutions, Inc. 29 Solutions, Inc.

BUSINESS OPERATIONS

ARServices, 32 Limited 42 SecureMedy, Inc.

34 Falcon Logic 44 System Thinking & Solutions

Nemean Solutions, LLC TeamWorx 36 45 Security

38 RiverTech 47 Xenia Systems, LLC

40 S&K Mission Support (SKMS) 2021 8(a) National Security Showcase | TABLE OF CONTENTS

CYBER

50 Aperture 69 FragCity, Inc.

52 Blue Clarity 71 G2IT, LLC

54 Comcentia 73 HighCloud Solutions

56 CyberAdjust 75 Kriaanet, Inc.

58 Def-Logix, Inc. – ENTRAP 77 Lion Federal, LLC

60 Def-Logix, Inc. – SHIMMIX 79 Lock4, LLC

Def-Logix, Inc. – NetSecurity Corporation 62 STORM HOPPER 81

Def-Logix, Inc. – Suvi Global Services 64 UNIVERSAL AGENT 83

66 Ethic Tech, LLC 85 ZRS Solutions, LLC 2021 8(a) National Security Showcase | TABLE OF CONTENTS

DATA SCIENCE & DATA ANALYTICS

JCTM, LLC – Bestica, Inc. Operational Case-based 88 111 Knowledge Graph

BluePath Nyla Technology 90 Labs 113 Solutions

Blue Sky Innovative Pueo Business Solutions 92 Solutions, LLC 115

BreakForth Solutions RestonLogic, LLC 95 Incorporated (BSi) 117

97 BrightPoint, LLC 119 Secure Innovate Technology Corp

Cinteot, Inc. Square Peg 99 121 Technologies

Def-Logix, Inc. – TDX International 101 ANSSA 123

103 Echelon Xcelerate, JC, LLC (EXJC) 125 Tigua-JTEK

105 Fantom Corporation 127 VG IT Services

107 ITConcepts, Inc. 129 Wovenware, Inc.

109 JCTM, LLC – Perspective ADVANCED TECHNOLOGIES

2021 8(a) National Security Showcase

#8a SHOWCASE The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Adaptive Tactics, LLC Website URL: https://AdaptiveTactics.com/ Mailing Address: 5692 John Givens RD Attach a cover page to your application that inlcudes: Crestview FL 32539 My company is an SBA 8(a) certified small business: Yes No Date Certified: 03/10/2014

Primary Point of Contact Name: Shane Cornell Title: President Organization: Adaptive Tactics Email: [email protected] Phone: 850-800-6006

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NAVSEA, AFMC, SAIC, Army, Air Force, Marines, TSA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Diego, CA Naval Base; Tinker AFB; (key team members at TS/SCI level for IC in Virginia) Ft Polk LA, Moody AFB, Eglin AFB, Egg Harbor NJ

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 7 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Adaptive Tactics LLC implements Adaptive Intelligence [AI] solutions that apply adaptive models & algorithms to solve hard multi-source physical & cyber intelligence, , & reconnaissance (ISR) problems. Our team of signal processing, machine intelligence, data science, software, & data engineers provide the ideal combination of skills to solve ISR problems and support their integration. Our software & methods lead the way to the 24 capabilities beyond current second wave of machine intelligence (2MI) methods, which employ static models & algorithms. 2MI is insufficient for complex intelligence problems where the context, adversarial operations, & composition of problems is continually changing. Our enhanced decision-making capabilities are augmented by revealing meaningful patterns in data; while providing transparency that enables humans to understand the basis of recommendations. We want to apply our third & fourth wave of machine intelligence (3MI & 4MI) methods to intelligence community (IC) problems, with a focus on mission relevant data summarization. We have previously demonstrated in Navy and Air Force contracts that this results in three orders of magnitude less data (i.e., 2000X compression) without loss of mission relevant information.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Our software & methods advance national security by implementing adaptive intelligence (AI) to provide more robust, higher fidelity, & explainable machine intelligence for physical & cyber intelligence applications. Our distributed compute implementation is designed for hybrid cloud or high-performance compute platforms to process huge volumes of multi-source data from sensors, legacy systems, or human observations. Our live introspection of normalized data ontologies provides deeper understanding of data statistical change over time that is then used to dynamically adapt models & algorithms to maintain robust performance. We believe that current static models & algorithms poorly effect reality over time, due to changing context. By eliminating black-box solutions, we provide deeper insight into the validity of models & algorithms that are underpin machine intelligence applications. In addition, by more effectively summarizing the mission relevant activity, we make it easier for both humans and machines to understand what is actually happening in a complex system and where to look next to resolve issues.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 8 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Advent Business Company Inc. Website URL: https://adventbusiness.com Mailing Address: 3023 Rollingridge Rd Attach a cover page to your application that inlcudes: Naperville IL 60564 My company is an SBA 8(a) certified small business:  Yes No Date Certified: Nov 26, 2013

Primary Point of Contact Name: Rajesh Gupta Title: President Organization: Advent Business Company Inc. Email: [email protected] Phone: 202-765-3173

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a:  Prime Subcontractor Other If permitted, which agencies/primes did you support? DISA, DHS-CBP

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis):

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 9 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words). Submission Description One ofof the the core core aspects aspects of ofsecurity security is control is control of the of dissemination the dissemination of classified of classified or sensitive or sensitive information, information, which happens Describewhichwhen a happens federal the nationalagency when hasa securityfederal to involve agency related IT personnel has technology, to involve to develop application, IT personnel a process or onceto service develop it is conceptualized you a process wish to onceshowcase with ita iswhiteboard for this eventconceptualizeddesign. with Security an emphasis clearedwith a whiteboardsoftware on what experts design.makes are theitSecurity innovative only solution cleared (150 for software thiswords). challenge experts however are the better only solutionsolution is for software this builds challengethe software. however better solution is software builds the software. ThatOne ofis thewhy core Advent aspects has of innovated security is Enablementcontrol of the® dissemination that builds software. of classified Enablement or sensitive enables information, non-technical which happens noviceThatwhen is a whyusersfederal Advent so agency that has they hasinnovated tocan involve build Enablement® ITIT personnelprocesses that to based buildsdevelop software.on a theirprocess accessEnablement once rights it is conceptualizedenables on the non-technical IT assets with of a whiteboardtheirnovice users so organization.thatdesign. they Security can build Once cleared IT Enablementprocesses software based experts is set on up aretheir for the access an only organization, solution rights on for the this it IT allows challenge assets users of theirhowever to organization.build better IT processes solution Once isEnablement fromsoftware builds is BPMNsetthe upsoftware. for diagrams an organization, in less than it allows 3 seconds users to regardless build IT processes of the complexity from BPMN anddiagrams size of in theless process. than 3 seconds Advent regardless is a of CMMI/Devthe complexity III andcompany size of andthe process.holds 3 AdventISOs for is ISOa CMMI/Dev 9001 for III Quality, company IS/IEC and holds 20000-1 3 ISOs for forService ISO 9001 Management, for Quality, andIS/IECThat ISO/IECis 20000-1why Advent 27001 for Servicehas for innovated Information Management, Enablement® Security and ISO/IEC andthat DCAAbuilds 27001 software. certified for Information Enablement and prime Security enables contractor and DCAAnon-technical of certifiedbest-in-class novice and prime users so GWACcontractorthat they 8(a) can of Stars best-in-classbuild IIIT and processes will GWAC prime based 8(a) on Starson Stars their II III.and access will primerights onon Starsthe IT III. assets of their organization. Once Enablement is set up for an organization, it allows users to build IT processes from BPMN diagrams in less than 3 seconds regardless of Additionally, Enablement allows using heterogeneous technologies in a process and boosts return on theAdditionally, complexity Enablement and size of allows the process. using heterogeneous Advent is a CMMI/Dev technologies III company in a process and holds and boosts 3 ISOs return for ISO on 9001 investment for Quality, (ROI) of investment (ROI) of existing IT assets and minimizes the unnecessary delay of the building required IT existingIS/IECDiscuss 20000-1 IT how assets your for and Service technology, minimizes Management, the application, unnecessary and ISO/IEC or delay service 27001 of the advances forbuilding Information required the nationalSecurity IT processes, andsecurity DCAA and mission. certified instrumental andPossible prime to comply processes,with GPRA/FITARA and instrumental compliance. to comply with GPRA/FITARA compliance. contractormission focus of best-in-class areas include GWAC artificial 8(a) Stars intelligence/machine II and will prime on Stars lear III.ning, cybersecurity, high-performance

Additionally,computing, Enablement sensors, emerging allows using technologies, heterogeneous language technologies services, in a process and IT and services boosts return(150 words).on investment (ROI) of existing IT assets and minimizes the unnecessary delay of the building required IT processes, and instrumental to comply EnablementDiscuss how is ayour step technology,ahead of capabilities application, provided or serviceby artificial advances intelligence/machine the national learning security as themission. user has Possible to have an with GPRA/FITARA compliance. advancedmission focus understanding areas include to implement artificial them. intelligence/machine Like a trained human, learEnablementning, cybersecurity, leverages AI andhigh-performance does not expect its userscomputing, to implement sensors, it. Additionally, emerging cybersecurity technologies, cannot language be provided services, just with and ISO/IEC IT services 27001 (150 procedures, words). CMMC standards, or FedRAMP controls if the classified information, especially processing logic, is revealed to IT experts. Like locksmiths,Enablement IT is expertsa step ahead implementing of capabilities IT processes provided could by artificial be the biggestintelligence/machine threat to the security learning that as theintelligence/DoD user has to have an advancedagencies are understanding looking to achieve. to implement them. Like a trained human, Enablement leverages AI and does not expect its users to implement it. Additionally, cybersecurity cannot be provided just with ISO/IEC 27001 procedures, CMMC standards, or FedRAMP controls if the classified information, especially processing logic, is revealed to IT experts. Like locksmiths, IT experts implementing IT processes could be the biggest threat to the security that intelligence/DoD agencies are looking to achieve.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. EvaluationPresenter(s) Criteria Biographical Information WithApplications this application, will be evaluated please include based a on professional innovation CVand (no advancem more thanent oneof the page) national of the security main presenter mission. and a co-presenter, if applicable. Application Submission Evaluation Criteria Please send your completed application and accompanying documentation to [email protected]. Applications will be evaluated based on innovation and advancement of the national security mission. Application SubmissionSubmission Deadline: Wednesday, March 31, 2021 Please send your completed application and accompanying documentation to [email protected]. Questions? Contact us at [email protected]

Submission@INSAlliance Deadline: Wednesday, www.INSAonline.org March 31, 2021

BACK TO TOC Questions?Intelligence Contact us and at [email protected] Security Alliance | INSAonline.org | @INSAlliance | 10

@INSAlliance www.INSAonline.org The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Azul Engineering Website URL: www.azuleng.com Mailing Address: 7705 Connecticut Avenue Attach a cover page to your application that inlcudes: Chevy Chase, MD 20815 My company is an SBA 8(a) certified small business: Yes No Date Certified: 7/1/15

Primary Point of Contact Name: Facundo Fiorino Title: President Organization: Azul Engineering Email: [email protected] Phone: 202-997-0632

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Federal Aviation Administration, LS Technologies (for FAA), GSA, Caretecher

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 11 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words). Azul Engineering has been supporting the Federal Government for 10 years. We focus on developing Geospatial systems for the Federal Aviation Administration (FAA). We have developed two systems that are currently operational at the National Airspace System (NAS) which help coordinate Air Traffic (AT) operations between the FAA and DoD. We have developed the Central Altitude Reservation System (CARF) that helps coordinate and plan military missions and coordinate that airspace use with the FAA. This system utilizes a complex parser to analyze the flight plan request from the DoD. This reservation is deconflicted using a complex algorithm to ensure a safe airspace use. We are the prime contractors developing the NAS In-Sight System (NISIS) owned by the FAA’s National Defense Program (NDP). This system displays real-time status data of NAS assets, weather prediction, NOTAMs, Surface Movement, etc. to help AT coordinate operations during catastrophic events like hurricanes, wildfires, flooding, etc.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). Azul’s technologies, applications and services include innovative development in the areas of complex parsing, natural language, AI/ML, cybersecurity modeling, and geo-spatial calculations. Our team provides solutions to complex mission critical applications for civilian AT which can be applied to the national security mission. We have worked with civilian AT personnel to define systems that automate processing of complex missions to ensure a safe air space. These technologies and services can be applied to defence in areas of Air Traffic, UAV’s, geospatial awareness and decision making, transportation, cyber attacks, disaster recovery, etc. Our small company has developed creative ideas to resolve complex problems for the FAA. We use technologies and computer science principles to help our customers make the right decisions and provide situation awareness in critical missions where small mistakes can have serious consequences.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 12 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: CP2S Website URL: www.cp2susa.com Mailing Address: 44 Mine Road, Suite 2 #171; Stafford, VA 22554-7556 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: June 8, 2017

Primary Point of Contact Name: Tim Smith Title: Analyst Organization: CP2S Email: [email protected] Phone: (503) 935-9670

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Agencies - OMB, PBGC, Navy, USACE, DOE, EXIM Bank. Primes: Williams Electric, Parsons, SpringCM, TRISTAR

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): CONUS

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 13 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

CP2S provides an agnostic approach to physical and electronic security systems, tools, equipment, software, and approaches. Our approach is innovative as we provide a holistic view and assessment, not focusing on one solution over another. We evaluate and assess security risks following an Agile process to ensure that solutions are keeping step with the risks of the moment, with an eye to long term sustainability and protection. We have negotiated and obtained value-added reseller (VAR) agreements with Milestone, Axis, Anixter, SmartFlower, Bosch, NovoTrax ( management), Onclave’s Secure IoT (Zero Trust technology) and Open Options. We are in the process of establishing VAR relationships with Software House, Lenel, American Dynamics, Hirsch, and Pelco. We have additional relationships with other innovative technology suppliers. We have the personnel to lead creative and comprehensive solution assessments, engineering, development, installation, and maintenance.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

CP2S has been business since 1992; we are technology company working in technology transfer, materials and process engineering, technology assessments, and security engineering. CP2S, in addition to our strategic partners (such as Onclave (Secure IoT® - a Zero Trust secure virtual segmented network and communications platform to protect networks), Kreative Technologies, and TRISTAR) provide products and services in the areas of artificial intelligence/machine learning, cybersecurity (including blockchain), sensor R&D, emerging technologies assessments, and IT engineering. CP2S differentiators include: (1) Extensive personnel experience providing data-related processing services, technical support including trouble shooting, training, QC, technical/programmatic support. (2) Corporate leadership with a strong working history, corporate commitment, and top-level project visibility that results in ease of remedy and access at all levels, especially client interface. (3) Our integrated team also means that the criticality of constant customer oversight is greatly reduced, and organizational efficiency (span of control and task management) is, in turn, greatly increased.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 14 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: geoConvergence, LLC Website URL: https://www.geoconvergence.com Mailing Address: PO Box 1937 Attach a cover page to your application that inlcudes: Bloomington, IN 47402 My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/31/2019

Primary Point of Contact Name: Prem Radhakrishnan Title: Co-founder / CEO Organization: geoConvergence, LLC Email: [email protected] Phone: 812-219-7524

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Dept. of Navy (Prime), Dept. of Navy (Sub), Dept. of Veterans Affairs (Sub), and Dept. of Army (Sub)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington D.C. (VACO); Crane, Indiana (NSWC Crane); and Yuma, Arizona (Yuma Proving Grounds)

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 15 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

ArcGIS Indoors is a technology that brings geospatial intelligence inside buildings. The platform enables users to make smart buildings smarter and create an ecosystem that brings CAD/BIM, IPS (Indoor Positioning System), sensor, space assignment, utilization rates and indoor routing data together in a seamless way. Every building generates a large amount of data and disparate systems that most buildings use to manage this data require cumbersome integrations to analyze the building or campus of buildings as a whole - if it is possible at all. Moreover, most building management databases aren’t designed to have an authoritative space assignment data component. ArcGIS bridges this gap and provides us with the ability to manage a portfolio of buildings allowing users to utilize building data to increase and find underutilized space using sensors, improve efficiency of teams by creating space plans that allow for better collaboration, and provide deep insights into key metrics.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

