Home / DoD / Powerwave’s Jake MacLeod to Speak at Homeland Security Conference

Powerwave’s Jake MacLeod to Speak at Homeland Security Conference

Photo, Niderlander
Photo: Niderlander

Powerwave Technologies Vice President of Government Solutions Jake MacLeod will present during the Homeland Security for Networked Industries 2010 expo, held Sept. 20-21 in Washington, D.C.

MacLeod will speak during a session titled “The Emergence Management Lifecycle: From Disaster Preparedness to Emergency Response and Rebuilding.” He will lend his experience from his work rebuilding the telecommunications network and air-traffic control system in Iraq in 2003. MacLeod’s Powerwave team, working under contract from the Department of Defense, was able to replace 12 wire centers of telephony in only 120 days.

The conference will amass infrastructure experts from the domains of telecommunications, transportation and utilities. The goals of the meetings are to coordinate collaboration efforts and communication between industry, local and government infrastructure leaders. Breakout sessions will include topics such as how to increase network security, the latest technology trends, and IT investment opportunities.

MacLeod, a 30-year veteran of the telecommunications industry, was named one of the top 10 government-contracting CTOs in Washington, D.C., by ExecutiveBiz in 2009.

Check Also

Lead HHS Cyber Auditor Says Team ‘Well Aligned’ to Face Challenges

The head of cybersecurity at the Health and Human Services Department’s Office of the Inspector General recently said that he and his team are learning as much as they can about supply chain threats and application development security, to respond to such issues effectively, Federal News Network reported Friday. Jarvis Rodgers, HHS OIG Cybersecurity and IT Audit Division director, told Federal News Network via email that his unit is aware that risks related to global supply chains “present a unique set of challenges” and that poorly written code can result in costly and persistent security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *