Team Lead: Brian Epley, CIO Commerce
Team: Ryan Higgins, CISO Commerce
Read full write-up
Brian Epley is a visionary CIO whose leadership at the Department of Commerce (DOC) has accelerated secure digital modernization, strengthened mission delivery, and advanced a unified, service-driven approach to technology. He has aggressively modernized cybersecurity protections across the DOC’s multibillion-dollar IT portfolio—safeguarding sensitive data and critical systems supporting agencies such as the Census Bureau and NOAA—while driving enterprise-wide transformation rooted in his prior strategic work at DOE. Since joining Commerce, he has rapidly implemented a cohesive modernization strategy that reduces technical debt, enhances operational agility, and ensures a secure, scalable foundation for mission delivery. Equally committed to the human element, Mr. Epley prioritizes intuitive, user-centered technology and a customer service mindset, making government services more accessible, effective, and responsive to the public and the businesses the department serves.
Team Lead: Montae Brockett, Chief Information Security Officer
Team: Trinadh Reddy, Jasmine Brooks, Sohan Tandukar, Sai Neti, Corey Williams, Martin Yorgov
Read full write-up
The team transformed DHCF’s fragmented compliance process into a unified, automated RegScale GRC ecosystem that delivers real-time governance, dramatically improves efficiency, and strengthens the agency’s ability to safeguard healthcare data. By integrating automated evidence collection, continuous authorization checks, and standardized workflows aligned with HIPAA, NIST 800-53, and OCTO requirements, they reduced manual review time by more than 60%, increased control assessment accuracy by 45%, and enabled tasks that once took weeks to be completed in hours. Their innovative redesign replaced paper-driven processes with dynamic dashboards and real-time control monitoring, allowing DHCF to anticipate risks rather than react to them. Through close collaboration across DHCF offices, OCTO security teams, and RegScale engineers, the team delivered a scalable, enterprise-grade compliance program that accelerates audit readiness, eliminates longstanding bottlenecks, and provides lasting transparency and data-driven decision-making across the agency.
Team Lead: An-Thinh Le, Cybersecurity Operations Lead, NSWC Panama City
Team:
An-Thinh Le, Richard Alva, Franklyn Brognano, Jessy Butzke, Gary Colbert,
Benjamin Ebel, Wendy Hankins, Luke Hayes, Nicholas Horn, Joshua Kim
+ 32 more
Read full write-up
JEXC2 Cybersecurity Operations significantly strengthened the Navy’s expeditionary mission by sustaining 123 deployed Information Systems, developing patches and hotfixes that resolved more than 11,000 critical and high-severity vulnerabilities, and executing four major Maintenance Releases to replace obsolete software and eliminate security weaknesses. Their efforts produced a 78% reduction in Patch System Integration Testing timelines, enhanced ATO risk management across eight authorizations, and delivered seven direct warfighter support visits that improved operational readiness at the tactical edge. The team’s innovative use of Model-Based Systems Engineering, including a new CAMEO-driven process for tracking system hardware, software, and network architecture, revolutionized traceability and enabled a stronger focus on resiliency and survivability. Through close collaboration with Program Offices, ship crews, the NSWCPCD Cybersecurity Community of Practice, and the Security Control Assessor Office, the team accelerated fielding of mission-critical capabilities and strengthened cybersecurity awareness across the fleet. Their work ensured a secure, resilient operational environment that directly supports effective Navy expeditionary operations.
Team Lead: Dr. Frank Ofori, Cyber Security Specialist, U.S. Department of State
Team: Jared Butterfield, Hohsi Huang
Read full write-up
Dr. Frank Ofori led the Department of State’s first-ever design, build, and accreditation of a classified AWS IL6 environment, delivering a fully hardened, zero-trust architecture 38% faster than previous on-premises timelines and enabling secure, scalable Assessment & Authorization operations across global classified networks. Rejecting years-long hardware procurement cycles, he pioneered a modern cloud-based approach that cleared a decade-long A&A backlog, negotiated the first State–AWS Direct Connect classified circuit—cutting latency for overseas posts by 88%—and engineered a Department-wide compliance-as-code framework now enforced across cloud and data center systems. Uniting five major organizations and a 28-person joint team, Dr. Ofori leveraged collaboration tools inside classified environments to transparently track more than 3,400 artifacts and achieve a full IL6 Authority to Operate ahead of schedule, under budget, and with greater capability than originally planned, setting a new standard for secure cloud innovation in the federal government.
