Processing....

Executive Gov

Digital News Coverage of Government Contracting and Federal Policy Landscape
Sticky Logo
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Logo
Federal Civilian/Government Technology/News
Commerce, AT&T Strike $2B FirstNet Deal to Expand 5G, Public Safety Connectivity
by Kristen Smith
Published on April 1, 2026
Wes Anderson. The AT&T public sector president commented on a $2B FirstNet deal with the Commerce Department.

The Department of Commerce has secured a $2 billion agreement with AT&T to enhance the FirstNet nationwide public safety broadband network by accelerating 5G deployment and expanding mission-critical connectivity for first responders.

The deal restructures elements of AT&T’s First Responder Network Authority contract to deliver additional value to public safety users while reducing costs and increasing targeted network investments, the National Telecommunications and Information Administration said Tuesday.

“Nearly a decade ago, when public safety and Congress asked for a partner to build the dedicated communications platform that first responders require, we were the only nationwide carrier willing to raise our hand and commit to a 25-year contract to build it,” said Wes Anderson, president of public sector at AT&T. 

“Today’s announcement illustrates once again, as with prior modifications, our continued commitment to invest in public safety communications,” added the five-time Wash100 Award recipient.

Table of Contents

  • What Does the $2B AT&T Agreement Include?
  • How Does the Agreement Build on FirstNet Expansion Efforts?
  • What Is FirstNet?

What Does the $2B AT&T Agreement Include?

Under the revised framework, AT&T will reduce FirstNet costs by roughly $1 billion, freeing up funds for reinvestment into the Nationwide Public Safety Broadband Network. The company will also commit approximately $1 billion in new spending to expand coverage and strengthen network capabilities based on input from public safety users.

The agreement is expected to accelerate deployment of a dedicated 5G core for FirstNet, a key component in enabling faster, more reliable communications for emergency personnel operating in high-demand or degraded environments.

How Does the Agreement Build on FirstNet Expansion Efforts?

The agreement builds on ongoing investments by AT&T and the FirstNet Authority to modernize and scale the network. In 2024, the partners launched a 10-year, $8 billion initiative to enhance FirstNet.

As part of that effort, AT&T has already rolled out 1,000 new cell sites across 46 states and Washington, D.C., many in rural, tribal and critical public safety locations such as hospitals, fire stations and law enforcement facilities. The expansion supports broader coverage, increased capacity and stronger signal performance for first responders.

More than 28,000 public safety agencies nationwide reportedly rely on FirstNet for prioritized, secure communications during emergencies when commercial networks may become congested.

The agreement aligns with President Donald Trump’s executive order launching the “Department of Government Efficiency” Cost Efficiency Initiative, which calls on agencies to review contracts and maximize taxpayer value.

What Is FirstNet?

FirstNet, managed by NTIA, is the congressionally mandated Nationwide Public Safety Broadband Network. Unlike commercial networks, it operates on spectrum reserved for public safety, enabling priority access and improved reliability during crises and large-scale events.

The network supports voice, data and video communications, helping emergency personnel maintain situational awareness and coordinate response efforts even under extreme conditions.

Government Technology/Healthcare IT/News
HHS Returns Enterprise Roles to OCIO Under Tech Leadership Realignment
by Jane Edwards
Published on April 1, 2026
Department of Health and Human Services logo. HHS has realigned its health technology leadership structure.

The Department of Health and Human Services has realigned its health technology leadership structure, reversing a 2024 reorganization and restoring enterprise tech responsibilities under the Office of the Chief Information Officer.

HHS Returns Enterprise Roles to OCIO Under Tech Leadership Realignment

The leadership realignment at HHS reflects evolving approaches to how agencies structure and manage digital capabilities. Attend the 2026 Digital Transformation Summit on April 22 to hear leaders discuss AI, cybersecurity, enterprise IT and other key technology priorities impacting government operations. Register now!

HHS said Tuesday the move is intended to strengthen departmentwide technology coordination while allowing the Office of the National Coordinator for Health Information Technology, or ONC, to focus on health IT interoperability, policy and data liquidity.

Table of Contents

  • What Are the Key Changes to HHS Tech Leadership?
  • How Will ONC Operate Under the New Leadership Structure?
  • How Do the Tech Leadership Changes Align With Recent HHS Health IT, AI Policy Moves?

What Are the Key Changes to HHS Tech Leadership?

HHS has restored ONC as a singularly titled office and reassigned enterprise technology roles back to OCIO. It shifted the roles and responsibilities of the chief technology officer, chief artificial intelligence officer and chief data officer under OCIO. HHS also has returned cybersecurity and enterprise IT functions to OCIO.

Under the updated structure, OCIO will organize these roles across three areas: technology leadership and innovation led by the CTO; AI oversight led by the CAIO; and enterprise data governance and analytics led by the CDO.

“This structure allows OCIO to provide an integrated backbone for cloud, cybersecurity, data, and AI that every HHS component can rely on,” said HHS CIO Clark Minor. “By bringing CTO, CAIO, and CDO functions together under one roof, we can move faster on shared platforms, protect our systems more effectively, and support ONC and the operating divisions with the technology capabilities they need to innovate for patients.”

Minor added that OCIO is focused on delivering enterprise services that are resilient, compliant and prepared for the next generation of digital health.

How Will ONC Operate Under the New Leadership Structure?

ONC will continue to operate as a staff division within the HHS Office of the Secretary, with the national coordinator reporting directly to the HHS secretary. It will coordinate with OCIO, HHS operating divisions and other key stakeholders to advance health technology regulations and policies, including those related to the use of AI in clinical care.

“With this Department-wide alignment, ONC can focus even more on standards, certification, and policy, while our close partnership with OCIO ensures that the infrastructure and cybersecurity foundation are in place to support the health care system of tomorrow,” said Thomas Keane, national coordinator for health IT at HHS.

Keane added that ONC and OCIO are coordinating on policy, infrastructure and the deployment of AI and data capabilities to support data availability across the health system.

How Do the Tech Leadership Changes Align With Recent HHS Health IT, AI Policy Moves?

The new structure follows a series of recent HHS actions related to health IT policy, certification and AI. The department recently made changes to its IT leadership team.

In December, HHS proposed the Health Data, Technology and Interoperability, or HTI-5, rule to streamline the health IT certification requirements, strengthen patient protections against information blocking and lay the groundwork for AI-enabled data exchange across the healthcare system.

The proposed HTI-5 rule came weeks after the department introduced its AI strategy.

Cybersecurity/DoD/News
Parsons Unit to Deliver First Joint Cyber Hunt Kits to CYBERCOM
by Miles Jamison
Published on April 1, 2026
Parsons exec Mike Kushin. Parsons subsidiary Sealing Technologies is set to deliver first Joint Cyber Hunt Kits to CYBERCOM.

Sealing Technologies, a Parsons subsidiary, is preparing to deliver the first batch of Joint Cyber Hunt Kits, dubbed JCHK, to four priority units, providing U.S. Cyber Command with standardized defensive equipment for hunt missions, Breaking Defense reported Monday.

Parsons Unit to Deliver First Joint Cyber Hunt Kits to CYBERCOM

Secure your spot at the Potomac Officers Club’s 2026 Cyber Summit on May 21 to engage with government and industry leaders addressing rising cyber threats, zero trust progress and evolving defense strategies.

Table of Contents

  • What Capabilities Does the JCHK Provide?
  • What Are the Production & Delivery Plans for JCHK?
  • CYBERCOM Assumes JCHK Program Lead

What Capabilities Does the JCHK Provide?

The JCHK enables defensive cyber teams to conduct hunt missions against advanced persistent threats and supports hunt forward missions on foreign partner networks. According to Mike Kushin, president of defense and intelligence at Parsons, the kits support operations targeting sophisticated adversaries, including nation-state actors, and enable deployment on partner networks abroad.

In addition, the compact, suitcase-sized systems can be easily transported and deployed on-site, allowing teams to assess networks that are not accessible via remote monitoring environments.

“Hunting is for really the [advanced persistent threats] that are pretty hard to find, because they’re pretty sophisticated, usually [from] nation states. It provides a mechanism and offers ways to do remediation, but that is predominantly the responsibility of the teams and then working back with Cyber Command for that particular purpose,” Kushin said.

What Are the Production & Delivery Plans for JCHK?

The JCHK’s rollout began with a low-rate initial production phase, delivering the first four of twelve scheduled equipment sets to elite units. This follows the February announcement of a three-year, $500 million full-rate production deal. The company is on track to supply 74 units by the end of 2026.