A study published by the US Department of Commerce Technology Administration on Capital Facilities Industry (NIST GCR 04-867 p6-17) showed that the cost of lack of interoperability due to avoidance, mitigation and delay is $0.23 per square foot. ArcGIS Indoors provides a way to mitigate interoperability by bringing data from different sources together and provide insight into capital facilities improving operational efficiency. ArcGIS Indoors provides the ability to utilize the large amounts of data that is currently available for capital facilities used by the NGA and help reduce the cost of operations thereby allowing those funds to be reallocated towards national security and warfighter efforts. ArcGIS Indoors uses advanced 3D geospatial visualization tools for creating common operational pictures and web applications for targeted needs of various users. The specially designed networking algorithms provide efficient routing in a GPS and non-GPS environment using low power Bluetooth beacons and WiFi triangulations.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 16 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: INA Solutions INC Website URL: www.ina-solutions.com Mailing Address: 161 Fort Evans Rd NE, Suite 210 Attach a cover page to your application that inlcudes: Leesburg, VA 20176 My company is an SBA 8(a) certified small business: Yes No Date Certified: 12/09/2018

Primary Point of Contact Name: Suresh Nair Title: President Organization: INA Solutions Inc. Email: [email protected] Phone: 703-786-7047

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington DC, WA and FL

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 17 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

The mobile MAQ-NIRS Fuel is a suite of Internet of Things (IoT) sensors and big data feeds integrated and controlled by smart device or PC/iOS application, feeding our cloud-based platform’s AI and machine learning (ML) capabilities to predict chemical properties of liquids and solids.Team INA integrates data transfer from myriad sensors including near infrared spectroscopy (NIRS), Ultraviolet/Visible (UV-VIS) spectroscopy, sample/ambient temperature, humidity, moisture, barometric pressure, conductivity, and hyperspectral imagers to our cloud platform.Data is processed by AI models to verify results match with material characteristics. Machine learning models provide predictive data for sample characteristics such as viscosity, density, fuel system icing inhibitor (FSII) % volume, and other chemical/physical properties with an accuracy of prediction above 98.5% in less than 15 seconds.We proved the feasibility of using our prototype to test various types of aviation jet fuel for quality and now we are operationalizing this capability for the U.S. Air Force.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Our solution increases aircraft availability rates by providing users feedback on fuel quality using a handheld within 15 seconds on a mobile app. What took days and weeks waiting for off-site laboratory analysis to confirm fuel quality now takes seconds and minutes. This eliminates potential aircraft on ground (AOG) situations caused by insufficient data on fuel. This capability appeals particularly to special operations forces purchasing commercial fuel of unknown quality at austere air bases. We believe this solution will help enhance and contribute aircraft engine performance better and cut down costly maintenance. We believe this capability will speed fuel quality assessment and further advance our national security mission by increasing aircraft availability in austere areas of operations.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 18 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: JASINT Consulting and Technologies, LLC Website URL: www.jasint.com Mailing Address: 9730 Patuxent Woods Drive, Suite 500, Columbia, MD 21046 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 8/14/2014

Primary Point of Contact Name: Rodney C. Williams Sr. Title: President & CEO Organization: JASINT Consulting and Technologies, LLC Email: [email protected] Phone: 443-306-4493

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? WHS / DLA / USCENTCOM/ GSA / USPTO / USAF / NSA / NGA / Northrop Grumman, Leidos, LMCO, BAH, GDIT

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Fort Meade, MD / San Antonio, TX / Washington DC / Pentagon, VA / Odgen, UT, Tampa, FL / Atlanta, GA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 19 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

JASINT provides mission critical systems engineering, cyber security engineering and operations management with niche expertise in providing end-to-end secure data transport ensuring confidentiality, integrity, and availability of critical data within the solution. JASINT has developed an innovative approach to maximizing vendor prototyping of cybersecurity products aligned with unique customer requirements to provide best-in-class capabilities. These capabilities allow JASINT to provide support to a wide range of mission elements across both the DoD and the IC, to include enterprise, point-to-point, and tactical delivery. JASINT leverages its Cybersecurity Innovation Integration Lab (CIIL) to support its mobile application development. JASINT also boasts recent efforts to develop 5G architecture CONOPS with an IC agency. JASINT is holistically working to integrate these capabilities into one platform to provide a more flexible and agile mission focused capability. JASINT maps these unique niche offerings via the use of Agile and Scaled Agile Framework (SAFe) methodologies.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

JASINT believes that 5G’s true potential will be its impact on net-centric warfare which will include a large number of cheaper, more connected, and more resilient systems to function in a rapidly evolving battlespace. 5G has the capability to combine DoD’s current fragmented networks into a single network to promote improved situational awareness and decision-making. Thus, JASINT would further it’s partnership with DoD and the IC to address the following initiatives: – ”Zero-Trust” Network Model - DoD must assume all network infrastructures will ultimately become vulnerable to cyberattack from both an encryption and resiliency standpoint that will move to quantum- resistant key exchange mechanisms to deal with the eventual fall of public key exchange algorithms – Resiliency and Redundancy - DoD must brace for cyberattacks by improving resiliency and redundancy throughout its networks to ensure uninterrupted connectivity by testing and experimenting on its bases for future generations of wireless technology beyond 5G. Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable.

Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission.

Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 20 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: PositivePsyche. Biz Corp/NLP Logix Website URL: www.positivepysche.biz Mailing Address: 401 E. Pratt Street Attach a cover page to your application that inlcudes: Suite 2432 Baltimore, MD 21202 My company is an SBA 8(a) certified small business: Yes No Date Certified: 2/17/17

Primary Point of Contact Name: Sean Adetula Title: Business Development Manager Organization: PositivePsyche. Biz Corp Email: [email protected] Phone: 410-387-5054

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Texas, DC

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 21 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

PPC/NLP Logix provides custom machine learning and AI solutions. Using a proprietary machine learning toolkit, as well as a number of custom applications, NLP Logix can quickly collect large data sets and apply algorithms to train the data to accomplish automation tasks. Examples of where we have delivered solutions for governmental customers include:

Poison Control Centers – NLP Logix has developed and maintains surveillance algorithms that detect poison-related outbreaks that would otherwise go unnoticed by humans. F-35 Joint Strike Fighter – NLP Logix has developed machine learning models to optimize the maintenance. Veterans Administration – NLP Logix trained a deep learning neural network to extract and classify documents in very high volumes. IRS – through a subcontract, NLP Logix developed and deployed a machine learning model to predict the probability a person will pay a debt. Education – NLP Logix is building an AI-powered platform to administer education savings accounts.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Artificial intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security. NLP Logix technology and services supports the national security mission by bringing its decade of experience in developing, deploying and maintaining artificial intelligence/machine learning custom applications. Whether its training computers to analyze and extract information from imagery, or using natural language processing (NLP), to evaluate a large corpus of unstructured text, NLP Logix has the expertise and tools to quickly train and deploy AI-powered solutions. NLP Logix, in partnership with Positive Psyche, brings the experience and exceptional past performance of a large business, in a small and agile team able to move and adapt quickly. NLP Logix is constantly investing in the latest machine learning techniques and consistently keeping up with the latest advances and techniques in computing and would like to apply those to protecting the United States.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 22 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Spathe Systems Website URL: https://spathesystems.com/ Mailing Address: 5401 W. Kennedy BLVD Suite 750, Tampa FL 33609 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: July 26, 2017

Primary Point of Contact Name: Adam Herbst Title: COO Organization: Spathe Systems Email: [email protected] Phone: 813-853-0982

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? JSOC, USSOCOM, AFSOC, NSW, USAF CloudOne/PlatformOne, Novetta, GDIT, Jacobs Technology

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Tampa, Florida, Fayetteville, NC, D.C., Coronado, CA, Little Creek, VA, Dam Neck, VA, Brussels, Belgium & multiple OCONUS locations

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 23 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Spathe Systems provides customized CICD and AI/ML development services for automation of the definition and deployment of CICD and model training pipelines. Our purpose is to accelerate the development lifecycle of modernization efforts that experienced and new developers in cloud deployment can leverage to enforce compliance with DSOP best practices. Common DSOP tools maximize the utility of the infrastructure including Jenkins, Quay, Nexus, SonarQube and Twistlock without a dependency on any technical stack using plugins and webhooks for integration. Our process uses custom tags for execution and labeling pipelines for code and unit test, QA, or release management as soon as a branch merge request is initiated. The entire infrastructure is deployed agnostically using Terraform and can deploy across Regions and Cloud providers by simply modifying the Terraform Resources. Only S3 and EC2 are used in AWS for portability across cloud providers and Impact Levels, using the same automated pipeline.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Spathe Systems enforces implementation of NIST compliant controls at each Impact Level from the start of development, ensuring compliance throughout the development Lifecycle. Each project inherits a jenkinsfile that invokes the DSOP stages including image scanning, SAST analysis, DAST and penetration testing along with quality control gates. This tightly binds the operational components with security through automation and Configuration as Code. There are Quality and compliance gates that execute conditionally based on pipeline tag definition, so that no code can be pushed through a pipeline and bypass any of the security controls. The automation allows for manual approval and artifact validation and tightening or loosening of controls recommended by NIST. The result is an elimination of manual processes including on and off boarding of resources and granular access control that can prevent the over-permissioning of user and system accounts that can lead to spillage of CUI in upper Impact levels.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 24 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Steel Point Solutions Website URL: https://www.steelpoint-llc.com Mailing Address: 11720 Beltsville Drive, 10th Fl, Ste 1001 Attach a cover page to your application that inlcudes: Calverton MD 20705 My company is an SBA 8(a) certified small business: Yes No Date Certified: 10/26/16

Primary Point of Contact Name: Likia T. Hawkins Title: President/CEO Organization: Steel Point Solutions Email: [email protected] Phone: 301-383-8112

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NGA, NSA, FDA, FBI, AF, DCANG, Army CCoE, Prouct Sales (Different Agencies)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Maryland, Virgina, Washington, DC; Pocatello, ID; Georgia

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 25 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

As an SBA 8a Certified, Hubzone, and Woman Owned Small Business, Steel Point Solutions (LLC). Our Intelligent Automation Program (IAP) while shining a light on challenges facing deploying a scalable credential management solution for unattended Robotic Process Automation (RPA) ('aka' Bots). Bots validate requestor's credentials versus bots using the requestor's (human workers) credentials. Both validate requestor's roles within target systems first, then execute the process with Bot credentials every time prior to executing the automated task to enforce security measures. The added validation increases process runtimes by 10-50%. This should be performed through the Bot inheriting the requestor's credentials to perform the tasks. We will demonstrate how one credential can be allocated for each bot vs one to many. Our scalable credential management solution enhances the efficiency of the human worker’s productivity, reduce licensing fees that increases bot utilization while simplifying access control, role and segregation of duties management where there are a high number of humans interacting with automated processes and processes interaction with many different systems.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

System access must be managed for bots separately from humans, including segregation of duties (SOD) management. SOD requirements lead to increasing the number of bot workstations and licenses (2x-5x). Increased SOD management requirements requires additional program resources that potentially takes away from the national security mission versus optimization with forward leaning implementation of an agile solution that scales with the mission. Our enabling strategies includes: Bot credentials tied to workstation (Physical or Virtual), centralized duplicate human CACs (Virtual), and Centralized Bot Credentials (Virtual). We demonstrate our Bot credential management solution, next we provide an overview of each each enabling strategy, the security implications, system roles, SOD management, scalability considerations, and challenges with each approach, and the best suited operational strategy.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 26 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Technology and Communications Systems, Inc (dba. TECOMSYS) Website URL: www.tecomsys.com Mailing Address: 2170 Sunnydale Blvd, Suite T, Clearwater, FL 33765 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: March 6, 2017

Primary Point of Contact Name: Frank A. Vassallo Title: President / Avionics Engineer Organization: TECOMSYS Email: [email protected] Phone: 954-234-7855

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? National Security Agency, NRO, Army Intelligence Directorate, SOCOM and OGA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Aberdeen Proving Grounds, Tampa, FL and other locations

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 27 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

TECOMSYS has been providing innovative Radio Frequency (RF) and Antenna technologies to the IC community since its inception in 2001. One of TECOMSYS research and technology focus areas are magento-dielctric (metamaterials) antennas for antenna miniaturization. Under a CRADA with NSA, TECOMSYS demonstrated an antenna with a height reduction of over 90% in the UHF (SATCOM) band. This was highlighted in two IEEE publications. The technology has application for low frequency tactical communications and clandestine antenna applications. For instance, large scale High Frequency (2-30 MHz) stations throughout the world, can have a reduced footprint if this technology is commercialized.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Typically, High Frequency (2-30 MHz) antennas are large and obtrusive. A quarter wavelength at 2MHz is 123 feet, and at 30 MHz its 8 feet). Research has shown that antenna miniaturization technology can reduce these numbers significantly allowing for lower cost of deployment (in land acquisition for a HF array for instance), lower antenna signature and easier deployment (low SWAP). In addtion this technology can be applied to other frequencies on tight platforms such as aircraft, and Unmanned Aerial Systems (UAS) where antenna real estate is at a premium.

Utilizing this technological approach can significantly reduce antenna signatures (size) and allow for more sensors to be utilized on the same size platform.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable.

Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission.

Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 28 !"#$$%&"'(")0(#%1"($2'34%#56$$%("'   o š ­ o ¸ÃÎ Ø o      ø

‰  ‘ ’ “A A “D ” • 9 @ – 8“” 9 —˜ —™ ™ T q d e d I f aYi T Qph e aYP˜ 789@A9CDE9FHIPQRSTUVWXYI`XX`XTa``PYbVP`cdeTacYfYeTc`ghiiYcYdITPPQpTPPXWVq YXXYdIXqWXcV` rstuvwwxy€vssƒs„ ƒ„ x€†v ‡ˆ N { D’ ‚@”y•9E@“8A S S

l dq eTIQiTq `— Ô º É ÕÖ ½ Í Æ º É Ï¿ »ÀÉ Ç Å ¾×Ø Ë

‘ `VXYc`’“ — â â â äÔÅÉÕ»½ÍÆÅÉÏ¿»ÀÉÇÅäÍÉß

m TYPYIbhiia`XX— ´µ¶·¹º»¼½½»¾º¿À»½ÁÂÂ

à ÄÅÆÀÇÈ»ÉǾÊË ¶Âµ n ‡tƒo „vs‡xwvspqrstvut€ †xy€wo vuuvrwxs€www ”`X i d • v†€–€ †xy€w åæçæ´å

7 x“’ @ xy 7 D “” ED z{ D ” E@ | E i Tq `— ̽»ÀÍÀÄÎϽÐÄÇѽ¼ e YcP` — ËÒÓ H abTIY—TcYdI— Ô º É ÕÖ ½ Í Æ º É Ï¿ »ÀÉ Ç Å ¾×Ø Ë d q T YP— Ͻ»ÀÍÀÄÄϽÐÄÇѽ¼è ÔÅÉÕ»½ÍÆÅÉÏ¿»ÀÉÇÅäÍÉß ƒ‡dI`— µ·çæ··çæ·ç´·

