Pending Membership

Celebrate Small Business Week with GTSC’s Pending Membership!

It’s National Small Business Week (June 16 – June 22) – GTSC thought there would be no better way to celebrate small business week than by offering “pending memberships” to our community of small businesses!

In Italy, café customers can pay for a “caffe sospeso” – a pending coffee that can later be claimed for free by those who can’t afford one.  The legend is:

“Right after the war, many gentlemen had lost everything they had, and couldn’t even afford coffee.  Now, being that black hot liquid pleasure was not considered a treat, but rather a basic human right in the life of any Neapolitan, those gentlemen who could still afford to have one, took a habit of paying for two: one they drank, the other was credited, to be had by the first peer who would walk in the bar.  The bartender would then say  “Would you like a coffee sir?  Which meant:  there is a coffee paid for you if you can’t afford one.”

What this means is that if your company has annual revenue under $2.5 million, your company can join for free when matched with a “pending membership.”  Our mentors and mid-sized companies are invited to pay for a “pending membership.”  

INTERESTED IN SUPPORTING SMALL COMPANIES WITH A PENDING MEMBERSHIP? CLICK HERE!

WANT TO APPLY FOR A PENDING MEMBERSHIP? CLICK HERE TO APPLY!

Thank you to our GTSC Members and Mentors who have already supported by purchasing a pending membership on behalf of our community!

pending membership logos

Mid-Tier GTSC CEOs Present to DHS

On May 20, GTSC Lion’s Den Member Companies Agilex, BlueWater Federal Solutions, Inc., LeapFrog Solutions, Inc., and NCI, Inc. presented to about 40 Department of Homeland Security program managers and contracting officers. Each company represented a different midsize business category, and they discussed the lifecycle of a business in Federal contracting, the challenges and opportunities of being a mid-tier company, and the strategies they have employed to remain successful in this marketplace. During the session program managers and contracting officers had the opportunity to ask questions about their business process and provide suggestions to contractors. GTSC looks forward to planning more of these two-way dialogue forums about the small business process with DHS and other Federal agencies.

Pictured left to right: Linda LeFebvre, Vice President, NCI, Inc.; Brian Nault, President, BlueWater Federal Solutions; Kristina Tanasichuk, CEO, GTSC; Marco de Vito, COO, NCI, Inc.; Lisa Martin, CEO, LeapFrog Solutions, Inc.; Brad Cole, Vice President, Agilex; Erich Mendez, CIO, BlueWater Federal Solutions.

Thank you to Agilex, BlueWater Federal Solutions, Inc., LeapFrog Solutions, Inc., and NCI, Inc. for making this first session such a success! Click here to view their presentation, Headed for the Cliff: Challenges for Small Companies that Grow to Mid-Tier.

AGILEX

Bluewater federal

LeapFrog Solutions Logo

nci-logo

 

June 25: Insight Session with Gary Galloway, State Department

Please join the Government Technology & Services Coalition for an Insight Session with Gary R. Galloway, Deputy Director of the Office of Information Assurance for the U.S. Department of State on Tuesday, June 25.

About Mr. Galloway

Gary R. Galloway has been the Deputy Director of the Office of Information Assurance (IRM/IA) since May 2007. He also is serving as Acting Director of IRM/IA’s Enterprise Risk Division. Prior to arriving in IRM/IA, Mr. Galloway was Deputy Director and Director for Business Technology of the Office of eDiplomacy from April 2003 – May 2007, serving as Acting Office Director from July 2005 – January 2006. He has been an employee of the Department of State since 1986 and has been with the Bureau of Information Resource Management since 1996.

Mr. Galloway brings extensive knowledge of the Department’s IT infrastructure and a full understanding of the application of technology to IRM/IA’s mission of protecting the Department’s information systems and networks. Mr. Galloway began his career with the Department of Interior and worked briefly at the Office of Personnel Management and the Department of Labor prior to coming to State. He came to the State Department as a programmer analyst in the Bureau of Resource Management, rising to the position of Director of Systems Operations in 1993. His tenure in IRM began as a Senior Policy Advisor to the first Chief Information Officer in State, followed by tenure as a Senior Advisor to the Deputy CIO for Architecture, Planning and Regulation.