Other Department of War components, including the Cybersecurity and Infrastructure Security Agency, have expressed interest in utilizing the contract to acquire the standardized platforms.

CYBERCOM Assumes JCHK Program Lead

The Defense Innovation Unit previously managed JCHK contracting and acquisition on behalf of CYBERCOM, which is now assuming full program oversight. This transition follows the November 2025 issuance of a Success Memo to Sealing Technologies, which recognized the successful evaluation of the JCHK prototype program.

Executive Moves/News
Farhan Khan Named FCC CIO
by Jane Edwards
Published on March 31, 2026
Farhan Khan. The former FDA official has been named CIO at the Federal Communications Commission.

The Federal Communications Commission has appointed Farhan Khan, a technology leader and former Food and Drug Administration official, as chief information officer.

Farhan Khan Named FCC CIO

As Khan steps into the FCC’s top IT role, federal leaders are sharpening their focus on modernization and secure digital infrastructure. Sign up today for the 2026 Digital Transformation Summit and hear directly from leaders shaping the future of federal technology.

FCC said Monday Khan will establish and oversee the commission’s technical vision, lead IT services and drive modernization efforts. He will also ensure information security across FCC systems to support the agency’s workforce and meet the needs of the telecommunications sector.

Table of Contents

  • What Did FCC Managing Director Dan Daly Say About Khan’s Appointment?
  • Who Is Farhan Khan?

What Did FCC Managing Director Dan Daly Say About Khan’s Appointment?

FCC Managing Director Dan Daly said Khan brings the experience needed to lead the agency’s IT organization.

“The FCC’s robust agenda requires a diligent information technology team led by someone with knowledge of all aspects of today’s technology landscape, but also an eye to the future needs of this industry and the Commission as a whole,” Daly stated.

“Farhan has extensive experience in the federal space and in managing large, complex teams. We look forward to his leadership as he applies this same expertise to his responsibilities at the Commission,” he added.

Who Is Farhan Khan?

Khan is an artificial intelligence and digital transformation executive who joined Swingtech as chief AI transformation officer in August 2025.

Before Swingtech, he was chief digital officer at FDA, where he led digital transformation initiatives, oversaw a $200 million budget and managed a team of more than 400 tech professionals. He also served as the agency’s chief technology officer from 2015 to 2017.

Khan also held IT leadership roles at the Federal Deposit Insurance Corporation, the Department of Transportation, the U.S. Army and the Department of Justice. In those roles, he led global IT operations and helped advance shared services models to facilitate application development, cloud migration, telecommunications and data center operations.

He holds a master’s degree in information systems from George Washington University.

Artificial Intelligence/DoD/News
Marine Corps Advances AI-Driven Battle Management in Dynamis Serial 005 Exercise
by Jane Edwards
Published on March 31, 2026
U.S. Marine Corps seal. USMC conducted the Dynamis Serial 005 exercise to advance AI-driven battle management capabilities.

The U.S. Marine Corps conducted “Dynamis Serial 005,” the fifth iteration of Project Dynamis, from March 3 to 20, across five sites in the U.S., including Fort Carson, Colorado, and Charleston, South Carolina.

Marine Corps Advances AI-Driven Battle Management in Dynamis Serial 005 Exercise

As the Marine Corps advances AI-enabled command and control through efforts like Project Dynamis, conversations around multidomain integration and decision advantage continue to gain urgency across the naval community. Register now for the 2026 Navy Summit and join the discussion about how the service is advancing digital modernization, autonomous systems and other naval capabilities.

USMC said Friday the exercise focused on artificial intelligence-enabled battle management command-and-control, or C2, workflows using a unified, multidomain data mesh designed to accelerate decision-making and close the sensor-to-shooter gap.

The service recently released a 56-page document outlining its strategy to advance AI and machine learning adoption to improve aviation readiness and decision-making processes.

Table of Contents

  • What Is Project Dynamis?
  • How Did Dynamis Serial 005 Advance Joint Fires Integration?
  • What Are the 4 Technological Pillars of Dynamis Serial 005?
  • What Are the Lessons Learned From SoSNIE?

What Is Project Dynamis?

Project Dynamis is a campaign of agile software development sprints that started in December. Marines worked with joint partners and software engineers in operational environments to refine digital orchestration capabilities.