} D~9x”’9”E{D”Ex@|E“”€‚9x“9”|9 ˜™›œžŸ ¡¢Ÿ£¤¥¦Ÿ§¡¨™ ¨©§›¤œ›œª«£¬ª£ª­§™¨®§›¨£™œ§¡©£™›ª§©› ¤¨›œ¨›œª¯ ª§Ÿ£ª¡›§› §­™©¨¡°¨™›œ¦§¡›ž±«§ª¡²³ ƒa`„YdWX` e`aY`If`TXT— ƒ aYq ` jWVfdIcaTfcda H c‡`a h†e`aqYcc`ipk‡Yf‡Tb`IfY`XˆeaYq`XiYiQdWXWeedac‰ Ø Î Ù Ú º Û Î Ã Î Ü ¾Î À¼Ý É ¼Í ½ ¾Ë Ê Ë ¾Ê ½ Þ Ä ¼»ß ½ Ç »É ÕÒ Ç ½ ¼È à ¾Ê ½Þļ»ß½Ç»ÉÕÌÄáɼ Š‹v„„uxtvvu€Œx€s†x‹‡tuvwwxy€u€€uw ejˆjlh ej j h†e`aqYcc`ipPdfTcYdId†fdIcaTfcYIb` e`aY`If`S`gb gŽ gl gpŽ ` I „ ` ap W I cX „ YPP` pj T I h I cd I Yd pj cg d W YX U— Ê Ë ¾ºÉ¿»ÆËļÉÏÀÇľºÄÇÎÇ»ÉÇÀɾºÄÇʽÀÈɾؽâ ã½ÐÀÍɾ×ÇÑÀÄÇÄÞÉÏÀžλÏÄÇ»Ä

g hijhPPYTIf` k k kghijhdIPYI`gdab

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 29 T7UV A99ABCW89‰SA@ABC  †f !{q f{q\†"f #\q $ †!{\#%q&&\f†q f{%'f†#"f! ! †q( !f '{ f !q{)&!qf{!q )q0f f{{'q f'1234$5

gijklmnoijpqrsjtuovuvtsttjwvrswmxymtrsrz{sj| mr}sn~pvrkj}|rjvqromtrsnvrmm}ujtu€vstst€vnnmu u rj n }srsn v py v rv  kvnspsrsmuvtyvpsnvrsjtu‚lomrmnotsƒqmqumuvtvp€j}sro|rovrovu„mmtuoj trj„m|j}m}mpsv„pmrovtjrom}nq}}mtr „sj|mr}sn}jnmyq}muuqnovukst€m}}strwm}sksnvrsjt}mrstvwm}sksnvrsjt‚xtvyysrsjt movwm|vnostmpmv}tst€strm€}vrmy rovrnvt}jwsymkvurm}}jnmuust€wm}uqu|vtqvpoq|vt}jnmuust€‚ijkr v}mqrspsgmurmnotsƒqmuk}j|ro m ksm py u j k | jymp†„vumy}mvujtst€|vnostmpmv}tst€vtyyvrv|stst€rj„qspyuzurm||jtsrj}st€‡tj pmy€m„vumuk}j|v}noswmy j}us|qpvrmyumtuj}yvrv‚lomxymtrsrz{sj|mr}sn~pvrkj}| sppovwmyvrvurj}myjtvr}qurmyuzurm|rjnj| v}m styswsyqvpuwuv}noswmyyvrvrjvqromtrsnvrmmjpmkj}vnnmuu‚losuˆmrojyvty‰mwsnmkj}{sj|mr}snŠm}sksnvrsjtvty xymtrsksnvrsjt spp„mn}qnsvpvu|j}mnjqtr}smu|jwmrjvtvrsjtvpyvrv„vumrjvqromtrsnvrmmjpmrj}j rm n rn }srsn v p stk}vurq}nrq}mstrmpps€mtnmyvrvvtymjpm‚

 f†"!#" †!{\#%q&&\f†q f{%'f†q$'q{† !{q f{q\†"f #)ff{df\ e fggfhiqhrsgtuvtgfirwsxvtuyf€rftwfiyvwwfvirv‚etrƒfivwvtuifi„r †vugvrsufy „ƒfƒ‡ˆvuqhuetirv †) &" f{%{%)f{ †!{\f%\q{"q'f†%q{$b'f†1234$5 losuxymtrsrz{sj|mr}sn~pvrkj}|rmnotpj€znvtkq}rom}romtvrsjtvpumnq}srz|suusjt„zvqromtrsnvrsjtj kv ppv n rj }u mumnsvppz„vyvnrj}u ojpjj‡rjstkpsnrov}|jtn}srsnvpuzurm|u‚‹ mpjj‡rjqumrosum|m}€st€rmnotjpj€zrovrstnpqymu qumnvumuuqnovu~m}ujttmpsymtrsrzwm}sksnvrsjtˆ j „ spm „ sj | m r}sn u Œ q u rsn m Ž v m t kj }n m | m t r j| mpvty i m n q }srz  s}j }ru ‘ v rsj t v px‰ y j n q | m t ru ˆ spsrv }z’}€vtsgvrsjtuvtystrmpps€mtnm‚lomxymtrsrz{sj| m r}sn ~ pv rkj }| ‰ mn}mvumu j}‡pjvy}mƒqs}myrj|jtsrj}uzurm|omvprovtyrj}mujtyrjvtj|vpjqu„movwsj}“j| vnromvpro stkj}|vrsjtysupvzuuoj ym€}mmjkymwsvrsjtk}j|tj|stvpm}kj}|vtnmiz| „jpumtnjymstkj}|vrsjtkj}ƒqsn‡ strm}}mrvrsjt”kksnsmtrvtyvqrj|vrsn†vtvpzgmkqppyvrvumru‰mrmnrmyvtj|vpsmunvt„mumtrrjysv€tjursnujkr v}m xtyqnrswmpmv}tst€‚losupvrkj}|ovuxˆŽkqtnrsjtvpsrzrjymrmnrvtj|jpsmuƒqsn‡m}rovtoq|vtymrmnrsjt‚losu„mv ijkr v}mvuvum}wsnm|mrojykj}nqurj|m}qust€stroms}mtws}j|mtrkj}|j„spm~“ yvrvyvuo„jv}yvtynj| qrm} quv€m‚

”S898C@8S•9–—AB˜SI™A‰IPdCeBSV I@ABC ‘ f ! !fq&&\f†q f{%&\qf{†\"$q&(f{q\F’1{) !q{{&q5( !)qf{&{  tixtrh‡ˆuvgviyvu„fqtˆˆwfrt†wv“ G H I P7 I @AB C R SA@8 SAI R&&\f†q f{f\\'q\"q $q${f{{'q f{q{$q$'q{†) { ( !{q f{q\†"f #)ff{ fPA‰I@ABCT7UV A99ABC d\q{$#"†) &\ $q&&\f†q f{q{$q††) &q{#f{$†") { q f{! †q 

T7UV A99ABCW8IXPAC8Y`Y44q)ab{cf$q#%R&f\`

6 789@ABC9DF  { q † "  q ! †q 

 

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 30 BUSINESS OPERATIONS

2021 8(a) National Security Showcase

#8a SHOWCASE The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: ARServices, Limited Website URL: http://arslimited.com/ Mailing Address: 5904 Richmond Highway, Suite 550 Attach a cover page to your application that inlcudes: Alexandria, VA 22303 My company is an SBA 8(a) certified small business: Yes No Date Certified: 11/29/2011

Primary Point of Contact Name: Jay McCargo Title: President & CEO Organization: ARServices, Limited Email: [email protected] Phone: 703.824.6309

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DTRA, DLA, NAVY, DHS, DISA, NIH, Defense Nuclear Facilities Safety Board, OSD, TSA, SAIC, BAH, AT&T

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Locations throughout the Washington, D.C., metropolitan area, Maryland, Pennsylvania, Ohio, Michigan, Colorado, Utah, New Mexico, Florida, Tennessee, and Hawaii (OCONUS) and overseas

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 32 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

ARServices, Limited (ARServices) is a Small Business Administration (SBA) 8(a) Certified Small, Disadvantaged Business (SDB) providing integrated logistics, business transformation, and research & development support services to Federal agencies. Based on our experience supporting the research and development programs at DLA and DTRA, we are uniquely qualified to support the IC in the identification, assessment, acquisition, and integration of leading-edge technologies into operations. We have provided highly cleared staff up to the TS/SCI level to support technologies related to biosecurity, nuclear countermeasures, and threat assessment. We also possess considerable expertise in human resource management and human capital practices including supporting distributive learning for the Navy. Uncommon to our peers, we have highly mature and robust corporate processes and systems including ISO9001:2015 QMS and a DCAA approved accounting system. Coupled with a highly experienced senior leadership team, ARServices has the ability to rapidly launch and scale up new programs for immediate impact – our application is our services and the corporate infrastructure to support agile delivery. We have worked with such Primes as SAIC, Booz Allen, Deloitte, CACI, Engility, and AT&T.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

The successful application of new technology to existing organizational operations is as much a human challenge as it is a technical one. Unless people accept the new technology and processes are updated to take advantage of the new technology, organizations will experience all of the disruption of change with little of the expected benefits. ARServices is supremely qualified to assist organizations in assessing, acquiring, planning for, and integrating new technology and tools because of extensive experience doing it for other Federal government customers including DLA, DTRA and the U.S. Navy as well as prime contractors such as SAIC, CACI, Deloitte and Booz Allen. Our experts combine a deep understanding of both the technology and the organization, and apply our specifically developed processes for change management and technology integration to minimize disruption, speed acceptance, and realize operational results faster. ARServices’ support allows organizations in the IC to move from technology identification and assessment through implementation faster and easier, bringing innovation into the operational realm more quickly and with greater impact.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 33 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Falcon Logic Website URL: www.falconlogic.com Mailing Address: 2452 Ridgehampton Ct Attach a cover page to your application that inlcudes: Reston VA 20191 My company is an SBA 8(a) certified small business: Yes No Date Certified: 11-26-19

Primary Point of Contact Name: Shazia Noreen Title: President Organization: Falcon Logic Email: [email protected] Phone: 7035983925

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NRO DNI NGA DIA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): VA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 34 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

HTML5 has made it possible to create collaborative geo capable whiteboard capabilities in disconnected network scenarios. Our product, Talon, enables field agents to use mobile devices where network connectivity is not available, low bandwidth, or has been blocked by an advesary. The integration of collaborative sharing and ability to cache a downloadable map background make this new suite of capability a reality.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). Mobile intelligence collectors require a lightweight, cached, easy to provision, offline collaborative map/whiteboard sharing capability. Previous technologies require an always on network connection or preconfigured devices.

The Talon client application is entirely built with HTML5 technologies and can become truly cross platform, run anywhere, on any device without additional software being installed

Talon addresses these issues and provides new collaboration and geospatial data collection capabilities to analysts, agents, and warfighters on disparate and periodically connected networks.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 35 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Nemean Solutions, LLC Website URL: https://www.nemeansolutions.com/ Mailing Address: 500 E. Fry Blvd, M14-D, Sierra Vista AZ 85635 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 9-17-2019

Primary Point of Contact Name: Craig Mount Title: President, Co-Owner Organization: Nemean Solutions, LLC Email: [email protected] Phone: 520-276-6030

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? US Army Intelligence Center of Excellence, US Army Futures Command, US Army 7th Signal Command, US Navy

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Fort Huachuca, AZ; Fort Gordon, GA; Fort Sill, OK; Lackland AFB, TX; Fort Rucker, AL; Washington DC;

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 36 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Nemean Solutions is a certified SBA 8(a) Economically Disadvantaged and Service-Disabled Veteran-Owned Small Business (SDVOSB) providing advanced Mission Assurance, Computer Engineering, Concept Development, Risk Management Framework (RMF), Cybersecurity, Cyber & Electromagnetic Activities (CEMA), Enterprise IT Solutions, Support and Professional Services to Federal and State Agencies supporting the US Government Defense, Intelligence and Aerospace sectors. Nemean has a Top Secret Facility Clearance and DCAA audited accounting system. Nemean Solutions uses an innovative low-overhead model to reduce corporate operational costs and reallocate resources towards employee salary and benefits - this enables Nemean to quickly hire and retain expert level talent in the fields of computer programming, system administration, intelligence support, and cyber security. Nemean currently has 100% of all its positions filled over a dozen contracts in multiple states.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). Nemean provides a highly-talented, multi-facted workforce that works to solve complex issues facing our nation's military and intelligence community. For example, supporting Army training modernization for Cyber Electromagnetic Actitvies (CEMA) in schoolhouses, supporting UAS capabilty development, conducting RMF and Mission Assurance activities for installations and weapon systems - these are modern problems involving emerging technologies and threats. These efforts require forward thinking companies capable of deploying an advanced cyber and IT workforce that understands the role and purpose of national defense, operations-intelligence convergence, and both technology and force modernization. Nemean is using an innovated business model to bring these resources to the goverment in an era of increasing resource constraints.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 37 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: RiverTech Website URL: https://www.akima.com/opcos/rivertech/ Mailing Address: 2553 Dulles View Drive Attach a cover page to your application that inlcudes: Herndon, VA 20171 My company is an SBA 8(a) certified small business: Yes No Date Certified: January 10, 2016

Primary Point of Contact Name: Lori Thomas Title: President & General Manager Organization: RiverTech Email: [email protected] Phone: 571-323-5200

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? US Air Force, US Army, US Coast Guard, DCSA, SCA, Customs and Border Patrol, SOUTHCOM

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington, DC, Colorado Springs, CO, Albuquerque, NM, Oklahoma City, OK, Wooster, MA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 38 Submission Description Describe the national security related technology, application, or service you wish to showcase for this Submission Description event with an emphasis on what makes it innovative (150 words). AsDescribe threats theagainst national national security security related become technology, increasingly application, complex, or RiverTech service youdelivers wish solutions to showcase supporting for this the government’sevent with an defenses emphasis against on what cyberattacks makes it innovativeand insider (150 threats. words). An important component of these defenses is early mitigation through . As an 8(a) Alaska Native Corporation, RiverTech provides intelligence analysis services to DoD and Intelligence Community. From leveraging tactics for all source intelligence aggregation, to delivering actionable intelligence, our TS/SCI SAP/SAR subject matter experts provide the insights required to protect our nation from foreign and domestic adversaries. Solutions include: – Intelligence analysis for vetting operations – Systems engineering on C5ISR systems supporting maritime domain awareness, common operating picture (COP), navigational safety, and search and rescue – Knowledge management and COP integration in support of COCOM ops tempo – Live, virtual, and constructive asset integration for exercise planning, training and simulation, and operational proof of concept Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing,Discuss how sensors, your technology, emerging application,technologies, or languageservice advances services, the and national IT services security (150 mission. words). Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

The Defense and Security Agency (DCSA) has the mission to secure the trustworthiness of the United States Government workforce, the integrity of its cleared contractor support, and the uncompromised nature of its technologies, services, and supply chains. RiverTech is helping advance this mission by delivering the analytical expertise required to manage the lifecycle of classified information access. From the initial ingest of customer data, through multiple production gates and subsequent customer dissemination, RiverTech uses advanced vetting methodologies to conduct specialized screening of identified personnel, helping to pre-empt and mitigate the risk of insider threat. RiverTech’s expert services are currently offered in support of the Vetting Risk Operations Center (VROC) - Expedited Screening Center (ESC); however, these critical skills translate to the intelligence analysis requirements of the larger defense and intelligence communities. Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter andPresenter(s) a co-presenter, Biographical if applicable. Information With this application, please include a professional CV (no more than one page) of the main presenter Evaluation Criteria and a co-presenter, if applicable. Applications will be evaluated based on innovation and advancement of the national security mission. Evaluation Criteria ApplicationApplications Submissionwill be evaluated based on innovation and advancement of the national security mission. Please send your completed application and accompanying documentation to [email protected]. Application Submission Please send your completedSubmission application Deadline and accompanying: 9:00 am ETdocumentation on Friday, Aprilto [email protected]. 9

SubmissionQuestions? Deadline Contact us: 9:00 at [email protected] am ET on Friday, April 9

Questions?@INSAlliance Contact us at [email protected]

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 39 @INSAlliance www.INSAonline.org The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: S&K Mission Support (SKMS) Website URL: https://www.skmissionsupport.com/ Mailing Address: 145 South Lake Crest, STE 3; Polson MT, 59860 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 24 Dec 2019

Primary Point of Contact Name: Mike Monahan Title: Director of 8(a) Sales Organization: S&K Technologies (Tribally-owned, parent company) Email: [email protected] Phone: 406.546.1520

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Prime contracts w/ the following agencies: USAF, US Navy, US Army, NASA, FAA, DOE, USFS, EPA, FEMA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): DC, Houston TX, San Antonio TX, Warner Robins AFB, Tinker AFB, Wright Patterson AFB, Oklahoma City OK, Bremerton WA, Portsmouth OH, Los Alamos NM, Aiken SC, Moab UT, Huntsville AL, Kingdom of Saudi Arabia (KSA)

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 40 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

SKMS is a leading provider of cybersecurity services for highly secure Federal facilities/programs. We provide comprehensive cybersecurity for critical DoD IT systems such as the USAF RAMPOD application, which provides maintenance, inventory, performance, configuration, and readiness data on Electronic Warfare pods across the entire AFLCMC portfolio. Additionally, we provide multiple cybersecurity teams in support of highly sensitive DOE nuclear materials management programs at both the Savannah River Site (SRS) and Portsmouth Paducah Program Office (PPPO). These services are innovative due to our capability to quickly adapt to the evolving threat landscape, adding qualified resources with requisite clearances and proactively developing tools and processes to harden aging/legacy systems. We modernized legacy SRS COMSEC processes and migrated to Sharepoint to streamline workflow, reduce time to completion and eliminate errors. We developed the SRS Incident of Security Concern solution, automating an existing process while adding enhanced tools for incident tracking and reporting.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

SKMS supports multiple agencies that are critical elements of the National Security mission. We support multiple core DOE sites involved in current or legacy nuclear weapons programs including SRS, Los Alamos National Lab (LANL), and PPPO. SKMS leads the design, implementation, and management of cybersecurity assessments across PPPO sites, assessing contractor and subcontractor cyber security programs and government-owned/contractor-operated information systems (e.g., general support systems, national security systems, industrial control systems, major applications). Our cybersecurity support to SRS made it the only DOE COMSEC account to achieve an “excellent” rating from the NSA in 2017. Under the USAF RAMPOD program, we researched, analyzed and implemented ~1300 individual applicable system security controls (main and subset) to ensure RMF compliance. This included developing new policies and processes, and creating or modifying dozens of evidentiary artifacts. As a result, RAMPOD was granted an ATO from the Air Force Space Command (AFSPC) Authorizing Official (AO).