Mr. Galloway is the recipient of numerous Department awards, including the Superior Honor Award in 2006 and the Meritorious Honor Award on multiple occasions. Mr. Galloway is an active member of the American Council for Technology (ACT) and a graduate of the prestigious Industry Advisory Council (IAC) IT Partners Program, winning the Outstanding Partner of the Year award for the Class of 2006. He is also a member of the Government Advisory Panel for IAC’s Information Security and Privacy Special Interest Group and the Symantec Government Symposium Advisory Board, in addition to serving as the Government Vice-Chair for the ACT-IAC 2009 Management of Change Conference. Mr. Galloway serves as a mentor for the ACT-IAC Voyager Program, and the Department of State Civil Service Mentoring Program. He is also a member of the Montgomery County Boys and Girls Club Board of Directors. Mr. Galloway is a member of the Association for Federal Information Resources Management, serving a co-chair of the eAFFIRM committee and has been a guest speaker for the American Electronics Association (AeA) and the Armed Forces Communications and Electronics Association (AFCEA).

Mr. Galloway earned his Bachelor of Arts degree from the University of Pennsylvania, and was awarded a Master of Science degree in National Resource Strategy with an Information Strategies Concentration from the Industrial College of the Armed Forces, National Defense University. He is a native of Washington, D.C. and lives in Silver Spring, Maryland with his wife, Monroe, and son, Reginald who is a student at Princeton University.

 

Register now

GTSC Partners with Linden Resources to Employ Veterans

Washington, D.C. – June 3, 2013 – The Government Technology & Services Coalition (GTSC) has partnered with Linden Resources to find meaningful employment on their return to civilian life. Linden Resources’ Vets Ready2Work program empowers veterans with disabilities to attain and sustain employment, enabling them to achieve independence and regain self-sufficiency. GTSC member companies will work with Linden to hire veterans, provide feedback on workplace requirements and refer veterans to the program. GTSC members DAI; Dynamic Security Concepts, Inc.; Man-Machine Systems Assessment; NCI, Inc.; Pherson Associates, LLC; PReSafe Technologies LLC; SCI Consulting Services, Inc., The Strativest Group LLC; and ProQual-I.T., Inc. have already committed to work to place veterans in meaningful positions.

“GTSC member companies have created a community of people devoted to the mission of homeland and national security. A critical part of that mission is assuring that we take care of those who serve by providing all the tools and support necessary to reintegrate and return to normalcy as quickly as possible,” said Kristina Tanasichuk, CEO and Founder of GTSC.

Linden resources“We are excited to partner with the Government Technology & Services Coalition and expand opportunities to support our wounded warrior veterans as they find and keep meaningful jobs,” said Linda Chandler, the CEO of Linden Resources. “Our partnership with GTSC advances Linden’s vision of providing disabled veterans with opportunities for employment.”

Linden staff work individually with each veteran to identify areas of strength and career interests that will translate into sustainable employment. Additional services can include resume development, vocational assessments, specialized accommodations supports and job retention supports.

Linden operates twelve AbilityOne contracts, a full-service printing and warehousing business for government and commercial clients, and offers workforce development programs that benefit people with intellectual, physical and mental health disabilities, Temporary Assistance for Needy Families (TANF) recipients, and wounded warrior veterans. For more information about GTSC’s new partner, Linden Resources, visit www.Linden.org.

-###-

The Government Technology & Services Coalition (GTSC) is a nonprofit, non-partisan association of innovative, agile small and midsize company CEOs that create, develop and implement solutions for the federal homeland and national security sector. GTSC’s mission is to provide exceptional advocacy, capacity building, partnership opportunities and marketing for small and midsize companies in the federal homeland and national security market. For more information, visit www.GTSCoalition.com.