Col. Arlon Smith, director of Project Dynamis, said the effort centers on rapidly iterating commercial technologies to deliver AI-driven decision advantage to warfighters at the tactical edge.

How Did Dynamis Serial 005 Advance Joint Fires Integration?

At Fort Carson, Marines from I Marine Expeditionary Force integrated with the Army’s 4th Infantry Division and the 10th Special Forces Group during the Ivy Sting 5 exercise, which included live fire, maneuver operations and synthetic long-range precision fires.

During one scenario, Special Forces transmitted targeting data from a commercial network across classification levels through Army systems to a Marine Corps weapons platform.

The Marine Corps said the exercise reduced airspace deconfliction times by up to 80 percent by digitally sharing High-Mobility Artillery Rocket System munition flight path data across Marine Corps, Army and Navy systems.

Lt. Col. Jeremy Graham, Project Dynamis series lead, said the effort advanced development of a data-centric kill web using AI and machine learning.

What Are the 4 Technological Pillars of Dynamis Serial 005?

The Marine Corps identified four primary components that enabled the exercise:

  • AI-powered decision support: Integration with the Army’s Next Generation C2 program, which uses software designed for AI-driven workflows to support operational decision-making.
  • Machine-to-machine targeting: Automated data flow from sensor to shooter across multiple domains and networks with reduced manual input and human oversight, improving speed and accuracy of targeting.
  • Maven Smart System: The Marine Corps’ enterprise AI-enabled C2 platform, which provided a common tactical picture by ingesting and fusing data from multiple sources, including in degraded communications environments.
  • Resilient mesh network: A secure, self-healing transport layer that allowed data to move across units and services without a single point of failure.

What Are the Lessons Learned From SoSNIE?

In parallel with Ivy Sting 5, a Marine Corps team participated in the Systems of Systems Naval Integration Experiment, or SoSNIE, at Naval Information Warfare Center Atlantic in Charleston. The team worked with industry partners to refine the digital architecture supporting cross-domain data integration and mission autonomy C2 capabilities.

“What we learned at SoSNIE is driving how we incorporate mission autonomy capabilities,” said Lt. Col. Ben Pimentel, lead planner for the SoSNIE portion of Dynamis Serial 005. “It also taught us how to architect information flow when operational conditions require on-premises solutions.”

The Marine Corps said the event also demonstrated the ability to transmit data from unclassified systems to higher-classification networks at machine speeds using a mix of cloud-based and on-premises platforms.

Executive Moves/Intelligence/News
Former DHS Executive Craig Basham Appointed US Secret Service Deputy CIO
by Miles Jamison
Published on March 31, 2026
USSS Deputy CIO Craig Basham. Craig Basham to serve as the deputy chief informaion officer at the U.S. Secret Service.

The U.S. Secret Service has appointed veteran technology executive Craig Basham to serve as its new deputy chief information officer. Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former Department of Homeland Security under secretary, announced the appointment Saturday on LinkedIn.

Former DHS Executive Craig Basham Appointed US Secret Service Deputy CIO

Sign up for the Potomac Officers Club’s 2026 Intel Summit on Sept. 24 to hear from senior intelligence leaders and industry experts on how data, AI, cyber capabilities and secure information-sharing are transforming intelligence operations.

Table of Contents

  • Who Is Craig Basham?
  • What Experience Does Craig Basham Bring?
  • Secret Service Expands Tech Leadership

Who Is Craig Basham?

Basham is an IT and cybersecurity leader with more than two decades of experience in federal and military service. He spent over five years at DHS, most recently serving as deputy executive director for IT operations. In this role, he oversaw a $654 million budget and led a team of more than 1,100 contractors providing secure IT services to over 12,000 personnel across more than 30 major sites in the National Capital Region.

What Experience Does Craig Basham Bring?

Before his stint at DHS, Basham spent over a decade at U.S. Customs and Border Protection, where he led the wireless systems program division and was involved with the U.S. Border Patrol and CBP’s Office of Information and Technology.

During his tenure at CBP, Basham led communications and infrastructure modernization efforts, overseeing more than 1,800 communications sites and managing an annual budget of roughly $130 million. He began his career in the U.S. Army as an IT specialist for U.S. European Command, supporting enterprise IT systems.

Secret Service Expands Tech Leadership

With Craig Basham joining as deputy CIO, the Secret Service is further strengthening its technology leadership team under Chief Operating Officer Chris Toms and Chief Information Officer Chris Kraft to advance its mission through IT, cybersecurity, artificial intelligence and other emerging capabilities.

Federal Civilian/Government Technology/News
DOE Invests $320M in Quantum, Nuclear, Material Science Research
by Elodie Collins
Published on March 31, 2026
Dario Gil, under secretary for science at DOE. Gil said the investment will strengthen US technological leadership

The Department of Energy has awarded over $320 million in funding to support critical science and technology projects across various disciplines. The agency said Friday that 217 university and industry projects will receive funding over the next five years to expand scientific knowledge and address key challenges related to energy, national security and economic competitiveness.

DOE Invests $320M in Quantum, Nuclear, Material Science Research

Experts will discuss the risks of the accelerating development of quantum computing at the Potomac Officers Club’s 2026 Cyber Summit on May 21. Tickets are still available here.

Table of Contents

  • What Research Projects Will the DOE Funding Support?
  • What Other Investment Opportunities Does DOE Offer?

What Research Projects Will the DOE Funding Support?

The funded projects cover a broad range of science and technology areas:

  • Materials science and engineering: Focuses on developing advanced materials such as alloys, high-performance polymers and metal-organic frameworks for applications in energy storage, microelectronics and quantum information science.
  • Plasma and fusion science: Explores high-temperature plasma behavior to advance fusion energy.
  • Nuclear and particle physics: Investigates the fundamental structure of matter, including nuclear reactions, exotic nuclei and dark matter.
  • Chemical and molecular sciences: Examines chemistry and molecular interactions to improve chemical conversion efficiency.
  • Quantum information science and advanced computing: Drives innovations in quantum algorithms, quantum chaos theory and quantum entanglement.
  • Advanced sensors and nuclear technologies: Supports the development of sensors and other technologies for next-generation reactors and nuclear nonproliferation monitoring.
  • Scientific conferences and collaboration: Funds research gatherings that promote knowledge-sharing, interdisciplinary collaboration and professional development.

“The Department of Energy is the nation’s largest supporter of basic research in the physical sciences, and these investments will strengthen the nation’s scientific and technological leadership,” Dario Gil, under secretary for science at the DOE, stated. “The range and depth of scientific inquiry and discovery that these awards will make possible will provide dividends for America for years and decades to come.”

What Other Investment Opportunities Does DOE Offer?

The department recently launched a $352 million funding opportunity for Energy Frontier Research Centers, which support collaborative, multi-institutional research focused on fundamental questions in energy science and emerging technologies.

The agency also issued a $293 million Genesis Mission funding call to utilize artificial intelligence in addressing national challenges across areas such as advanced manufacturing, biotechnology and nuclear energy. 

In addition, DOE is investing in quantum innovation through initiatives such as the Advanced Research Projects Agency-Energy’s Quantum Computing for Computational Chemistry program. In early March, the agency announced the recipients of $37 million in funding to develop quantum algorithms for materials science, advanced batteries and industrial applications.

Digital Modernization/DoD/Executive Moves/Government Technology/News
USACE CIO/G-6 Names Allen Strunk Director, Denis Gizinski CTO
by Kristen Smith
Published on March 31, 2026
Allen Strunk and Denis Gizinski. USACE CIO/G-6 named Allen Strunk and Denis Gizinski to senior IT roles.

The U.S. Army Corps of Engineers has appointed two senior technology leaders within its CIO/G-6 organization, naming Allen Strunk as director and Denis Gizinski as chief technology officer, to advance enterprise IT transformation and the integration of emerging technologies.

The appointments come amid efforts to modernize systems, expand cloud adoption, and align data and technology strategies across global operations, USACE said March 24.

USACE CIO/G-6 Names Allen Strunk Director, Denis Gizinski CTO

Register today for the 2026 Army Summit, hosted by the Potomac Officers Club on June 18, to hear Army officials and industry leaders discuss how the service is restructuring its approach to resources, contracting and technology modernization.

Table of Contents

  • Who Is Allen Strunk?
  • Who Is Denis Gizinski?

Who Is Allen Strunk?

Strunk will lead the USACE G-6 organization, overseeing a workforce of approximately 370 IT professionals who deliver enterprise technology services to support more than 37,000 personnel worldwide.