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 41 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: SECUREMEDY, INCORPORATED Website URL: WWW.SECUREMEDY.COM Mailing Address: 8507 OXON HILL ROAD, STE 101 Attach a cover page to your application that inlcudes: FORT WASHINGTON, MD 20744 My company is an SBA 8(a) certified small business: Yes No Date Certified: 09/13/2012

Primary Point of Contact Name: OLABANJI O. FOLAYAN Title: CHAIRMAN/CEO Organization: SECUREMEDY, INCORPORATED Email: [email protected] Phone: 240-607-9894

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? U.S. ARMY

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): DC, MD, VA, MA, KY, NY, NY, TX, GA, FL, TN

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 42 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Securemedy, Incorporated is a diversified services provider with a primary focus on Security Guard and Patrol Services. While the core functions of security guard and patrol services is neither based on technology or application, Securemedy, Incorporated provides our services with a heavy emphasis on leveraging emerging technology as a differentiator from our competitors. Historically, security services rely on the use of human entities to ensure the protection and safety of our client's assets including their people, property and information. However, in our efforts to enhance our ability to provide the referenced services and minimize the shortfalls related to human error, we have leveraged available technology in every aspect of our operations. The management of our mission critical functions performed from within our corporate office, the execution of our primary security duties within our diverse client facilities and our various measures for quality control are all enhanced by available technology.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). Securemedy, Incorporated deploys available technology to facilitate every component of our security operations. Real-time management of on-duty security personnel activities are monitored through our Guard Management Solution (GuardMetrics). Payroll and HR functions are managed through Paychex as our back-office technology. Roving Patrol vehicles, assigned to client facilities, are equipped with Vehicle Tracking (Linx-Up) and Video Recording devices (OwlCam) to monitor personnel and vehicle activities on vehicle interior and exteriors. Uniform and Equipment Inventory is managed from cradle to grave through L.E.A. Data Technologies software. Vehicle fueling and maintenance is coordinated through Fuelman Solutions. Weekly briefings and ongoing training for our leadership team is held through MS Teams. Ultimately, we bring our entire IT platform together with our state-of-the art Corporate Command Center. For value-added, we also provide a robust array of electronic security services. We maximize the use of emerging technology beyond our competitors.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 43 Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

The service we would like to present is an innovative decision support capability that uniquely integrates decision science with system dynamics modeling and simulation (M&S). Our capability captures cause- effect relationships and feedback mechanisms in graphical and computational models. We use simulations of the decision and decision science methods to illuminate alternatives, expose unintended consequences, and provide insights that lead to optimal decisions. One of our innovations is the capability to convert narrative or “natural language” information into computational models that predict and explain behaviors. This capability enables the construction of realistic computer simulations without the requirement for large volumes of empirical data or excessive time spent with subject matter experts. This means we can build practical models in less time and at lower costs as compared to other methods. While our capability is grounded in robust scientific and mathematical principles, our models are user-friendly and readily accessible by decision-makers.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Technology selection, threat detection, resource allocation, and strategy determination, are among the many decisions made while executing the national security mission. These decisions involve multiple and often competing objectives in environments rich with uncertainty. Assumptions are consequential and optimal decision paths are elusive. Our capability advances the national security mission by providing the analyst with a tool that helps them achieve the five Analytic Standards and nine Analytic Standards in the ICD 203. We use a unique blend of methods to create graphical and computational representations of decisions. The models represent the cause-effect relationships of decision variables in the context of mission priorities and objectives. Our capability provides a data and information sandbox to explore consequences, perform what-if analysis and repeat decision many times while considering hundreds of variable and assumption combinations. The capability we offer illuminates alternatives, exposes unintended consequences, and provides insights that lead to optimal decisions.

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 44 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: TeamWorx Security Website URL: https://www.teamworxsecurity.com Mailing Address: 6751 Columbia Gateway Drive, Suite 300 Attach a cover page to your application that inlcudes: Columbia, Maryland 21046 My company is an SBA 8(a) certified small business: Yes No Date Certified: August 5, 2019

Primary Point of Contact Name: Chris Anthony Title: Founder and CEO Organization: TeamWorx Security Email: [email protected] Phone: 443-620-8326

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? HHS

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Fort Meade, MD; Norfolk, VA; San Antonio, TX; Omaha, NE; Suitland, MD; Camp Edwards, NH; Salt Lake City, UT; Los Angeles, CA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 45 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

TeamWorx Security mans, trains, and equips the National Guard and its partners across the DOD, Federal, and State governments. Our flagship technology is Hive-IQ, which has been deployed to over 800 users from 50 states and territories. The web-accessible platform integrates both technical and non-technical users at all levels of an organization. Hive-IQ is a deep collaboration platform that supports incident response management, information sharing, threat analysis, malware analysis, and deep collaboration to help our users get the right data at the speed of need. Because of this, Hive-IQ has been instrumental in training military intelligence analysts in how to apply traditional intelligence methods in the cyber domain. We have developed curriculum and trained over 2,000 intelligence analysts to support upskilling and integration into the cyber mission so that the cyber workforce can evolve and expand as needed.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Hive-IQ is a web-based platform that supports information sharing for national, state, and local security. The platform includes advanced cybersecurity mechanisms to support DODIN and off-DODIN users, including multi-factor authentication and automated malware analysis. We have an integrated, isolated, on-demand, virtual machine environment for users to collaborate and analyze malware and other malicious artifacts supporting incident response. We utilize artificial intelligence and machine learning technologies, such as natural language processing (NLP), optical character recognition (OCR), text summarization, and clustering algorithms to make recommendations for users that identify linkages among threats and make understanding thousands of documents easier for the human. We have observed a 300% savings in time for incident response across the nation using the advances presented in our platform. Our users have been able to reduce operational support from weeks to days, or even hours in some use cases, by using our cybersecurity and AI/ML capabilities.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 46 N S S

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 47 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 48 CYBER

2021 8(a) National Security Showcase

#8a SHOWCASE The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Aperture Website URL: https://www.akima.com/opcos/aperture-federal/ Mailing Address: 2553 Dulles View Drive Attach a cover page to your application that inlcudes: Herndon, VA 20171 My company is an SBA 8(a) certified small business: Yes No Date Certified: April 16, 2019

Primary Point of Contact Name: Zachariah Conover Title: General Manager Organization: Aperture Email: [email protected] Phone: 571-323-5200

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? US Navy (NAVWAR, NAVSEA), US Army, US Coast Guard, USGS, Huntington Ingalls Industries

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington, DC region, Suffolk, VA, Charleston, SC, San Diego, CA, Augusta, GA, Hawaii, Korea

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 50 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Aperture Federal delivers a broad spectrum of continuously evolving services across the C5ISR spectrum including IT services, installation (afloat and ashore), system integration, cybersecurity, information assurance, and production and kitting of systems. Our systems engineering services, for DoD and the Intelligence Community (IC) up to the TS/SCI level, provide the warfighter and IC professional with 24/7/365 operational capability including RF communications (voice and data), network operation center (NOC) services, and full network maintenance and installation in both CONUS and OCONUS locations. In addition, we offer innovative techniques for rapid prototyping and production, as well as integration and kitting of new technology with COTS systems. Our early interaction with design engineers allows us to foresee and address manufacturing issues with materials and specifications early in—and throughout—the project. Whether build-to-print or design and spec fabrication, Aperture is helping customers reduce costs and dramatically speed time-to-production of critical tools and systems.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

As our nation’s focus shifts back towards peer and near-peer competitors, Aperture Federal is a trusted partner to the defense and intelligence communities as we advance the national security mission.

• Our IT and cybersecurity solutions ensure delivery and security of data and communications to forward operators. • Our rapid prototyping, production, and kitting services take concepts and designs developed by the government and produce products for the warfighter at scale. • Our supply chain management support enables the government to overcome reliance on globalization to achieve national security related goals.

The business structure we employ provides a flexible platform capable of tackling complex problems in a dynamic environment. Aperture’s broad spectrum of C5ISR services enables our customers to leverage technological advances while maintaining data security quickly and effectively through cutting-edge cybersecurity.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 51 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details N Company Name: Blue Clarity, LLC S S Website URL: https://blueclarity.io/ Mailing Address: 9503 Chestnut Farm Drive Attach a cover page to your application that inlcudes: Vienna, VA 22182 My company is an SBA 8(a) certified small business: Yes No Date Certified: July 18, 2016

Primary Point of Contact Name: Christine Jung Title: President Organization: Blue Clarity Email: [email protected] Phone: 703-596-5864

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NGA, NIST, IRS, Agency

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Springfield, Washington, D.C., Arlington

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 52 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Blue Clarity would like to showcase our national hackathon series called "ExpeditionHacks." This service combines event management with rapid training and targeted marketing to help organizations glean technology lessons from people and organizations not normally within their immediate reach. Our hackathons for federal agencies, such as the National Geospatial-Intelligence Agency, bring federal, state, and local governments, law enforcement, academia, and commercial organizations together to break down silos and co-create innovative solutions on topics relevant to both national security and technologists. Resulting prototypes include technology in cyber, big data, AI/ML and blockchain on topics such as local economies, human trafficking, food security, disaster response, environmental conservationism, and more. Our most recent virtual competitions highlighted solutions for small businesses to thrive during the COVID pandemic, and for consumers and organizations to combat child trafficking using AI/ML. Our next hackathon addresses the alarming increase of violence against Asian American and Pacific Islanders (AAPI) Americans.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Hackathons provide a way to "humanize" the Intelligence Community for potential partners which allows for improved collaboration to prototype and learn about exploratory topics. For instance, the Intelligence Community (IC) could delve into exploratory topics, such as violent extremism and climate change impacts to national security, through hackathons that bring together subject matter experts and technologists for short, intense collaboration sessions. Criminals do not work in silos. Therefore, solutions to combat criminal activity require co-innovation across academia, commercial industry, law enforcement, and federal, state and local government agencies. The IC can leverage the hackathon success and data that Blue Clarity has built over the last several years to prototype and acquire ideas and technology. Our proven success for NGA can help the IC move forward with solutioning in the most complex spaces. Blue Clarity can advise with next steps on the best opportunities that result from each hackathon.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 53 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Comcentia Website URL: www.comcentia.com Mailing Address: 1025 N. Glen Oaks Lane, suite 102 Attach a cover page to your application that inlcudes: Mequon My company is an SBA 8(a) certified small business: Yes No Date Certified: 03/28/2015

Primary Point of Contact Name: Dele Ojelabi Title: President Organization: Comcentia Email: [email protected] Phone: 4148711100

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? VA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis):

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 54 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

We provide DevSecOps and System Integration of Enterprise system. We strong experience with complex financial and HCM systems.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). We have strong experience in complex global system. Our IT Services provides significant global and world flair that consider the complexity of global economy.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 55 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: CyberAdjust, LLC Website URL: https://cyber-adjust.com/ Mailing Address: 108 Haywood Court Attach a cover page to your application that inlcudes: Columbia, Mo 65203 My company is an SBA 8(a) certified small business: Yes No Date Certified: 3/13/21

Primary Point of Contact Name: Ron Harstad Title: Founder & CEO Organization: CyberAdjust, LLC Email: [email protected] Phone: request via email

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis):

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 56 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

“Disconnection” system protecting any file, + data & transmissions. System will bog down quantum computers (unprotection problem is factorial in file size), far safer than encryption. (Patent pending.) When protecting a database, all information needed to respond to an authenticated query is readily available, via our system, in the protected database; no need to unprotect (to query or for any other reason). Moreover, hacker success in unprotecting a database, however unlikely, is indistinguishable from failure. (Note: single round of seed funding completed, no further round contemplated.)

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Cybersecurity: well-tooled penetrators cannot do damage via seeing, copying, altering, transmitting document, text, image, sound, or any filetype. A CA-protected database is completely impenetrable. Much of national security depends on preventing penetrators from doing damage; currently, regular large costs are incurred in more complex encryption to stay one step ahead of hackers. We can protect a key confidential file so as to stay several thousand steps ahead of hackers, not worry about how much computing power they will have decades from now.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 57 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Def-Logix, Inc. Website URL: https://def-logix.com/ Mailing Address: 3463 Magic Dr. Suite 220 San Antonio, TX, 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/14/2016

Primary Point of Contact Name: Paul A. Rivera Title: CEO / President Organization: Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, USAF, DISA, DARPA, Mantech, Global Info Teck, Raytheon, General Dynamics

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 58 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Entrap is a lightweight, fully capable hunt tool security solution that leverages advanced API monitoring techniques to evaluate potentially malicious behavior on a Windows system and works in conjunction with Windows Defender. Entrap can identify behavioral patterns within software by comparing system activity against a database of malware behavior sequences collected in a lab environment using Entrap’s learning/collection techniques. Entrap has some innovative differentiators such as triggering upon application behaviors instead of malware signatures and custom rule setting features and monitoring .NET managed code. Entrap can have interim events fire off behaviors such as thread termination and process termination. Entrap also allows for excellent visibility of behavior with its ‘Record Mode’ which greatly benefits incident response teams in analyzing and developing safeguards against newly discovered malware.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Entrap addresses the cybersecurity focus area of the national mission by detecting new unknown tactics and techniques categorized by the MITRE ATT&CK Matrix. MITRE ATT&CK is an industry standard model for describing and categorizing advanced persistent threats and Zero-Day exploits. Entrap can be deployed by GPO and will integrate into McAfee ePolicy Orchestrator (ePO) or Host Based Security System (HBSS), a key architecture for managing endpoint, network, and data security in the Department of Defense. Entrap's chaining can deal with events from Entrap rules, ETW Rules and other chains building on each other. Entrap provides a key tool for cyber protection teams for hunting advanced persistent threats. Entrap performs manual or automated threat analysis in real-time and records suspicious activity that can be shared and preserved for security teams (Cyber Operators). It operates as an active Windows service for 24/7 protection and/or as a deployable executable.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 59 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Def-Logix, Inc. Website URL: https://def-logix.com/ Mailing Address: 3463 Magic Dr. Suite 220 San Antonio, TX, 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/14/2016

Primary Point of Contact Name: Paul A. Rivera Title: CEO / President Organization: Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, USAF, DISA, DARPA, Mantech, Global Info Teck, Raytheon, General Dynamics

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 60 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Shimmix is a boot load application based on Unified Extensible Firmware Interface (UEFI) that detects security violation, remediates, performs backup recovery during the Power-On Self-Test (POST) stage of the system boot process. Malware or malicious attacks and security violations at storage, memory, file, program, network, firmware, hardware, and OS levels, as well as vulnerabilities that can provide a potential open door for attack, are caught by Shimmix. Shimmix has seven monitors: 1) Firmware Monitor which collects updates and versions detected at boot from firmware, 2) Image Monitor guards against execution of unauthorized EFI binaries, 3) Vulnerability Monitor checks hardware settings in system chipset configuration 4) Hardware Monitor enforces hardware configuration policy 5) File Monitor verifies integrity of critical EFI boot and system files 6) Registry Monitor verifies integrity of specific keys within the Windows registry hives 7) Network Monitor validates baseline of network adapter details