Linden Resources was founded fifty-three years ago by a group of Northern Virginia parents seeking jobs for their children with disabilities. Today, Linden remains focused on its mission to increase employment opportunities for people with disabilities. It operates three commercial businesses that generate revenue to support its mission, which include: print and mailing services; warehousing and fulfillment; and document destruction. The organization manages over a dozen federal contracts, employing people with disabilities.

June 20: Mentor Session with SAIC

Please join the Government Technology & Services Coalition for a Mentor Session with Robert Magee, SAIC’s Assistant Vice President for the National Security Sector and Cybersecurity Group, on Thursday, June 20.

About SAIC

A nationally recognized leader in public safety and homeland security, SAIC draws on thousands of experienced staff members in disciplines ranging from vulnerability assessment to infrastructure protection to emergency response. We have extensive experience with the component agencies of the Department of Homeland Security (DHS), and have worked hand in hand with our agency customers to meet their important training, technical, and strategic requirements. Our success in integrating many different agency systems and networks is a key reason why we were chosen to integrate the data network connecting all 22 agencies of the DHS.

GTSC’s mentor companies work with the small and mid-sized companies in the Coalition to partner and bring the innovation, ideas and agility of small business to the experience, infrastructure and resources of large companies. GTSC mentors join us to provide advice and counsel on the convergence of homeland and national security, find new and innovative teaming partners, address challenges in the prime/subcontractor relationship in a neutral environment and improve mentor/protégé communication and success. Both our large and small companies recognize that the best security for our citizens – both physically and economically — is derived from the ability of our markets to meet the challenges posed by terrorism, natural disasters, and criminal activity. www.saic.com

 

Robert Magee
Assistant Vice President

National Security Sector, Cybersecurity Group, SAIC

Mr. Magee is an Assistant Vice President and Senior Program Manager supporting the Cybersecurity Solutions Group at Science Applications International Corporation.  Based out of McLean, Virginia, his portfolio includes serving as the corporate account executive for the National Protection Programs Directorate at the Department of Homeland Security as well as, program management, strategic capture and business development supporting the corporation’s cybersecurity services and solutions across the federal enterprise with particular emphasis on the Department of Defense, including Combatant Commands, Armed Services and Defense Agencies.

Before joining SAIC, Mr. Magee worked for Superlative Technologies Inc. as Vice President for Department of Defense, Department of Homeland Security, and Intelligence Operations.  Additional responsibilities included directing Critical Infrastructure, Predictive Analysis, Information Assurance, and Solutions Architecture practice areas, as well as development of legislative strategy and strategic planning initiatives.

Prior to joining the private sector defense industry, Mr. Magee spent 26 years on active duty in the U.S. Navy.  A naval aviator, retiring as a Captain, he had numerous operational squadron and shipboard assignments including command of Helicopter Antisubmarine Squadron Three, and multiple shore tours on major service and OSD staffs.  His personal decorations include the Defense Superior Service Medal, Meritorious Service Medal (three awards), Navy Commendation Medal (four awards, Combat V) and numerous unit and campaign awards.

In addition to supporting the Government Technology & Services Coalition, he is an active participant in numerous industry associations including the Armed Forces Communications and Electronics Association (AFCEA) serving a a member of the Cybersecurity steering committee and TechAmerica chairing the Cybersecurity Study for the annual Vision Conference and serving as an active member on both Homeland Security and Department of Defense committees.

Mr. Magee earned his Bachelor of Science degree from the United States Naval Academy and holds Master of Science Degrees from the Industrial College of Armed Forces, National Defense University, Washington, D.C and the Naval Post Graduate School, Monterey, CA.