He brings over three decades of experience across military and civilian IT roles. Most recently, Strunk served as chief of information management for the USACE Europe District, where he led IT operations supporting U.S. European Command and U.S. Africa Command missions.

His prior roles include senior leadership positions in Army IT operations, governance and enterprise architecture, with responsibilities spanning large-scale network operations, cybersecurity and information assurance programs.

“Allen brings a wealth of IT knowledge and leadership experience that will contribute and enhance our G-6 organization, said Jason Barrett, chief information officer at USACE. “His expertise is critical as we modernize our systems to overcome future threats and enhance IT services globally.” 

In his new role, Strunk will focus on advancing cloud adoption, data strategy and enterprise architecture initiatives while driving modernization across USACE systems.

“I look forward to leading our exceptional team and leveraging cutting-edge technology to enhance mission capabilities, ensuring our divisions, districts and mission partners have the decisive information advantage they need to succeed in any environment,” Strunk said.

Who Is Denis Gizinski?

Gizinski joins USACE as chief technology officer after serving as chief information officer and deputy director G-6 for the U.S. Army Reserve.

In that role, he oversaw IT strategy, policy and governance for a global network supporting approximately 200,000 personnel across more than 1,000 locations, managing a large workforce and enterprise-scale IT budget.

His experience also includes leadership roles at U.S. Africa Command and Special Operations Command Africa, where he directed communications, computing infrastructure and enterprise IT services in complex operational environments.

As CTO, Gizinski will lead efforts to align technology strategy across the organization, with a focus on accelerating the adoption of artificial intelligence and developing future technology strategies.

“We will chart a clear path toward greater technology alignment across the broader Army and the DoW. This alignment will position us to accelerate the responsible adoption of artificial intelligence (AI), enabling us to reimagine how we manage, secure and leverage data—particularly the data distributed across USACE’s diverse automated information systems,” said Gizinski.

Artificial Intelligence/Cybersecurity/News
Can Object-Level Encryption Replace Traditional Cybersecurity Models?
by Gabriella DeCesare
Published on March 31, 2026
Angel Smith. Virtru's global head of public sector during panel discussion at the Potomac Officers Club's 2026 AI Summit

As AI is more prevalently used in high-security environments, cybersecurity can no longer rely on static defenses like application logins or network boundaries. Instead, the focus must shift toward securing the data itself. 

Current frameworks remain rooted in legacy thinking, where security models still rely on traditional perimeter security, even as use of AI increasingly poses access and security challenges, prompting a transformation. Traditional models are becoming obsolete as organizations prioritize data accessibility and AI-driven outcomes.

At Potomac Officers Club’s 2026 Artificial Intelligence Summit earlier this month, Angel Smith, president of global public sector at Virtru, led a forward-looking discussion on how cybersecurity must evolve in an era shaped by agentic AI and increasingly fluid data environments. In answering whether object-level encryption can replace traditional cybersecurity models, Smith suggested the shift is not only possible but increasingly necessary, as perimeter-based approaches alone are no longer sufficient in AI-driven environments.

Can Object-Level Encryption Replace Traditional Cybersecurity Models?To continue exploring these challenges and the path forward, join government and industry leaders at the 2026 Cyber Summit on May 21, where discussions will focus on cyber infrastructure, securely adopting AI and overcoming legacy barriers to innovation. Reserve your seat here. 

Table of Contents

  • Change From Traditional Perimeter Security to Object-Level Encryption
    • What Is Perimeter Security? 
    • What Is Object-Level Encryption? 
  • What Barriers Are Slowing the Shift to Data-Centric Security? 
  • Who Is Angel Smith?
  • Where Can GovCons Learn How Cybersecurity Is Evolving at Federal Agencies? 

Change From Traditional Perimeter Security to Object-Level Encryption

A central theme of Smith’s panel discussion at the Artificial Intelligence Summit was the transition away from perimeter-based security toward object-level encryption. This shift represents a paradigm change in how organizations protect sensitive information.

Using a vivid analogy, Smith explained: “you’ve got a castle and you’ve got the moat around the castle…you bust over that moat, you’re going to get access to everything in the castle.” This model—long the foundation of cybersecurity—assumes that threats can be kept out by reinforcing external boundaries.

However, Smith argued that this approach is increasingly ineffective in modern, interconnected environments. Instead, she proposed encrypting data at its core, rendering external defenses less critical: “if we were to think about the castle [in] terms of encrypting everything inside…who cares [about the moat, an analogy for perimeter security]? Come on in… It’s all encrypted.”

