Innovating National Security with AI and Data – Panelist
ATARC ∙
April 2025
The integration of hybrid data systems and artificial intelligence (AI) is revolutionizing national security operations by enabling faster, smarter, and more coordinated responses to emerging threats. Leveraging platforms like Joint All-Domain Command and Control (JADC2) and Advana, this roundtable will explore how these technologies strengthen defense capabilities, enhance collaboration across agencies, and utilize predictive analytics for early threat detection. Federal leaders and technology experts will discuss real-world applications of JADC2 and Advana in national security, alongside challenges such as securing data with zero-trust principles, addressing ethical considerations, and preparing the workforce for an AI-driven future. Participants will identify opportunities to enhance readiness, resilience, and innovation to meet the complex demands of evolving security landscapes. This session aims to foster collaboration and drive actionable strategies for leveraging cutting-edge technologies in defense and security.
Zero Trust Implementation in 2025 – Speaker
GITECH Conference ∙
March 2025
In 2025, zero trust architecture continues to take center stage in federal government cybersecurity strategies, driven by the imperative to protect sensitive data and critical infrastructure from sophisticated threats. Zero trust principles—”never trust, always verify”—are being integrated into agency networks to enhance authentication, enforce granular access controls, and improve visibility into system activity. Federal mandates and frameworks, such as those outlined by CISA and NIST, are guiding agencies in adopting these models, though challenges remain in legacy system integration, resource allocation, and workforce training. Join us as experts explore the progress, hurdles, and future of zero trust implementation efforts across the federal government, emphasizing its role in safeguarding national security.
The Workforce Challenge: Preparing Federal Teams for Zero Trust Success – Panelist
ATARC ∙
March 2025
Implementing Zero Trust isn’t just a technical endeavor—it’s a workforce transformation. This session addresses how federal agencies can upskill their workforce, manage talent gaps, and create a culture of continuous learning to support Zero Trust initiatives. Panelists will discuss the importance of collaboration across IT and mission teams, the role of leadership, and resources available to federal agencies for workforce development.
The Hacking Team Incident
Medium ∙
December 2024
One sleepy July morning, the members of a small Milanese boutique cybersecurity firm, Hacking Team, awoke from the annuls of the weekend, unaware of the life-shattering series of events that they were about to experience…
The 2024 SDI Showcase (Judge)
Space and Defense Innovation Showcase ∙
March 2024
The Space and Defense Innovation Showcase and SDI Ignite Awards aimed to recognize and celebrate the most groundbreaking technologies and solutions throughout the space and defense sectors. Sponsored by Second Front, the competition focused on four of the OUSD(R&E) technology categories and was held in two phases…
7 Cyber Areas That Deserve Your Attention (Contributor)
GovLoop ∙
January 2024
Many IT leaders are using limited resources to maintain their agency’s defenses and put out fires.
And all of this is happening as government continues shifting toward a hybrid work environment, which requires fresh thinking about cyber strategies.
This resource features tips to navigate this complex cybersecurity landscape, with advice from cyber thought leaders including:
- Dev Shenoy, Principal Director, Microelectronics, Office of the Undersecretary of Defense Research and Engineering, U.S. Defense Department
- Jason Ralph, Director, Security Operation Center, U.S. Department of Labor
- Sean Starnes, Chief Information Security Officer, Space CAMP, U.S. Air Force
- Angela Pompey, Chief Information Security Officer, Bureau of Labor Statistics, U.S. Department of Labor
The Right to Own Your Genetic Identity
Medium ∙
October 2023
At the time of birth, everyone in the room knows the absolute identity of the child; this is the only undeniable identity that every person has. As soon as the child leaves that room, every other identity they are ever given is generated from that initial identity. While many immediately following identities, such as birth certificate and social security number/card, hold high regard, all of them are based on the person who entered the world in that room utilizing immutable data points, such as DNA, biometrics, appearance, and others…
A Year in Review as CISO: Lessons Learned and Plans for the Future
Medium ∙
August 2023
A year ago, I was privileged to join Space CAMP, a DoD software factory supporting the US Space Force, as their CISO. Walking into a blank slate was a great opportunity for me to try out some things on my own to see why they did or didn’t work; there were no security policies, no procedures, and no guidance, but they did have a powerful sense of security already instilled in the culture…