Register now

July 11: Join us for GTSC’s 2nd Anniversary

You are cordially invited to join the

 Government Technology & Services Coalition

and celebrate our 2nd Anniversary

and honor our 2013 MVP

Charlie Armstrong

Charles R. Armstrong

Assistant Commissioner & Chief Information Officer,

U.S. Customs and Border Protection

Come Stroll Through the Greek Isles!

Music | Mezze | Magic

Thursday, July 11

5:30 p.m. – 8:30 p.m.

The U.S. Navy League | Arlington, VA | Courthouse Metro

R.S.V.P. Required

Parking is available at street level meters and in the basement of the U.S. Navy League building.

Thank you to our sponsors!

 

Platinum Sponsor:

 

Harris LogoGold Sponsors:

Bluewater federal

L3STRATIS_RedBlk_transp_LOGO copy

PreSafe Tech Logo

Bronze Sponsors:

OldDominionStrategies_Logo small

SE Solutions Logo

DHS Procurement Office’s Annual Progress Report

DHS’ Procurement Office released its 2012 Progress report on its priorities and accomplishments.  GTSC strongly recommends reading this report — it provides an excellent overview of the initiatives underway in the office and how DHS is working to standardize purchasing across the department where possible, advocating for small business and continuing to achieve small business contracting goals (p.12) and engage industry where appropriate and needed in the procurement process.

 

KT Quote

 

 

 

URGENT! INDUSTRY INPUT on Cyber requirements in procurement needed

In the latest major regulatory development on cybersecurity, a Working Group of the General Services Administration (GSA) and the Department of Defense (DoD), in consultation with the Department of Homeland Security (DHS) and the FAR Council, has invited the public to comment on what cybersecurity measures and parameters would be appropriate to be adopted in federal procurements. In a Request for Information (RFI) published on May 13 in the Federal Register, the Working Group advised it is accepting input until June 12, but in actuality input must be received by May 15 if it is going to be fully considered in the final report. The RFI provides a critical opportunity for industry to comment on potentially significant changes to cybersecurity requirements in federal acquisitions.

The Working Group is implementing requirements under Executive Order (EO) 13636. Much of the early focus on EO 13636 centered on the development of a voluntary cyber framework by the National Institute of Standards and Technology (NIST), which would then be implemented by the DHS. Indeed, much attention was paid to what incentives the DHS would utilize to encourage companies to adopt the voluntary cyber framework.

With so much focus on the framework, Section 8(e) of the Executive Order was almost lost in the noise.  Section 8(e) quietly but emphatically directed that within 120 days of the issuance of the EO, the GSA and the DoD, along with the DHS and the FAR Council, were to deliver recommendations on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration. The agencies would also recommend what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity. The GSA established the DoD-GSA Sec. 8(e) Working Group, which includes representatives from the DoD, the DHS, the Office of Federal Procurement Policy, and NIST.

The reality here is that government contractors MUST provide their input in a timely fashion to the Working Group, because the report and the recommendations will fundamentally alter government contracting for years to come. The cyber threat is real, present, and growing, and the federal government will not sit idly by and allow its contractors to conduct business without any meaningful cybersecurity requirements placed on them.

Thus, it will be vital for companies to submit their comments and do so in a way that recognizes the seismic changes occurring. As these cybersecurity requirements are implemented, they could alter a company’s business model, by:

  • Creating new grounds on which to determine whether a company’s proposal is technically acceptable;
  • Creating new bases to protest contracts pre and post award;
  • Creating increased requirements that, if breached, could lead to contract termination or even debarment; and
  • Fundamentally altering the financial resources that must be invested in order to be a government contractor in good standing.

Comments being solicited from industry are essentially broken down into three key areas:  1) Feasibility & Federal Acquisition – addressing the development of acquisition standards and evaluation criteria that should be incorporated into federal procurements; 2) Commercial Practices – addressing current commercial cybersecurity practices, policies, and procedures; and 3) Harmonization – addressing how to align federal cybersecurity standards with state, local, national, and international standards.