Object-level encryption could replace key functions of perimeter security by protecting data itself rather than relying on external defenses. This shift is described as a “game-changer,” but one that requires organizations to fundamentally change the way that they think about cybersecurity. 

What Is Perimeter Security? 

Perimeter security refers to the traditional cybersecurity model focused on protecting the boundaries of a network or system. This includes firewalls, access controls and segmented environments designed to keep unauthorized users out.

As described during the panel, perimeter security operates as a containment strategy. This approach often leads to siloed systems and limited data-sharing. 

While effective in earlier IT environments, perimeter security struggles in today’s landscape of interconnected systems and AI-driven workflows.

What Is Object-Level Encryption? 

Object-level encryption shifts the focus from protecting systems to protecting individual data elements. Instead of securing the perimeter, every piece of data gets encrypted and governed by access controls.

Smith described this approach as securing data “at the object level, no longer around the boundary level.”

This means encryption can be applied at granular levels, such as “the word document level” or even “the sensor field level.” Each data object carries its own permissions and attributes, ensuring that only authorized users can access it regardless of where the data resides.

The implications are significant: “clouds don’t matter anymore…On-prem doesn’t matter. You can move data, you can use AI because every single piece of information has attributes associated with it that only allows the right people to [access] it.” Smith explained. 

These capabilities position object-level encryption as a viable replacement for traditional models; by enabling secure data sharing across environments, object-level encryption methods support interoperability and AI integration. 

Angel Smith. Virtru president of global public sector spoke on cybersecurity models at Potomac Officers Club Summit.
Angel Smith (left) and SAIC’s Jay Meil (right) during panel discussion at the 2026 AI Summit. Photo: Executive Mosaic

What Barriers Are Slowing the Shift to Data-Centric Security? 

Transitioning to object-level encryption is not just a technical upgrade—it requires a cultural and operational transformation.

Panelists emphasized that the biggest barriers are not technological but institutional.

“Our policies are wrong, our perspectives are wrong,” Smith said, noting that organizations often make decisions “based off of fear and legacy and infrastructure.”

Interoperability also presents a major challenge, particularly in government and defense environments. The inability to seamlessly share data across systems and organizations remains a critical obstacle, with Smith pointing to persistent difficulties “trading information between squadrons…or…ground units.”

Ultimately, making the shift requires rethinking cybersecurity from the ground up—prioritizing data-centric security models, enabling secure data-sharing and aligning policy with emerging technological realities.

As the panel concluded, the future of cybersecurity will depend on whether organizations can overcome entrenched habits and embrace a model built for the AI-driven world.

Who Is Angel Smith?

Angel Smith is president of global public sector at Virtru, where she leads strategy and growth across government, defense and intelligence markets, with a focus on advancing data-centric security solutions. Prior to joining Virtru in 2026, she spent nearly a decade at Microsoft where she drove adoption of cloud, AI and data technologies across complex federal and international environments.

Smith also brings government and military experience, previously serving as a senior professional staff member on the House Permanent Select Committee on Intelligence, overseeing Department of War intelligence programs and supporting early cloud initiatives. Earlier in her career, she spent 23 years in the U.S. Marine Corps, rising from an enlisted electronics technician to a KC-130 pilot and detachment commander, shaping her perspective on national security and cybersecurity challenges.

Where Can GovCons Learn How Cybersecurity Is Evolving at Federal Agencies? 

To dive deeper into the evolving cybersecurity landscape, join the Potomac Officers Club’s 2026 Cyber Summit on May 21, where government and industry leaders will explore the latest strategies for securing networks in the age of AI. 

The event will feature expert discussions on zero trust, data-centric security, emerging threats and the technologies shaping the future of cyber defense, with insights from featured keynote speakers including Assistant Secretary for Cyber Policy at DOW Katherine Sutton. Don’t miss this opportunity to gain actionable insights and connect with key decision-makers driving innovation across the public and private sectors. Save your seat today!

Can Object-Level Encryption Replace Traditional Cybersecurity Models?