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Shimmix advances the national security mission with a focus in UEFI / firmware cybersecurity. Shimmix provides an anti-tamper, system integrity, and supply chain risk management protection capability. It supports DoD Program Protection Plan requirements for protecting Critical Program Information (CPI). Shimmix adds significant longevity to CPI by deterring efforts to reverse-engineer, exploit, or develop countermeasures against a system or system component. Shimmix prevents and/or delays exploitation of critical information system technologies and recovers from malicious activity and or anomalies to a previous secure baseline.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 61 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Def-Logix, Inc. Website URL: https://def-logix.com/ Mailing Address: 3463 Magic Dr. Suite 220 San Antonio, TX, 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/14/2016

Primary Point of Contact Name: Paul A. Rivera Title: CEO / President Organization: Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, USAF, DISA, DARPA, Mantech, Global Info Teck, Raytheon, General Dynamics

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 62 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Storm Hopper is a web-based application that quickly deploys cyber C2 infrastructure. This is a tool that focuses on infrastructure deployment using a template repository. The repository contains templates that support rapid provisioning of frameworks for red and blue team operations with additional mission management capabilities. This management platform streamlines the deployment process by abstracting configurations for specific platforms from the operator. This allows operators to quickly deploy and manage Open Source or GOTS frameworks to cloud or on-premise infrastructure without having to learn the nuances of each platform. Storm Hopper not only addresses the need of red teams, cyber protection teams (CPT), and other operators to rapidly deploy, configure, and tear down red team infrastructure. It has proven to be an innovative technology that can be utilized for other types of applications beyond red team infrastructure as this solution is related to the emerging “hybrid cloud” market.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Cybersecurity is a top priority aligning with the national security mission. To ensure cybersecurity is being performed correctly and efficiently, Red Team exercises are necessary. One challenge during an active red team operation is maintaining covert offensive infrastructures. The features that make up a good covert offensive infrastructure are the controls built into the infrastructure to evade detection, hinder incident responders, and maintain resilience throughout the operation. Another challenge is the time and effort to setup red team infrastructure when discovered. This may require a tear down and rebuilding of components of the red team infrastructure. Then the red team must again exploit and reestablish presence in the target network. Storm Hopper is a platform that enables red team operators to rapidly deploy, configure, and manage red team infrastructure in cloud and virtual environments. Storm Hopper can address operator’s burden of configuration and deployment while saving the agency valuable resources.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 63 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Def-Logix, Inc. Website URL: https://def-logix.com/ Mailing Address: 3463 Magic Dr. Suite 220 San Antonio, TX, 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/14/2016

Primary Point of Contact Name: Paul A. Rivera Title: CEO / President Organization: Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, USAF, DISA, DARPA, Mantech, Global Info Teck, Raytheon, General Dynamics

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 64 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

The Universal Agent (UA) technology is a state-of-the-art, red team tool that can plug into GOTS command and control (C2) frameworks. Many traditional agents use C/C++ natively compiled code and Microsoft Win32 APIs that execute well-known functions that Personal Security Products (PSPs) have been programmed to detect. What is innovative about this agent is that it is a .NET-based red team agent. Many modern techniques also employ Live-off-the-Land (LoL) tools and techniques that leverage OS-provided utilities present on the system, such as the PowerShell scripting language, to execute actions. PowerShell is based on .NET and has been used extensively for years as a LoL technique with the full power of .NET tradecraft to provide execution, lateral movement, persistence, and effects in a convenient, already deployed package. Since PowerShell tradecraft is now well known and detectable, moving onto .NET-based toolkits written in other languages is the way to go.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

The UA addresses the cybersecurity national security mission by allowing warfighters to engage in national cyber defense and red team training exercises. Current red team agents compiled in C, take weeks of development for features and will only operate on one platform but not multiple operating systems. Each red team agent is custom made for a specific C2 framework. When subsequent C2 frameworks are designed, new agents must usually be written for them from scratch, and a different agent is designated for each platform. No existing red team agent will plug into multiple C2 frameworks without significant re-architecture of the communications. UA provides benefits for rapid development of actions such as recon and persistence. It is a pluggable API that supports a variety of different crypto schemes, serialization techniques, communication protocols, and other core capability functions. This capability opens the possibility of supporting more frameworks.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 65 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Ethic Tech, LLC Website URL: https://www.ethic-tech.com Mailing Address: 401 Wynn Drive NW Attach a cover page to your application that inlcudes: Huntsville, AL 35805 My company is an SBA 8(a) certified small business: Yes No Date Certified: 09/13/2016

Primary Point of Contact Name: Kevin Long Title: COO Organization: Ethic Tech, LLC Email: [email protected] Phone: 256-261-3792

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? USASAC, USARCENT,

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Huntsville, Middle East, Fort Knox.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 66 A Cyber Criticality Analysis (CCA), a process that helps identify a mission critical system’s potential risks from cyberattacks that could impact its mission, is a vital process in identifying the key activities, objectives, and overall goals of a mission. Currently, this process is based more on each evaluator’s opinion and not a quantifiably measurable metric. The CA process would be enhanced if we design a metric valuation of the process. The analysis to arrive at the metric would be a threat-informed, mission-focused identification of the Mission Critical Functions (MCF) and Critical Components (CC) that would be used to calculate a quantitative value to the system/subsystem component/subcomponent-levels of a system. System function traceability would identify components that support the identified MCFs. The identified components are then used to address the likelihood of mission failure if the component’s primary or secondary functions are corrupted or disabled through a cyberattack, either on the component itself, or through a connected component or information source. By furthering the CA process as a measurable metric, as part of a structured method for prioritizing programs, systems, and components, and based on their importance to the successful completion of a mission, thereby evaluating the impact that their inadequate operation or loss may present to those goals, will enable entities to rate their ability to overcome cyberattacks.

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 67 Name: James E. “Jim” Barrett, Jr. Job Title/Role: Chief Executive Officer / Senior Subject Matter Expert Mr. Barrett has over 30 years of experience in Defense and Aerospace Contracting, in the areas of Systems Engineering, Software Development, Modeling and Simulation, Test and Evaluation, Data Analysis, Telemetry De-commutation, and Real Time Software Development (both embedded and non-embedded). For the past several years, he has been responsible for strategic planning, risk mitigation, and business development for strategic, corporate, technical and operational decisions.

Name: John P. Wilson Job Title/Role: Senior Subject Matter Expert / Senior Systems Engineer

Mr. Wilson has 34 years of experience in Defense Contracting in the areas of Physics, Systems Engineering, Modeling and Simulation, Data Analysis, and Test and Evaluation. For the past several years he has pursued the use of modeling, machine learning, and data analysis techniques to evaluate air and missile defense threat data to feed automated decision aids. The goal is to supply operators with evaluations of threat identification, asset targeting, battlespace evaluation, and best-shot/best-timing opportunities for optimal threat mitigation.

Name: George J. Westfall Job Title/Role: Senior Subject Matter Expert / Senior Cybersecurity Engineer

Mr. Westfall has 40 years of experience in Computer Operations, Micro-chip Fabrication, Software Development, Systems Administration and Cybersecurity Engineering. Mr. Westfall is retired State Department Foreign Service, who acted in numerous roles and as the ACIO in numerous Mission Critical Operations, for both CONUS and International needs. For the past several years, he has focused on incorporating cybersecurity principles and processes into engineering development of weapon system platforms, cyber effects modeling, and weapon system assurance.

Name: Hamilton P Holliday Job Title/Role: Director / Lead Software Engineer

Mr. Holliday has 13 years of experience with Modeling and Simulation Verification and Validation, Systems Administration, and Software Development. For the past ten years he has been developing software and processes to automate the reduction and analysis of all digital and Hardware-In-The-Loop simulation data sets, used by the Missile Defense Agency to make a wide variety of engineering assessments. For the past several years, he has been expanding on the legacy analytical capabilities and integrating with modern analytical tools and APIs to meet evolving needs.

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 68 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 69 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 70 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: G2IT, LLC. Website URL: www.g2-it.com Mailing Address: 1125 West St. Suite 333 Annapolis, MD. 21401 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 9/16/2019

Primary Point of Contact Name: Mike Gauche Title: Vice President Organization: Email: [email protected] Phone: 410 216-4472

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? ONI, NGB, STRATCOM, CENTCOM, NAVY, ARMY, AIR FORCE, DoENGY, DoTRANS, Fed Reserve

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis):

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 71 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Bridge the Gap between IT Operations Data and Cyber Security. We will showcase the integration between Comply-to-Connect, IT Service Management (CMDB) and Cyber Threat Intelligence Platform (TIP) capabilities. What have traditionally been siloed capabilities delivered by technologies from ForeScout, BMC Software and Analyst1, can be deployed to operate in a cooperative manner to bring greater levels of cyber situational awareness and mission impact of cyber related activities unfolding on a government network? Asset inventory data from ForeScout, combined with Application Dependency Mapping data from BMC Discovery populate a Configuration Management Database (CMDB) to form the foundation of IT Assets and Mission Services. When presented to theThreat Intelligence Platform, the entire ecosystem of Cyber Tools sets to include SIEM, SOAR Playbooks, Indicator Enrichment, Vulnerability Data Sources and the Analysts that leverage this data, are provided with a rich mission-aware view into the cyber activity unfolding on the network.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

This integrated IT Operations and Cyber Threat Intelligence capability modernizes and enhances SOC Activities through Automated IT Infrastructure and Mission Service Discovery & Cyber Operations Action. Analyst1 creates and assigns tasks which include creating and enhancing cyder incident tickets with mission/service/asset aware Threat intelligence. This allows for the linking of Cyber Intelligence with assets and systems to identify threat exposure and mission risk. Now the Cyber Analyst, IT Operations Teams and Mission Planners can execute missions with an enhanced awareness to the cyber vulnerabilities exposed on the network specific to known malicious actors who target those vulnerabilities. This awareness reduces the time and human resources needed to assess where a vulnerability may exist and take action to remediate it so that the risk of intrusion is reduced. By bridging the gap between IT Operations Tools and Cyber Threat tools, the mission is made more secure.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 72 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: HighCloud Solutions, Inc. Website URL: https://www.highcloudsolutions.com Mailing Address: 445 Minnesota St Suite 1552 Attach a cover page to your application that inlcudes: Saint Paul, MN 55101 My company is an SBA 8(a) certified small business: Yes No Date Certified: 07/24/2020

Primary Point of Contact Name: Raghu Chejarla Title: President Organization: HighCloud Solutions, Inc. Email: [email protected] Phone: 612-479-3333

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? State of MN (Dept of Education, Dept of Public Safety, Dept of Economic Development, OHE), Hennepin County,City

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Saint Paul, Minnesota

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 73 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

HighCloud Solutions is specialized in Salesforce, Information Technology (IT) services and IT staff augmentation services. HighCloud Solutions is Salesforce consulting partner. We help government agencies to successfully implement Salesforce and information technology projects with agility and attention to detail while maintaining innovation and excellent customer support. We are GSA schedule holder, HUBZone & 8a certified by SBA.

Salesforce.com utilizes some of the most advanced technology for Internet security available today. When users access Salesforce.com using a supported web browser, Secure Socket Layer (SSL) technology protects the information using both server authentication and data encryption. Salesforce provides a comprehensive and flexible data security model to secure data at different levels. Salesforce also provides sharing tools to open up and allow secure access to data based on business needs. Salesforce will require customers to enable multi-factor authentication (MFA) in order to access Salesforce products. Multi-Factor Authentication (MFA) enhances login security by adding an extra layer of protection against unauthorized account access.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

HighCloud Solutions is specialized in Salesforce, Information Technology (IT) services and IT staff augmentation services. HighCloud Solutions is Salesforce consulting partner. We help government agencies to successfully implement Salesforce and information technology projects with agility and attention to detail while maintaining innovation and excellent customer support. We are GSA schedule holder, HUBZone & 8a certified by SBA.

Salesforce.com utilizes some of the most advanced technology for Internet security available today. When users access Salesforce.com using a supported web browser, Secure Socket Layer (SSL) technology protects the information using both server authentication and data encryption. Salesforce provides a comprehensive and flexible data security model to secure data at different levels. Salesforce also provides sharing tools to open up and allow secure access to data based on business needs. Salesforce will require customers to enable multi-factor authentication (MFA) in order to access Salesforce products. Multi-Factor Authentication (MFA) enhances login security by adding an extra layer of protection against unauthorized account access.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 74 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Kriaanet Inc Website URL: www.kriaanet.com Mailing Address: 521 C St Attach a cover page to your application that inlcudes: Quantico VA 22134 My company is an SBA 8(a) certified small business: Yes No Date Certified: 06/29/2015

Primary Point of Contact Name: Shailendra Jain Title: Director Organization: Kriaanet Inc. Email: [email protected] Phone: 7037268035

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Navy, Army, Air Univeristy, FDA, ONDCP, FDIC, GSA, NoAA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Arizona, Virginia, DC, Alabama

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 75 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 76 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Lion Federal, LLC Website URL: www.lionfederal.com Mailing Address: 1602 Dunterry Place Attach a cover page to your application that inlcudes: McLean, VA 22101 My company is an SBA 8(a) certified small business: Yes No Date Certified: 7/31/2015

Primary Point of Contact Name: Mani Qazi Title: Principal Organization: Email: [email protected] Phone: 703-819-6699

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? 2 Intel Customers and 6 Large Primes

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Northern Virginia

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 77 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

The Lion Federal Test Automation Framework (LF-TAF) is an automated software test tool that uses all open-source technologies to enable rapid test case development and execution. Our framework takes only a few hours to set-up and immediately begin creating automated tests for any common browser, is environment agnostic, and can distribute software testing across a large number of servers. It allows for a 1:12 ratio of automation tester to developers and provides simultaneous DevOps support. The process integrates into Agile Development Methodologies and promotes Test Driven Development. The framework is designed to quickly add efficiency and identify defects earlier in the software development lifecycle. The LF-TAF was developed by our team supporting a customer in the intelligence community and was rebuilt in an unclassified environment and optimized through a partnership and Capstone Project with the Virginia Tech Computer Science Department.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). The LF-TAF is ideal to support application development, application programming interfaces and software modernization efforts. Throughout Agile development, the LF-TAF increases the efficiency of development teams promoting shorter sprints and better quality products at the conclusion of each sprint. Introducing the LF-TAF and tester(s) early in the Agile process reduces the risk to the development process, and by extension, to the mission itself as the end product has gone through a more rigorous and thorough testing process. The LF-TAF can support AI/ML API development, cybersecurity software development and other mission-critical software tools across the national security enterprise.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 78 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Lock4 LLC Website URL: www.Lock4LLC.com Mailing Address: 12746 NC Hwy 72 West Attach a cover page to your application that inlcudes: Red Springs, NC 28377 My company is an SBA 8(a) certified small business: Yes No Date Certified: 2 August 2020

Primary Point of Contact Name: Phil Locklear Title: President Organization: Lock4 LLC Email: [email protected] Phone: 910-827-9958

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Joint Special Operations Command; United States Department of State; Defense Intelligence Agency

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Fayetteville, NC; Stafford, VA; Washington, DC

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 79 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

LOCK4 LLC is a Veteran Owned Professional Services small business focused on Federal Government support; providing specially qualified Subject Matter Experts (SME) in Strategy & Plans, Intelligence, Training, Education, Exercise Development, and Program/Facility/Administrative Management support. LOCK4 supplies Knowledge Based services specializing in Dept of Defense (DoD), Special Operations, and Inter-Agency expertise. Our SMEs provide high-demand low-density professional expertise to your doorstep.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Lock4 LLC specializes in "training" of special operations organizations including Combatant Commanders. This training includes scripting all events in exercises and includes evaluations as part of the Joint Exercise Control Group. Our support includes areas at National level guidance to combats organizations, from initial crisis to first troops on the ground. Our SMEs play a critical and crucial role to ensure our special operations military forces are available to deploy at a moments notice. Our special operations forces staff specialist and educators provide expert guidance on operations and intelligence integration.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 80 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details N Company Name: NetSecurity Corporation S S Website URL: netsecurity.com Mailing Address: 22375 Broderick Drive, Suite 210 Attach a cover page to your application that inlcudes: Dulles, VA 20166 My company is an SBA 8(a) certified small business: Yes No Date Certified: 9/21/2011

Primary Point of Contact Name: Innocent "Inno" Eroraha Title: President Organization: NetSecurity Corporation Email: [email protected] Phone: 703-444-9009

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? USMC MCCS, IMLS, FDIC

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington, DC Metro; Virginia Beach, Indiana

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 81 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

ThreatResponder® Platform is an all-in-one threat detection, prevention, response, hunting, intelligence, and analytics platform. The core capabilities of this technology can be customized to solve the most sophisticated cyber challenges. The game-changing ThreatResponder® innovation positions NetSecurity as a leader with the capability to disrupt and neutralize adversarial tools, tactics, and procedures (TTPs) launched by insider threat actors or sophisticated nation-state adversaries.