More specifically:

FEASIBILITY & FEDERAL ACQUISITION:  In general, the DoD and the GSA seek input about the feasibility of incorporating cybersecurity standards into federal acquisitions.

For example:

  1. What is the most feasible method to incorporate cybersecurity relevant standards in acquisition planning and contract administration? What are the cost and other resource implications for the federal acquisition system stakeholders?
  2. How can the federal acquisition system, given its inherent constraints and the current fiscal realities, best use incentives to increase cybersecurity amongst federal contractors and suppliers at all tiers? How can this be accomplished while minimizing barriers to entry to the federal market?
  3. What are the implications of imposing a set of cybersecurity baseline standards and implementing an associated accreditation program?
  4. How can cybersecurity be improved using standards in acquisition planning and contract administration?
  5. What are the greatest challenges in developing a cross-sector standards-based approach cybersecurity risk analysis and mitigation process for the federal acquisition system?
  6. What is the appropriate balance between the effectiveness and feasibility of implementing baseline security requirements for all businesses?
  7. How can the government increase cybersecurity in federal acquisitions while minimizing barriers to entry?
  8. Are there specific categories of acquisitions to which federal cybersecurity standards should (or should not) apply?
  9. Beyond the general duty to protect government information in federal contracts, what greater levels of security should be applied to which categories of federal acquisition or sectors of commerce?
  10. How can the federal government change its acquisition practices to ensure that the risk owner (typically the end user) makes the critical decisions about that risk throughout the acquisition life cycle?
  11. How do contract type (e.g., firm fixed price, time and materials, cost-plus, etc.) and source selection method (e.g., lowest price technically acceptable, best value, etc.) affect your organization’s cybersecurity risk definition and assessment in federal acquisitions?
  12. How would you recommend the government evaluate the risk from companies, products, or services that do not comply with cybersecurity standards?

 

COMMERCIAL PRACTICES:  In general, the DoD and the GSA seek information about commercial procurement practices related to cybersecurity.

For example:

  1. To what extent do any commonly used commercial standards fulfill federal requirements for your sector?
  2. Is there a widely accepted risk analysis framework that is used within your sector that the federal acquisition community could adapt to help determine which acquisitions should include the requirement to apply cybersecurity standards?
  3. Describe your organization’s policies and procedures for governing cybersecurity risk.  How does senior management communicate and oversee these policies and procedures? How has this affected your organization’s procurement activities?
  4. Does your organization use “preferred” or “authorized” suppliers to address cybersecurity risk? How are the suppliers identified and utilized?
  5. What tools are you using to brief cybersecurity risks in procurement to your organization’s management?
  6. What performance metrics and goals do organizations adopt to ensure their ability to manage cybersecurity risk in procurement and maintain the ability to provide essential services?
  7. Is your organization a preferred supplier to any customers that require adherence to cybersecurity standards for procurement? What are the requirements to obtain preferred supplier status with this customer?
  8. What procedures or assessments does your organization have in place to vet and approve vendors from the perspective of cybersecurity risk?
  9. How does your organization handle and address cybersecurity incidents that occur in procurements? Do you aggregate this information for future use? How do you use it?
  10. What mechanisms does your organization have in place for the secure exchange of information and data in procurements?
  11. Does your organization have a procurement policy for the disposal of hardware and software?
  12. How does your organization address new and emerging threats or risks in procurement for private sector commercial transactions? Is this process the same or different when performing a federal contract? Explain.
  13. Within your organization’s corporate governance structure, where is cyber risk management located (e.g., CIO, CFO, Risk Executive)?
  14. If applicable, does your Corporate Audit/Risk Committee examine retained risks from cyber threats and implement special controls to mitigate those retained risks?
  15. Are losses from cyber risks and breaches treated as a cost of doing business?
  16. Does your organization have evidence of a common set of information security standards (e.g., written guidelines, operating manuals, etc.)?
  17. Does your organization disclose vulnerabilities in your products/services to your customers as soon as they become known? Why or why not?
  18. Does your organization have track-and-trace capabilities and/or the means to establish the provenance of products/services throughout your supply chain?
  19. What testing and validation practices does your organization currently use to ensure security and reliability of products it purchases?