DoD/Government Technology/News
Army Updating Doctrine Development Strategy to Keep Pace With Drone Threats
by Elodie Collins
Published on March 31, 2026
Unmanned aerial systems. The Army is overhauling its operational doctrines to reflect widespread UAS use in recent conflicts

The U.S. Army has announced a force-wide overhaul of its operational doctrine to achieve drone dominance. The service said Monday that it will integrate real-world operational experience into doctrine updates and accelerate how tactics, techniques and procedures are developed and refined.

Army Updating Doctrine Development Strategy to Keep Pace With Drone Threats

Army and Pentagon leaders will discuss the capabilities American warfighters need to win against adversaries at the Potomac Officers Club’s 2026 Army Summit on June 18. Get your tickets today.

Table of Contents

  • How Is the Army Updating Doctrine for Drone Warfare?
  • What Is the Pentagon’s Drone Dominance Initiative?

How Is the Army Updating Doctrine for Drone Warfare?

The Army has reportedly already begun incorporating lessons from recent conflicts, including the war between Russia and Ukraine, into key publications. The service recently rolled out an update to Field Manual 3-0 that introduces new operational imperatives, such as protecting forces from constant observation and using sensors or small unmanned platforms to initiate contact.

The Army’s Combined Arms Doctrine Directorate works with the service’s centers of excellence to develop doctrines. For instance, the Maneuver Center of Excellence is finalizing new guidance on the tactical use of small drones, while the Fires Center of Excellence is updating doctrine to help units counter emerging drone threats, according to the Army.

“Most efforts this past year focused on fielding systems and learning to use them,” stated CADD Director Richard Creed. “As operational forces gain expertise, we can better determine what the doctrine should say.”

What Is the Pentagon’s Drone Dominance Initiative?

The Army’s doctrinal overhaul aligns with the Department of War’s broader push to achieve drone dominance through the rapid fielding and acquisition of low-cost unmanned systems and by strengthening the U.S. drone manufacturing base.

As part of the effort, the Pentagon launched the Drone Dominance Program to accelerate procurement of one-way attack drones, with plans to acquire more than 200,000 systems by 2027. The program uses phased evaluations, including the Gauntlet, where operators test vendor systems in real-world conditions.

In February, the department announced the 25 companies selected to participate in the Gauntlet. DOW expects to award approximately $150 million in prototype delivery orders following the evaluation stage.

Previous 1 … 15 16 17 18 19 … 2,719 Next
News Briefing
I'm Interested In:
Recent Posts
  • William Toti Selected to Perform Duties of Navy Under Secretary
  • Space Force Deploys DARC Early for Space Domain Awareness
  • NRO Awards New Contracts for Multi-Phenomenology Technologies
  • GAO Says SBA Did Not Consistently Report AI Use Cases
About

ExecutiveGov, published by Executive Mosaic, is a site dedicated to the news and headlines in the federal government. ExecutiveGov serves as a news source for the hot topics and issues facing federal government departments and agencies such as Gov 2.0, cybersecurity policy, health IT, green IT and national security. We also aim to spotlight various federal government employees and interview key government executives whose impact resonates beyond their agency.

Read More >>

RSS ExecutiveBiz
  • Cybersec Investments Appoints Former CMMC Leader Stacy Bostjanick as Government Services Strategy VP
  • EVERYWHERE Communications, Parsons Partner on Autonomous Drone Operations
  • IDS Releases Updated CCaR Platform With Embedded AI Capabilities for Acquisition Decision Support
  • DHS Planning $100M Contract for TACTICS Program
  • Jon Shaw Named VP of US Public Sector Sales at BeyondTrust
  • Vantor Books $70M NGA Contract for GEGD Pro GEOINT Platform
RSS GovConWire
  • Space Systems Command to Modify Andromeda IDIQ, Raise Ceiling to $6.24B
  • Viasat Wins $307M Marine Corps MECS2 Satellite Services Contract
  • Oddball Appoints Agata Ciesielski, Drake Rose to Executive Leadership Roles
  • Peraton Names Vishal Tulsian Health, State & Local Sector President
  • KBR Secures $449M LOGCAP V Task Order Modifications for Army Support in EUCOM, Fort Irwin
  • Former L3Harris Executive Christopher Monoski Joins CACI as Executive Vice President of Manufacturing
Executive Gov

Copyright © 2025
Executive Mosaic
All Rights Reserved

  • Executive Mosaic
  • GovCon Wire
  • ExecutiveBiz
  • GovCon Exec Magazine
  • POC
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Go toTop