NetSecurity started the development of ThreatResponder® in January 2015 to solve advanced attacks and data breaches that traditional anti-virus, firewalls, security, and endpoint threat detection and response (EDR) products often miss. ThreatResponder® provides situational awareness and immediate threat visibility into thousands of endpoints, allowing you to respond to and prevent cyber attacks across DoD components around the globe. ThreatResponder® is a cloud-native platform that leverages advanced algorithms that combine machine learning, behavior analytics, and threat intelligence to neutralize attacks and threats that bypass traditional endpoint security technologies. Rooted in the operating system kernel, ThreatResponder® performs various operations to detect, report, prevent, and respond; it can be tailored to perform almost any threat detection and prevention task. Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). As described above, ThreatResponder is a cybersecurity platform for solving the most sophisticated cyber attack launched by nation-state threat actors as well as rogue insider threat actors. The product uses machine learning, behavior-based, and threat intelligence to detect and neutralized the most advanced cyber threats.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 82 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Suvi Global Services Website URL: https://www.akima.com/opcos/suvi/ Mailing Address: 2553 Dulles View Drive Attach a cover page to your application that inlcudes: Herndon, VA 20171 My company is an SBA 8(a) certified small business: Yes No Date Certified: February 2, 2018

Primary Point of Contact Name: Michael Braun Title: President Organization: Suvi Global Services Email: [email protected] Phone: 571-323-5200

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? FBI, USAF, Dept of State,DEA, Defense Counter-Intelligence Security Agency, DIA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis):

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 83 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words). Suvi Global delivers IT services that integrate cybersecurity, information assurance, and risk management into a comprehensive plan and a continuously evolving capability to ensure a superior information security posture for our customers across the Department of Defense and Intelligence Community. We provide system design, development, and implementation; 24/7/365 operations and maintenance support out of our U.S.-based Managed Services’ Security Operations Center (SOC); as well as software development, code conversion, and the integration of commercial-off-the-self products into existing systems. However, our support doesn’t end with just IT services. We also protect the operations of our customers’ critical facilities, including data center design and buildout, infrastructure engineering, physical security, video and telepresence solutions, and “always-on” data center operations.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Today’s foreign adversaries and threat actors have increasingly sophisticated capabilities and are employing them in new ways to target the United States. As a trusted 8(a) company, Suvi is uniquely positioned to help advance the national security mission. Our comprehensive IT and facility operations solutions protect our nation’s critical infrastructure, and our subject matter experts—many of whom have recognized experience across the IC—are heavily involved in countering foreign intelligence cyber and technical operations. We have also developed a secure Managed Services environment that allows us to tailor our capabilities to solve even the most complex IT requirements and extend our management capability to the complete enterprise. In short: Suvi’s integrated services enable our customers to optimize technology investments; integrate the latest advances in cybersecurity; ensure the veracity and security of data; and—most importantly—position themselves to consistently achieve superior mission outcomes.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 84 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: ZRS Solutions, LLC Website URL: www.ZealRiver.com Mailing Address: 250 Commerce Str STE 9 FL 3 Attach a cover page to your application that inlcudes: Montgomery, AL 36104 My company is an SBA 8(a) certified small business: Yes No Date Certified: 11/18/2018

Primary Point of Contact Name: Cheryl Brown Title: Managing Partner Organization: ZRS Solutions, LLC Email: [email protected] Phone: 334-221-4567

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? 42 CONS 2FSS/FSDE Barksdale AFB, LA; AFMC AFLCMC/HNII Maxwell-Gunter Annex, AL

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Bossier City, LA and Maxwell-Gunter AFB Annex, and Virginia Beach, VA.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 85 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Given the cross-cutting nature of a number of critical national security issues, ZRS Solutions leverages emerging technologies in support of the Department of Defense. ZRS Solutions has the most important characteristic for emerging technology development which are small, focused teams dedicated to solving specific critical issues.

ZRS Solutions brings critical capabilities and expertise in Cybersecurity, Cloud Migration, Robotic Process Automation and Artificial Intelligence. We have succeeded through innovation efforts by thinking big, starting small, and acting fast.

By understanding the need for more partnerships and collaborative environments to share worldwide emerging technology trends, we address competitive threats, share national security concerns, and consider civil liberties, privacy, and ethical implications. Forming this strategic partnership, we have provided greater military agility, responsiveness, and electronic warfare.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

With the significant advances in Information Technology of the last half century, there is an increasingly perceived vision that computing will one day be essential to meet the everyday needs of the general population. ZRS Solutions has provided state of the art mitigation techniques in the emerging technology platform. We provide state-of-the-art expertise and services to prevent new attack patterns in emerging technologies such as cloud computing and critical infrastructure. ZRS Solutions seemlessly utilizes Robotic Process Automation while utilizing existing user application interfaces to automate human repetitive tasks, thus freeing employees to do more important work and engage with customers. We have also provided expertise in support of Artificial Intelligence in the Information Technology sector. By advancing the use of computer-based training and algorithms, AI and machine learning which have benefited the mission by creating system capable of providing solutions. This allows ZRS to utilize our resources more effectively, making service delivery faster, cheaper, and more effective.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 86 DATA SCIENCE & DATA ANALYTICS

2021 8(a) National Security Showcase

#8a SHOWCASE The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details N Company Name: Bestica Inc S S Website URL: https://bestica.com/ Mailing Address: 3463 Magic Drive, Suit 303, San Antonio, TX 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 03/02/2012

Primary Point of Contact Name: Sean A. Ryan Title: VP of Federal Business Development Organization: Bestica Email: [email protected] Phone: 210-279-6002

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NSA NIOC

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, Texas

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 88 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Bestica is partnered with multiple Cloud Service Providers (CSP) and heavily involved in the Health Industry indications and warning mission space most recently with an IARPA submission on COVID 19 tracking and visualization needs. W are taking an innovative approach to solving predictive and trend analysis by creating a cloud enabled tenancy that can enhance indications and warning to unique problem sets like pandemic forecasting, economic trends, and changes to environment from a global perspective. We are vendor agnostic company, so we can provide assessments of the best of breed from commercially viable technologies to solve these gaps. As determined by government need and classification of data, we will work with our teammates to create a DevSecOps (DSO) environment that can leverage precision geolocations tools, high performance AI/ML analytics, and decades for SME talent to address mission gaps such as: Best of breed CSP looking at security, scalability, and costs Newest commercially viable high performance analytic tools using ML and AI technology New ways to look at anticipatory Business Intelligence and trend analysis

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

In our humble opinion, many companies have overcomplicated solutions to the government with proprietary solutions that look good at the beginning but quickly become unstainable from a cost perspective. Our approach to improving I&W for pandemics is to use open standards technologies for cloud, analytics, and secondary production that avoids vendor lock down and proprietary concerns. We've seen from the recent SolarWinds cyber breach that companies need to take into consideration cyber security, third party vendors, and access to the internet drowning with vicious malware waiting to exploit and potentially hold hostage user's data, Hence, the key to our approach is the DSO environment thus allowing us to bring in commercially viable emerging technologies to be tested against SMEs with decades of experience across the Homeland Security, Law Enforcement, DoD, the IC, and the Federal Interagency. We have teamed with some of the most innovative leaders on AI/ML tools. We can demo new ways in a post-COVID-19 19 world to create anticipatory intelligence/predictive intelligence and new product lines to help inform first responders and senior-level decision-makers. We would leverage trials from C2E awardees to host our DSO environment.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 89 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details N Company Name: BluePath Labs S S Website URL: https://www.bluepathlabs.com/ Mailing Address: 2101 L St. NW Suite 800 Washington DC 20037 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 12/19/2016

Primary Point of Contact Name: Dominic Ju Title: Principal & Co-founder Organization: BluePath Labs Email: [email protected] Phone: 617-475-0118

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DOE, DHS, DOJ, DC DPW, DC SEU, DoD, DTRA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): D.C. National Capital Region (NCR), Houston

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 90 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Technology: BluePath (BPL) developed an innovative analytic approach combining natural language processing, neural networks, clustering, and graph theory to identify and analyze emerging technologies out of hundreds of thousands of research publications. BPL incorporated these techniques into a web application meant to give management, bench scientists, product managers, and other users the ability to rapidly ingest millions of documents (articles, patents, reports, grants, news, etc.) and conduct many different types of analysis. This technology, Bluescout, is an order of magnitude improvement on traditional approaches to data queries. BlueScout was designed with usability at its core and allows users to drill down to better understand institutions, researchers, countries, collaborations, funding, etc). Service: BPL has a team of fluent Mandarin language speaking research analysts conducting open source intelligence analysis on the Chinese People's Liberation Army (PLA). BPL's China team regularly produces intelligence reports on the PLA which circulate around the DOD and intelligence community. A recent report on China Military-civil fusion was a key input for the Pentagon's 2020 China strategy. BPL's reports span relevant military, science, and technical domains.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Technology: BlueScout applies the power of Artificial Intelligence and Machine Learning to emerging technologies such as Natural Language Processing and Semantic Embedding. The result is a high-powered tool capable of rapidly analyzing millions of data points and producing insights directly applicable to national security. For any given area (ie. hypersonics, directed energy, human performance, AI), BlueScout can present both textual and graphical information answering questions such as: What are the most rapidly emerging technologies with national security implications? Who are the leading researchers? Which countries are investing in a given technology? Where are there opportunities for collaboration? How does USG or US institutions compare to our competitors/allies in a given domain? Through the application of Artificial Intelligence/Machine Learning principles, BlueScout far exceeds traditional technology scouting/horizon scanning approaches. Service: China is a key strategic priority for U.S. national security. BPL is building a tailored Mandarin language translation engine focused on PLA military, science, research and technology terms. BPL also built an unclassified private research portal for invited guests to conduct research on Mandarin language primary sources across the USG.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 91 Blue Sky INSA Application

The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details N Company Name: Blue Sky Innovative Solutions, LLC S S Website URL: www.bsis-llc.com Mailing Address: 1025 Connecticut Avenue, Suite 1000 Attach a cover page to your application that inlcudes: Washington, DC 20036 My company is an SBA 8(a) certified small business:  Yes No Date Certified: 9/10/2019

Primary Point of Contact Name: Melissa Peterson Title: CEO Organization: Blue Sky Innovative Solutions, LLC Email: [email protected] Phone: 703-489-3191

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a:  Prime  Subcontractor Other If permitted, which agencies/primes did you support? We have prime contracts at DIA, DISA, FDA, NIH, VA, and WHS. We support a number of strategic partners.

If applicable, identify classified level:  TS/SCI  TS  S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Austin, Colorado Springs, DC Metro, Denver, St. Louis

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 92 Blue Sky INSA Application

Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Blue Sky proposes to focus on showcasing our data science capabilities, which have been demonstrated successfully in several client settings within the Intelligence Community and Department of Defense. We will discuss our approach (and the benefits thereto) to developing and delivering data ingest, conditioning, and management capabilities using a micro-service-based architecture in support of various intelligence activities. We develop services that manage data across multiple networks and classification levels at both periodic and near-real-time speeds, representing the information according to “need to know” principles at each level. We enable integration of next generation user interfaces, operational pictures, and data transport. Our approach incorporates authorization and accreditation in cloud computing environments (Repository as a Service, RaaS) and is managed in alignment with industry best management practices and agile methodology.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Our approach supports the Intelligence Community transformation to deliver capabilities at the “speed of mission.” Our services support Command & Control (C2) functionality, system status and metrics, and data product operations at scale. Our architecture, systems engineering, and software engineering capabilities support the management of data across multiple networks and classification levels. Additionally, our innovative Resource Description Framework (RDF) based approach to data modeling speeds access to data dramatically and significantly lowers medium and long-term costs.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 93 Blue Sky INSA Presenters’ Biographical Information

Melissa Peterson, CEO Melissa Peterson has over 20 years of experience leading organizations, providing thought leadership, and assisting public and private sector clients with developing business and information technology solutions to complex challenges. As the Founder and CEO of Blue Sky Innovative Solutions (Blue Sky), Ms. Peterson draws upon her many years of experience to work with clients to create high impact data analytics, cyber security, and end-to-end business solutions. In previous leadership positions with Fortune 100 companies, Ms. Peterson led teams in furthering agency goals across the Department of Defense and Intelligence Community. Ms. Peterson holds an MBA and a JD from Columbia University and a Bachelor of Science in Finance from the University of Pennsylvania Wharton School.

Elton Stokes, Chief Technology Officer Elton Stokes has 20+ years of IT implementation and leadership experience in the public and private sector. Much of Mr. Stokes’ career has been spent architecting enterprise applications, data fusion and analytics platforms, and implementing data governance and metadata management strategies for Fortune 500 organizations and government agencies across North America. Mr. Stokes has deep experience leading large technical teams charged with carrying out complex initiatives including application modernization and migration, data accountability and transparency, and organizational change management among others. In his role as the Blue Sky CTO, Mr. Stokes assembles and advises high-performance project teams that provide world- class thought leadership and technical innovation to solve our clients most complex challenges. Mr. Stokes holds a Bachelor of Science degree in Information Systems Management from University of Maryland Global Campus and is a Certified Scrum Master.

This response includes data that shall not be disclosed outside the Government and shall not be duplicated, Page 2 used, or disclosed – in whole or in part – for any purpose other than to evaluate this response.

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 94 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: BreakForth Solutions Incorporated (BSi) Website URL: www.BreakForthSolutions.com Mailing Address: 1818 libriary Street Ste #500 Attach a cover page to your application that inlcudes: Reston, VA 20190 My company is an SBA 8(a) certified small business: Yes No Date Certified: April 1, 2016

Primary Point of Contact Name: Samuel E. Massenberg Jr. Title: Chief Operations Executive Organization: BreakForth Solutions, Inc. Email: [email protected] Phone: 703-468-2221 ext. 705

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Department of Justice, Health and Human Services, THE AGENCY (IC)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington, DC, Rockville, Maryland, Virginia

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 95 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Through our Altair Data Analytics Platform, BSi's technology spots anomalies, trends, clusters, and outliers in massive amounts of real-time and time-series data. Using Altair’s Panopticon application, we can support real-time data prep, calculations, data aggregation, and alerting while delivering graphs or customized dashboards across teams and agencies using rich, powerful visualizations. BSi integrates Rosoka natural language processing (NLP) technologies that identifies people, places, organizations, and other 'things of interest' in over 200 languages. Users can “Backtest” in the platform to analyze how alternative scenarios will affect end-goals using historical data. Our solution is innovative in that it derives “information” from near real-time data streams using heuristic analytics and modeled activities, allowing users to immediately visualize and interact with results intuitively and in a reactive way. We intend to showcase that simultaneously, prioritized results are alerted directly to next-level analysts and/or decision-makers based on stakeholder thresholds and accepted Courses of Action.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

BSi's solution advances the nation's security mission by leveraging technologies in the areas of real-time stream processing, data visualization, and natural language processing. Today's national security environment faces rapidly arriving, voluminous datasets containing valuable, often non-obviously associated, data from which we can draw immediate insights. Community holdings are vast and historical, supporting full-scale analytics and on-demand searches. Typically results are delivered in tabular or other inefficient forms that burden the user to interact cognitively to find information (slower and repetitive activities). To support mission focus areas, BSi leverages Altair's Panopticon application to support real-time data prep, calculations, data aggregation, and alerting, while delivering graphs or customized dashboards across teams and agencies using rich, powerful visualizations. We also use Rosoka which uses NLP technologies and a hybrid-solution for entity extraction, combining both 'rules-based’ and 'machine-learning’ approaches backed by a quantum mathematical model to implement novel multidimensional transient state vector machine logic.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 96 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: BrightPoint, LLC Website URL: http://www.thebrightpoint.com Mailing Address: 8280 Willow Oaks Corporate Drive, Suite 600 Attach a cover page to your application that inlcudes: Fairfax, VA 22031 My company is an SBA 8(a) certified small business: Yes No Date Certified: 7/30/2018

Primary Point of Contact Name: Nicholas Nguyen Title: Manager Organization: BrightPoint, LLC Email: [email protected] Phone: (571) 408-1010

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? FBI, DOJ, NOAA

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): DC, VA, MD, ID

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 97 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

As an agile and innovative systems integrator, BrightPoint has extensive experience designing, developing, and deploying emerging technologies to support national security mission and use cases. Our company has successfully supported mission critical programs for agencies such as FBI, DOJ, Department of Defense, Department of State, and the Intelligence Community. For this event, we would like to showcase three use cases involving AI/ML enabling the warfighter/operator to better carry out the national security mission. First, we like to showcase robotic process automation (RPA) use cases to automate manual operational processes. Second, we like to demonstrate a cloud based AI/ML prototype we developed that employs computer vision, text analytics, and advanced biometrics to identify high value targets/actors. Lastly, we like to demonstrate an advanced data analytics platform capable of ingesting very large datasets (i.e. MASINT, OSINT, etc), applying machine learning algorithms to detect anomalies, and visualizing predictive results for intelligence analysts.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

National security security agencies agencies have have large large datasets datasets that their that operators/analysts their operators/analysts need to needquery toquickly query to quickly find that to find“needle that in "needle a haystack”. in a haystack". Without the Without right technologies the right technologies and tools, this and tasks tools, is daunting, this tasks takes is countless daunting, man- takes hours, and often critical information is missed or overlooked. We’re now in a state where the volume of data countless man-hours, and often critical information is missed or overlooked. We're now in a state cannot be analyzed manually and we must rely on AI/ML to analyze the data. We believe our expertise in AI/ whereML technology the volume and our of data understanding cannot be of analyzed national security manually use and cases we make must BrightPoint rely on AI/ML a value to analyzepartner for the the data.Intelligence We believe Community. our expertise In addition, inAI/ML we believe technology the AI/ML and tools our our understanding team is capable of nationalof developing security has usebroad casesapplications make in BrightPoint the national asecurity value mission partner space. for the For Intelligence example, we Community. developed Inan addition,AI/ML prototype we believe capable the AI/MLof ingesting tools text our in team any language, is capable translated of developing to English has in broad near applicationsreal time, and inperformed the national text securityanalytics missionto derive keywords and sentiment of the article. Using this tool, operators can quickly search keywords and identify space. For example, we developed an AI/ML prototype capable of ingesting text in any language, content and themes regardless of the language. translated to English in near real time, and performed text analytics to derive keywords and sentiment of the article. Using this tool, operators can quickly search keywords and identify content and themes regardless of the language. Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable.

Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission.

Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 98 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Cinteot Website URL: www.cinteot.com Mailing Address: 77 North Third St. Suite 101 Attach a cover page to your application that inlcudes: Chambersburg, PA 17201 My company is an SBA 8(a) certified small business: Yes No Date Certified: 02/2016

Primary Point of Contact Name: David Kachmar Title: Director Organization: Cinteot Email: [email protected] Phone: 717.961.0511

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DISA, IC, DoL, DoS, DCSA, Air Force, Army NETCOM

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Ogden, UT; Oklahoma City, OK; Montgomery, AL; NCR; Mechanicsburg, PA; Ft. Meade, MD; Stuttgart; Aviano AFB, Colorado Springs, CO; Fairfield, CA; Sierra Vista, AZ; Columbus, OH; Chicago, IL; Boston, MA;

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 99 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

We've delivered Peta-scale products for DISA, data science applications for the Dept of State Consular affairs to evaluate VISA applicants, and directly secured the enterprise networks of the Secretary of Defense. We currently conduct Command Cyber Readiness Inspections and Command Cyber Operational Readiness Inspections for JFHQ DoDIN at sites CONUS and OCONUS. We support JFHQ DoDIN's Defensive Cyber Operations (DCO) - Internal Defense Mechanism (IDM) division. We develop software for BOBCAT, GRFN, TUMBLEMONKEY, and P704.

A lot of small companies say they do Cyber and Big Data. We actually develop Peta-scale data analytics tools and secure the networks of the SecDef. We know cutting edge Cyber in threat-rich, high paced, and politically complex environments.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). We developed CMRS(continous monitoring and risk scoring), a system which ingests data from cyber sensors across the Defense Information Infrastructure. It ingests petabytes of data to conduct analysis, unit and executive level dashboarding of Cyber Vulnerability data.

Our personnel implemented the zero-trust model into the SecDef's enterprise networks and it's connected domains. We also re-engineered the security architecture to provide cutting edge IDS/IPS signature analysis for the SecDef's networks.

Cinteot secures some of our nation's most critical infrastructure with bleeding edge technology and techniques.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 100 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Def-Logix, Inc. Website URL: https://def-logix.com/ Mailing Address: 3463 Magic Dr. Suite 220 San Antonio, TX, 78229 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 5/14/2016

Primary Point of Contact Name: Paul A. Rivera Title: CEO / President Organization: Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, USAF, DISA, DARPA, Mantech, Global Info Teck, Raytheon, General Dynamics

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Antonio, D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 101 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Not all attacks can be detected at an endpoint. Some become visible only in network traffic patterns. The Automated Network Security Situational Awareness (ANSSA) Solution is an interactive, network visualization tool that determines the optimal nodes for sensor placement. RM determines the optimal path for covert host to host data routing by ingesting network topology and node characteristic data, producing a network map from various connection logs, and calculating optimal sensor placement or an optimized strategy for covert lateral (east-west) transmission of data within a network. This gives cyber operators an innovative solution that leverages applied mathematics and machine learning for network security situational awareness (NSSA). This will increase capabilities for monitoring and response, vulnerability management, digital forensics, malware management, insider threat detection, or cyber-threat intelligence (CTI).

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

RM addresses the national security mission with its focus in Network Security Situational Awareness (NSSA) for cybersecurity operations. Operators face challenges manually identifying optimal nodes for sensor placement that maximize coverage and minimize resources in complex networks for east-west traffic. Complex networks make manual determination of optimal path for covert host to host data traversal time consuming and subject to human error. ANSSA enhances Defensive Cyber Operations (DCO) and Offensive Cyber Operations (OCO), as part of this process incorrectly configured systems and services, unauthorized systems and services, and malicious activity will be identified. ANSSA includes two advanced mathematical algorithms to determine optimal nodes for sensor placement in a network and identifies optimal path for covert host to host data routing.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 102 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Echelon Xcelerate JV, LLC (EXJV) Website URL: https://www.echelongov.com/ Mailing Address: 9720 Capital Ct, Suite 201 Attach a cover page to your application that inlcudes: Manassas, VA 20110 My company is an SBA 8(a) certified small business: Yes No Date Certified: 1 March 2021

Primary Point of Contact Name: Greg Kern Title: President Organization: Echelon Xcelerate JV, LLC Email: [email protected] Phone: 571-368-4567 ext 2002

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? FBI, DCSA, Department of the Navy, Department of State, Housing and Urban Development,

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): D.C.; Fairfield, CA; Somalia; Langley AFB, Hampton, VA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 103 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Identity verification service is a critical requirement in today's complex environment, particularly given the prevalence of identity theft, the growing trend of fake or synthetic identities, the practice of hiring personnel sight unseen, the virtual working environment, and zero tolerance for errors while performing sensitive and demanding missions. Every individual has multiple personas, credentials, devices, and locations and EXJV's innovative technology and data powered by LexisNexis delivers it all into a comprehensive global identity solution.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Trust but verify is a foundation of everything we do within the National Security Community. Verifying identifies has become increasingly difficult in a digital world where traditional identifiers such as name, DOB and SSN are no longer sufficient to accurately identify an individual. New digital identity attributes now accurately identify a person, encompassing the portable devices they use, IP, e-mail addresses, handles, telephone numbers, and geolocation which show crucial connections to other global actors and entities (good and bad). The ThreatMetrix Digital Identity Network captures billions of global e-commerce transactions to perform digital identity verification, plus assesses the risk of an individual. An individual may check e-mails from a mobile phone or check Facebook, buy an airline ticket, pay bills, or purchase clothing on-line from a laptop. These transactions are collected, consisting of over 6 petabytes of data, and provide digital identity verification to meet a customer's most demanding needs.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 104 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Fantom Corporation Website URL: www.fantomcorp.com Mailing Address: 2714 Hatmark St. Attach a cover page to your application that inlcudes: Vienna, VA My company is an SBA 8(a) certified small business: Yes No Date Certified: March 13, 2021

Primary Point of Contact Name: Allen Fant Title: President Organization: Corporate Email: [email protected] Phone: 703-772-1665

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Customer: Intelligence Community / Primes: GDIT, SAP/NS2, Perspecta, BAE Systems, Leidos, Raytheon, ManTech

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Northern Virginia

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 105 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Fantom Corp believes in leaning forward to help create and support the innovations of future development needed in the Intelligence Community. We provide many IT services that take an analytical approach to solving a wide range of the most complex data challenges, including COTS and GOTS software development. Our work with state-of-the-art Extract, Transform and Load (ETL) pipelines allow us to prepare for analysis of large, disparate datasets. Using a combination of our semantic analysis tools and a Natural Language Tool Kit (NLTK) we have created a demonstration that analyzes texts and predicts potential outbreaks of stochastic terrorism. Our approach to Cyber Security is both proactive and comprehensive, which is crucial to maintaining the security of valuable data mined. We have a proven track record in Artificial Intelligence/ Machine Learning with a focus on identifying trends, detecting patterns, and classifying structured and unstructured data.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Fantom Corp continually usesindependent research/development initiatives with national security applications in mind. Our talented team researches and develops sentiment analysis tools that preemptively identify potential actors of disinformation and indicators of terrorist activity. Furthermore, this predictive analytic tool can detect, analyze, and counter threats by identifying manipulation of social media and malign influence originating from state and non-state influencers. Our Software Engineers and Architects create and implement short turn-around solutions for the Intelligence Community, resulting in actionable intelligence products for immediate solutions to urgent needs. IT leaders provide analytics tools enabling customers to quickly identify trends and glean valuable findings from structured and unstructured data. We use industry best practices for continuous improvement to streamline processes to create products that exceed our customers’ operational goals and expectations. We are committed to a more informed, deliberate, and coordinated approach in developing and deploying emerging technologies and establishing effective partnerships.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 106 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: IT Concepts, Inc. Website URL: www.useitc.com Mailing Address: 1600 Spring Hill Rd Suite 305 Vienna, VA 22182 Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 05/04/2016

Primary Point of Contact Name: Benjamin Peden Title: Director Organization: IT Concepts, Inc. Email: [email protected] Phone: (757) 301-5520

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Defense Intelligence Agency (DIA); National Geospatial-intelligence Agency (NGA);

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Primarily National Capitol Region (Washington DC, VA, MD);

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 107 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

HiveMind is ITC’s custom serverless cloud high-performance computing (HPC) solution ITC developed for the Intelligence Community (IC). Existing capabilities of HiveMind provide the capacity to obtain, store, and process large quantities of data at scale with HPC architectures through Amazon Web Services (AWS). The serverless design of HiveMind allows for optimized model deployment, as the resources required to launch analytical and ML models are only allocated for the time that computation is performed. The benefit to the IC is scalable computing costs for mission critical programs that operate on constrained budgets or support smaller offices with limited resources and expertise. HiveMind creates a framework designed to adapt to many types of data and analysis workloads.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

HiveMind’s primary benefit reduces the complexity of current HPC architectures into two simple components: inputs and models. With current HPC architectures, so much time and money are needed to identify and configure all the different components that budgets, and timelines can’t accommodate everything. As the volume of data continues to grow for every business and every agency, these problems are only being exacerbated, preventing teams from fully analyzing their data. HiveMind, with its flexible infrastructure, can more rapidly adjust to different problem sets. With many companies and agencies already hosting data in S3, everything needed for the HPC is already collocated. The only major lift required is to produce the model to run against their datasets. The reduced time to produce results means that more analysis can occur across greater volumes of data. This prevents critical information from slipping through the cracks and paves the path to for innovation.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 108 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: JCTM LLC Website URL: https://www.jctm.us Mailing Address: 16710 Tulloch Road Attach a cover page to your application that inlcudes: Charlotte, NC 28278 My company is an SBA 8(a) certified small business: Yes No Date Certified: March 2020

Primary Point of Contact Name: Jay Eickhoff Title: Program Manager Organization: JCTM LLC Email: [email protected] Phone: 858-361-7393

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? USMC (8a Prime); USMC (subcontract to ManTech), USMC (Subcontract to FGS), USMC (Subcontract to Parsons)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington DC, Pentagon, Quantico VA, Camp Lejeune NC, Camp Pendleton CA, Okinowa Japan

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 109 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 110 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: JCTM LLC Website URL: https://www.jctm.us Mailing Address: 16710 Tulloch Road Attach a cover page to your application that inlcudes: Charlotte, NC 28278 My company is an SBA 8(a) certified small business: Yes No Date Certified: March 2020

Primary Point of Contact Name: Charles F. McLean III Title: Chief Operating Officer Organization: JCTM LLC Email: [email protected] Phone: 757-941-5470

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? USMC (8a Prime); USMC (subcontract to ManTech), USMC (Subcontract to FGS), USMC (Subcontract to Parsons)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington DC, Pentagon, Quantico VA, Camp Lejeune NC, Camp Pendleton CA, Okinowa Japan

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 111 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

JCTM will present a design and proposed implementation for an “operational case based knowledge graph”. The knowledge graph will exist independently from the 3rd party systems that leverage it, providing a centralized resource for utilizing legacy intellectual capital including past mission planning and execution data to augment real-world operational planning and re-planning recommendations, exercise support, and inform real-time data-driven decision making. The knowledge graph will provide contextualized planning recommendations based on operational, geospatial, temporal, or other contexts relevant to planning and decision making such as objectives and guidance, phase of operations and milestone accomplishments. The knowledge graph will provide a mechanism through which 2nd and 3rd order effects are included in information presented to real-time planners based on context, mission criticality and Commander’s acceptable level of risk.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Built upon the same labeled property graph database technology currently used to develop artificial intelligence algorithms in support of financial crime and fraud detection, predictive maintenance, and suspicious actors / cyber security the operational case based knowledge graph will help planners and operators identify hidden relationships between existing information. This will highlight the differences between correlation and causality and help distinguish between the answers to the questions, “How well am I doing on my plan?” versus “How well is my plan doing?” As the case based knowledge graph expands, the information within the graph can serve as a corpus of appropriately labeled and curated contextualized planning information to support Artificial Intelligence algorithm development in support of real-time planning and re-planning.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 112 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Nyla Technology Solutions Website URL: https://nylatechnologysolutions.com Mailing Address: 6 East Eager Street Attach a cover page to your application that inlcudes: Baltimore, MD 21202 My company is an SBA 8(a) certified small business: Yes No Date Certified: 08 May 2020

Primary Point of Contact Name: Shana Cosgrove Title: CEO Organization: Nyla Technology Services Email: [email protected] Phone: 410-864-6274 Ext. 700

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NSA (prime), Air Force, DISA, JAIC

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Annapolis Junction, MD; Newport News, VA; Tampa, FL

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 113 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Nyla wishes to showcase tailored data science services for the INSA audience, to include practical application of Artificial Intelligence (AI) and Machine Learning (ML). Nyla’s data science experience will be used to inform the audience on how to produce meaningful contributions to national security issues, like the discovery of cyber threats to critical infrastructure and weapons systems, and how to apply layers of data science techniques to produce actionable insights for leaders. We will describe how to innovatively apply modern data science, coupled with outcome-focused engineering, to produce force-multiplying capabilities tailorable to almost any national security mission architecture. Nyla’s solutions and DevOps lifecycle processes have been proven useful in Intelligence Community (IC) and DOD settings for making sense of diverse, voluminous datasets to drive improved national-level decision making and intelligence reporting.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Nyla’s ML DevOps technology advances the national security mission by producing actionable insights through analysis of extremely large data sets. The volume of data relevant to national security missions is increasing at non-linear rates, so Nyla will describe how techniques such as ML can be applied to enable national security mission teams to continue their vital work of making sense of this data at a speed that mitigates risks or minimizes the effectiveness of adversaries’ attacks. Nyla’s approach to ML DevOps satisfies the critical need for explainable and compliant AI and ML for the national security mission. Nyla can discuss how to achieve this through simple but effective techniques, such as peer-review and analytic vetting prior to deployment. Nyla’s mission-tailored reporting on model performance and analytic results is used to drive further analytic refinement, new data hypotheses, and follow-on analytic capabilities such as alerting and auto-generated reporting.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 114 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Pueo Business Solutions LLC Website URL: pueo.com Mailing Address: 301 Lafayette Boulevard Attach a cover page to your application that inlcudes: Fredericksburg, VA 22401 My company is an SBA 8(a) certified small business: Yes No Date Certified: 02/24/2019

Primary Point of Contact Name: Micah Mossman Title: Chief Executive Officer Organization: Pueo Business Solutions LLC Email: [email protected] Phone: 202.425.9724

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? DHS, CBP, NGIC/INSCOM, NRO, DIA, MARFORCYBER, NASIC, AFRL

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): D.C., Northern Virginia, Dayton Ohio, Ft. Meade

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 115 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 116 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: RestonLogic LLC Website URL: https://www.restonlogic.com Mailing Address: 607 Smartts Lane Attach a cover page to your application that inlcudes: Leesburg VA 20176 My company is an SBA 8(a) certified small business:  Yes No Date Certified: 7/25/2020

Primary Point of Contact Name: Madhu Joshi Title: President & CEO Organization: Email: [email protected] Phone: (703) 402-6105

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime  Subcontractor Other If permitted, which agencies/primes did you support? Customs and Border Protection (CBP, a DHS agency)

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Springfield, VA

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 117 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

RestonLogic team has developed an innovative solution to classify, extract, transform and import unstructured data from thousands of documents into a structured data warehouse. The solution extracts data from PDF forms, handwritten notes, and audio files. These artifacts are often difficult to analyze, catalog, search, and correlate for large agencies. Our custom Machine Learning models brings out the hidden institutional knowledge in these artifacts and make them usable.