 

HARMONIZATION: In general, the DoD and the GSA seek information about any conflicts in statutes, regulations, policies, practices, contractual terms and conditions, or acquisition processes affecting federal acquisition requirements practices related to cybersecurity and how the federal government might address those conflicts.

For example:

  1. What cybersecurity requirements that affect procurement in the United States (e.g., local, state, national, and other) has your organization encountered? What are the conflicts in these requirements, if any? How can any such conflicts best be harmonized or de-conflicted?
  2. What role, in your organization’s view, should national/international standards organizations play in cybersecurity in federal acquisitions?
  3. What cybersecurity requirements that affect your organization’s procurement activities outside of the United States (e.g., local, state, national, and other) has your organization encountered? What are the conflicts in these requirements, if any? How can any such conflicts best be harmonized or de-conflicted with current or new requirements in the United States?
  4. Are you required by the terms of contracts with federal agencies to comply with unnecessarily duplicative or conflicting cybersecurity requirements? Please provide details.
  5. What policies, practices, or other acquisition processes should the federal government change in order to achieve cybersecurity in federal acquisitions?
  6. Has your organization recognized competing interests amongst procurement security standards in the private sector? How has your company reconciled these competing or conflicting standards?

At the end of the day, cybersecurity requirements are inevitable. Even if the Working Group moves slowly in implementing recommendations, Congress has shown a willingness to act independently and decisively on new procurement rules. Thus, contractors need to move quickly and decisively to submit comments by May 15, and they should work closely with their procurement counsel to determine what recommendations from the Working Group would be the least burdensome while effectively adding to the federal government’s cybersecurity posture. Failure to do both will mean a narrow window of opportunity will be missed, and much scrambling will have to be done in order to meet potentially unrealistic or irrelevant cybersecurity measures.

Brian Finch

 

Brian Finch is GTSC’s Strategic Partner and a partner at Dickstein Shapiro LLP, where he leads the Global Security practice.  He can be reached at[email protected] or 202-420-4823.

 

SIA 2013 Government Summit

Our strategic partner, the Security Industry Association (SIA), will hold its annual Government Summit in Washington, DC on June 4-5 at the W hotel. GTSC’s CEO, Kristina Tanasichuk, will be moderating one of the panels.

The Summit brings together all levels of the security industry: executives, integrators, sales, marketing and government relations professionals. The sessions are geared towards doing business with government (state and federal), identifying the trends facing the industry, and understanding how policy drives business.

The Summit kicks off on Monday, June 3, with an informal welcome reception in the POV Lounge at the W Hotel. This event will be attended by elected officials, administration personnel, Congressional staff, members of the media and some surprise guests. Summit participants will have the opportunity to network with their industry colleagues as well as speakers, all while taking in panoramic views of our nation’s capital.

On Tuesday, June 4, the Summit begins with panels covering Emerging Technologies and Governance; Identity, Cybersecurity and Privacy; Government Purchasing; Protecting Transportation as Critical Infrastructure; Greening of the Industry and Market Drivers in the Government Space.

Tuesday evening, June 4, the Summit moves to the Hamilton Live for the annual Policy Dinner, which features another reception, a short awards program and dinner. The policy dinner keynote speaker is Pulitzer-Prize winning journalist and best-selling author Bob Woodward. Participants will have an opportunity to meet Mr. Woodward one-on-one.

Attendees will also be hearing from Connecticut Governor Dannel Malloy, who will give a keynote address on school safety and security.

Wednesday’s half-day session will focus on school safety and security with keynote addresses expected from leading policymakers, which will be followed by a panel on school safety. The complete program and registration information can be found at SIA Government Summit. The conference is capped at 200 participants, so register soon!