A second feature of this innovative project involves using blockchain solutions to address national security concerns such as food safety. Thousands of sensors spread across the globe ensures food products destined to USA are inspected, tagged and the chain of custody is maintained. Our task is to ingest and process data from these smart-devices and sensors running blockchain apps, cross-reference with bill of lading, invoices, packing materials to find anomalies, generate reports so field officers can enforce trade policies.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

RestonLogicRestonLogic has has been been instrumental instrumental in usingin using emerging emerging technologies technologies like data like lakes, data blockchain,lakes, blockchain, AI/ML, IoT AI/ML, sensors for theIoT Office sensors of Tradefor the at OfficeCBP. These of Trade efforts at includeCBP. These ingesting efforts real-time include streaming ingesting data real-time from thousands streaming of blockchaindata from sensors,thousands extracting of blockchain trade data sensors, using advancedextracting AI/ML trade models data using from documents advanced suchAI/ML as models invoices from and billdocuments of such as ladinginvoices then and making bill of it availablelading then for analysis;making itimplement available market for analysis; intelligence implement tools; sanitize, market andintelligence connect existing tools; sanitize,data sources,and connect and visualization existing data tools. sources, and visualization tools. These efforts form the basis of a massive data platform called ATAP (Advanced Trade Analytics Platform). TheseATAP effortsis designed form the to basisprovide of a three massive capabilities: data platform called ATAP (Advanced Trade Analytics Platform). ATAP is designed to provide three capabilities: – Perform advanced analytics against trade-related data, including descriptive, diagnostic, predictive, and - Performprescriptive advanced analytics analytics at bothagainst a tacticaltrade-related and strategic data, including level. descriptive, diagnostic, predictive, and prescriptive analytics– Provide at botha unified a tactical case and management strategic level. system that includes workflow capabilities and cross-organizational visibility and collaboration tools. - Provide a unified case management system that includes workflow capabilities and cross-organizational visibility and – Provide a unified case management system that includes workflow capabilities and cross-organizational collaboration tools. Presenter(s)visibility and Biographical collaboration tools.Information

-With Provide this a application, unified case managementplease include system a professional that includes CVworkflow (no mor capabilitiese than oneand cross-organizationalpage) of the main visibilitypresenter and collaborationand a co-presenter, tools. if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 118 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: Secure Innovate Technology Corp Website URL: http://www.secureintech.com Mailing Address: 43385 Barnstead Dr Attach a cover page to your application that inlcudes: Ashburn VA 20148 My company is an SBA 8(a) certified small business: Yes No Date Certified: 1/31/2021

Primary Point of Contact Name: Dr. Iqbal Amiri Title: Founder and Managing Partner Organization: EDWOSB 8(a) Minority Certified SDB Email: [email protected] Phone: 703.300.8358

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? State Dept, USAid, DoD Intelligence, NavSea, DoE, DoL

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): DC, Virginia

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 119 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

We would like to present an overview of the lifecycle of data through ingestion, curation, visualization, predictive analytics and machine learning supervised. Our organization focuses on cloud and advance analytics solutions for our customers with innovative and cutting edge solutions. These two specific areas go hand in hand as the data collected and curated could live in either on prem hardware or on the cloud. Therefore we would like to provide a complete solution for both of these areas.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). We can ingest data from various disparate sources and store in data warehouse and or data lakes where we can utilize ETL processes for storing and transforming this data. These specific silos of data reside all accross the globe and to have the data centralized for visualizations including dashboards for real time national security based decision becomes very critical. We also combine with entity resolution to help national security players focus on interested parties and assets. Through machine learning and supervised learning we can provide a predictive analytical answer for some of the toughest questions. Our founder Dr. Amiri, has a PhD in Advance Analytics and has been Chairman of Advance Analytics and Quantum Computing which helps clients making the best decision and helping the country.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 120 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Square Peg Technologies Website URL: www.squarepegtech.com Mailing Address: 80 M ST SE Attach a cover page to your application that inlcudes: Washington, DC 20003 My company is an SBA 8(a) certified small business: Yes No Date Certified: 07/23/2020

Primary Point of Contact Name: Jacquay Henderson Title: President and CEO Organization: Square Peg Technologies Email: [email protected] Phone: 202-341-4707

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Intel Community/DOD - Booz Allen Hamilton, GDIT, SAIC, Raytheon, Ernst & Young, Tableau and DataRobot

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington Metropolition Region and Scott AFB, IL

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 121 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Square Peg Technologies was founded to support the National Security sector and we take pride in delivering high quality services that enable intelligence and defense missions. Our employee centric company culture is unique in that we fully understand the requirements needed to maintain a skilled workforce of employees that possess high level security clearances while still driving innovation.

We wish to showcase our comprehensive suite of solutions transforming data into information assets and low code software deployment technologies. With a focus on improving data exploration initiatives and optimizing the data science lifecycle, our solutions are engineered to improve data governance efforts, enhance data analytic maturity and increase artificial intelligence (AI) return on investment. In addition, our low code software deployment capabilities use best in class software platforms and stringent Lean Agile methodologies to ship code faster, be more responsive to end users needs and mitigate security risks.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

Square Peg Technologies has advanced the National Security sector by providing services within mission environments that enable intelligence data clarity, efficiency and return on investment. Problem: Lack of understanding of the utility and value streams of intelligence products Solution: Data analytic roadmap which included a data governance program, integrating an enterprise analytic tool, comprehensive analysis of FININTEL and OSINT products using analytics and machine learning models. Problem: Lengthy process to transition 40 applications off legacy software architecture that support intelligence operations and mission enablement. Solution: Digital transformation roadmap which included application transition plan, low code platform development to transition applications, cloud migration, and security planning. Problem: Limited AI/ML initiatives and resources Solution: AI center of excellence for intelligence analysis which includes AI/ML training plans, tools selection and use case identification framework, and integration of a best in class AutoML platform for enterprise usage.

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 122 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: TDX International, LLC Website URL: www.tdxcorp.com Mailing Address: 3601 C Street, Suite 1000, Anchorage, Alaska Attach a cover page to your application that inlcudes:

My company is an SBA 8(a) certified small business: Yes No Date Certified: 4/30/2020

Primary Point of Contact Name: Ken Spedden Title: General Manager Organization: TDX Internaional LLC Email: [email protected] Phone: 202) 322-7612

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): CONUS

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 123 BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 124 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Tigua-JTEK Website URL: jtekds.com Mailing Address: 9180 Socorro Road Attach a cover page to your application that inlcudes: Ysleta del Sur Pueblo, TX 79907 My company is an SBA 8(a) certified small business: Yes No Date Certified: 8-13-2020

Primary Point of Contact Name: Jim Hathaway Title: Principal Organization: Tigua-JTEK Email: [email protected] Phone: (215) 287-8285

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? Department of Treasury - IAF,

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington D.C.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 125 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Title: Turning Documents into Data: Solving the Unstructured Content Challenge with Indico and Robotic Processing Automation (RPA). Abstract: Unstructured data - the millions of documents, emails, and images that flow through every major government agency, represent the largest collection of un-leveraged data in existence. The current approaches of OCR, forms, rules and templates cannot solve this challenge at scale. This solution is on the forefront of innovation in Enterprise AI with a deep learning technique known as Transfer Learning, an approach perfectly suited to the challenges of unstructured content. In this session, you will learn how the integration between Indico and current RPA platforms (UiPath, Automation Anywhere, Microsoft, Blue Prism) allows your users to quickly and easily build custom machine learning models with just 200 samples, creating scalable solutions to the classification, extraction and transformation of your document-based information while taking full advantage of your existing RPA investment.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

The national national security security mission mission involves involves conversion conversion of data of into data actionable into actionable intelligence. intelligence. By some By estimates some estimatesunstructured unstructured data – text, documents, data – text, emails, documents, images emails,– make imagesup as much – make as 80% up of as the much content as 80%within of the the contententerprise. within Many the organizations enterprise. have Many begun organizations embracing havethe automation begun embracing imperative the with automation RPA and deploying imperative bots, but to date most solutions only focus on structured data. Tigua-JTEK has experience deploying with RPA and deploying bots, but to date most solutions only focus on structured data. Tigua-JTEK RPA bots, and have found Indico’s unique and powerful technology innovation to be the perfect answer hasto this experience unstructured deploying data problem. RPA bots,The main and purpose have found of Intelligent Indico’s Process unique Automation and powerful (IPA) technology is to enable innovationorganizations to to be automate the perfect processes answer that to involve this unstructured unstructured data content, problem. including The text main and purpose images. of It Intelligentdoes Processso without Automation requiring rule-based (IPA) is todecision-making enable organizations or huge training to automate data sets processes that are out that of involve reach for unstructured 95% of content,enterprises. including Tigua-JTEK text has and seen images. customers It does capture so without huge improvements requiring rule-based quickly and decision-making easily, enabling or them huge to turn process into improved mission outcomes. training data sets that are out of reach for 95% of enterprises. Tigua-JTEK has seen customers capture huge improvements quickly and easily, enabling them to turn process into improved mission outcomes. Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable.

Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission.

Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 126 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary.

Company Details Company Name: VG IT Services, Inc. Website URL: www.vgitservices.com Mailing Address: 448 Islebay Dr Attach a cover page to your application that inlcudes: Apollo Beach FL 33572 My company is an SBA 8(a) certified small business: Yes No Date Certified: June 2017

Primary Point of Contact Name: Shalini Gali Title: CEO Organization: Email: [email protected] Phone: 7037329076

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Washington DC

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 127 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

VGIT Services, Inc.(VGIT) is an 8(a) certified, EDWOSB. Winner of the 20.3 Air Force SBIR Award on a topic 'Agile Code as a Service for Airmen'. VGIT is an innovator in the transition from legacy systems to contemporary cloud-based technologies and standard architectures. We can quickly transform the traditional hand-coded legacy applications into a modernized, cloud-based, no-code applications. Within the federal space, we have implemented several large scale financial web-based and cyber-secure solutions. We use state of the art development tools and methodologies, to help reduce cost, improve performance, and deliver applications within aggressive timelines. We use innovative solutions that allow us to seamlessly integrate with microservices, internal and external APIs, SOAP and REST Web Services or distributed applications built on a Blockchain platform.

Our mainframe experience includes expertise in IBM COBOL, CICS, JCL, VSAM, ISAM, and MICROFOCUS COBOL and DB2.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

VG IT utilizes code as a service approach with the Graphite Studio platform to build scalable, easy-to deploy, futureproof, mobile-responsive, cloud-basedapplications. By automating the software development, rapidly training subject matter experts in the toolset, and generating industry standard source code, VG IT provides lasting cost-effective solutions. The easy to use platform has been utilized by diverse groups of subject matter experts with no programming experience to develop ground up applications. VG IT uses Graphite Studio as a no-code platform to significantly reduce maintenance costs and allow for agile development. VG IT can deliver secure, rapid, open source, automated software development to the federal agencies saving significant man hours at a fraction of the typical software development costs. VG IT’ s proven approach delivered an updated loan loan portfolio application, Quicksilver, to the U.S.Department of Energy’s Loan Programs Office withhalf the resources, three times faster, and at a 70%savings. The DOE’s Quicksilver system has beenoperational since 2015 with zero security breaches.portfolio application, Quicksilver, to the U.S.Department of Energy’s Loan Programs Office withhalf the resources, three timesPresenter(s) faster, and Biographical at a 70%savings. Information The DOE’s Quicksilver system has beenoperational since 2015 with zero securityWith this breaches. application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable.

Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission.

Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: Wednesday, March 31, 2021

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 128 The Intelligence and National Security Alliance 8(a) National Security

Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Wovenware, Inc. Website URL: www.wovenware.com Mailing Address: 1000 Calle Los Angeles Suite 100 Attach a cover page to your application that inlcudes: San Juan, PR 00909 My company is an SBA 8(a) certified small business: Yes No Date Certified: 04/25/2013

Primary Point of Contact Name: Christian Gonzalez Title: CEO Organization: Wovenware Email: [email protected] Phone: 787-315-1960

Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support?

If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): Location of the contracting experience in the DC Area and St. Louis. Place of performance San Juan, PR and St. Louis, MO.

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 129 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words).

Using AI is all about augmenting human capabilities. GeoCompanion is a "Geoint on the Edge" tool that streamlines the process of producing actionable intelligence and delivering it to the decision makers rapidly. With GeoCompanion, an analyst is now able to run models developed by data scientist within their workflow without having to jump back and forth between a multitude of other datasources.

GeoCompanion is a plugin for Chrome that loads computer vision models and executes those models in satellite imagery apps like Maxar's SecureWatch (Global EGD) and OpenStreetMap. It does the inference on the analyst's device (laptop) saving the round-trip to GPU server and the processing power.

Founded in 2003, Wovenware is an artificial intelligence and software engineering company focused on advanced geospatial and artificial intelligence solutions.

Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words).

With the dramatic technological change that Artificial Intelligence represents, Wovenware can help transform the access to foundational military intelligence. By enabling computer vision models on the edge, the warfighter is able to make sense of information while saving the bandwidth and processing power required to run a model on a GPU datacenter.

Wovenware has worked as a sub with the Department of Defense (DoD), Combatant Commands (COCOMs), National Geospatial Intelligence Agency (NGA), the National Reconnaissance Organization (NRO), Defense Innovation Unit (DIU), and many other organizations around the USG. Our missions include identifying, evaluating, and operationalizing open source and spatially enabled data sources; creating annotated AI/ML training datasets from satellite imagery; building computer vision models to detect hard to see objects, and design workflows to enable the creation of foundational datasets from unclassified content.

Focus Area: Artificial Intelligence/Machine Learning

Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected].

Submission Deadline: 9:00 am ET on Friday, April 9

Questions? Contact us at [email protected]

@INSAlliance www.INSAonline.org

BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 130 ABOUT INSA ABOUT INSF The Intelligence and National The Intelligence and National Security Alliance (INSA) is the Security Foundation (INSF) is a leading nonpartisan, nonprofit 501c (3) nonprofit focused on forum for driving public-private facilitating public discourse on the partnerships to advance intelligence role and value of intelligence for our and national security priorities. national security and advancing the A 501(c)(6) membership intelligence field as a career choice. organization, INSA strives to identify, The Foundation provides programs develop, and promote collaborative and resources that encourage: approaches to national security – Broader public understanding of challenges. INSA has more than 160 the Intelligence Community; organizations in its membership – and enjoys extensive participation Dynamic partnerships among from leaders and senior executives government, industry and in the public, private, and academic academia; and sectors. – Professional development and mentorship for current Learn more at www.INSAonline.org. and aspiring national security professionals

Learn more at www.insaonline.org/foundation. #8a SHOWCASE

@INSALLIANCE