Team Lead: Phillip Stoops, Cybersecurity Compliance Chief, USSOCOM
Team: Jeffrey Lessie, Curtis Rahman, Taylor Bray, Jared Prather, David Terrell
Read full write-up
The USSOCOM J62 Compliance Team revolutionized how the command identifies and mitigates cyber risk by developing the Cybersecurity Heat Map—an actionable, color-coded dashboard that highlights the highest-risk vulnerabilities across Components and TSOCs rather than overwhelming administrators with thousands of raw findings. Built initially in SharePoint and upgraded in 2025 to a more powerful Microsoft Power BI platform, the Heat Map integrates ACAS scanner data to provide drill-down views of missing patches, “fix-these-first” systems, and other critical compliance metrics, all at minimal cost. Since its deployment, network compliance has improved by more than 31%—with gains concentrated in the areas of greatest risk—and the tool is now briefed weekly at the J6 NETOPS forum to drive rapid remediation and leadership oversight. By giving globally dispersed units a clear view of cyber health and helping system administrators prioritize what matters most, the J62 team solved a long-standing vulnerability management challenge and significantly strengthened USSOCOM’s ability to maintain a secure, resilient operational network.
Team Lead: Jerald Jeffrey - IT Cybersecurity Analyst, City of Winston-Salem, NC
Team: Patti Martin, Todd Haywood, Josh Arnder
Read full write-up
Jerald Jeffrey has demonstrated exceptional innovation and leadership in strengthening cybersecurity across the City of Winston-Salem by redesigning the new-hire cybersecurity program to include modern threats, acceptable AI use, real-world breach analysis, and best practices for securing devices—content now delivered 26 times annually and so effective it is being considered mandatory for all employees. His creative approach extended to Cybersecurity Awareness Month, where he deployed engaging, multi-vendor educational materials and reinforced critical habits like phishing vigilance through memorable messaging that helped shift the city’s security culture. Jerald also exemplifies outstanding collaboration, uniting department heads, vendors, and stakeholders, establishing a team-monitored rapid-response channel, and fostering trust and accountability following a major breach. Through proactive outreach, accessible communication, and a focus on shared responsibility, he has significantly improved organizational resilience, elevated security awareness across all departments, and strengthened partnerships across the broader community.
Team Lead: Rachel Bondi, Director, USN
Team: Duane Phillips, Mark Compton
Read full write-up
The team serves as the Navy’s primary engine for innovative cybersecurity solutions, rapidly incubating, testing, and deploying zero trust capabilities for Fleet Cyber Command and Joint Forces under U.S. Cyber Command. Through their CyberX process—which aligns sponsors, funding sources, and technologies in a unified data tool—they match mission needs with cutting-edge commercial and government solutions, advancing programs of record across the DODIN-N and delivering first-of-their-kind capabilities aligned to MITRE D3FEND for identity, application, data, device, and network security. Drawing on Silicon Valley experience and agile delivery methods, the team works in small, fast-paced increments to translate warfighter requirements and field capabilities within a single quarter rather than traditional multiyear cycles, accelerating tools for cyber operators in tactical and maritime environments. Their extensive partnerships span all Services, DIU, the Defense Industrial Base, academia, and over 150 vendors per quarter, enabling continuous technology scouting and rapid acquisition navigation. By bridging the “skills gap” that often stalls innovation, the team delivers transformative, non-kinetic warfighting capabilities and strengthens the Navy’s operational cybersecurity posture at speed and scale.
Team Lead: Timothy Goodwin
Team: Antonio Brown
Read full write-up
USPTO CISO Tim Goodwin has fundamentally strengthened the protection of millions of patent and trademark records by shifting the agency from reactive cybersecurity to a proactive, predictive defense model that safeguards one of America’s most valuable innovation assets. He led one of the most ambitious MFA transformations in the federal civilian space—eliminating SMS, email, and other vulnerable authentication methods and coordinating across 20+ product teams, cloud platforms, legacy systems, and more than 100,000 external customers to implement secure, modern MFA for all users. Goodwin also drove a sweeping DevSecOps evolution, launching an innovative internal campaign that empowered peer “cyber champions,” delivered new office hours, training, and collaboration channels, and enabled more than 100 development teams to adopt secure-by-design practices that remediate vulnerabilities earlier, protect mission systems, and ensure compliance. His leadership created a true culture shift: 14,000 employees now understand their role as the first line of defense, while 200 product teams embed automated security controls, standardized incident playbooks, and cloud-based misconfiguration detection directly into daily workflows. Through automation, collaboration, and strategic vision, Goodwin has reduced vulnerabilities, accelerated delivery, and built an enduring enterprise cybersecurity program that protects critical data and ensures uninterrupted mission operations for the USPTO.
Team Lead: Lawrence Hale, Acting Assistant Commissioner, Information Technology Category, GSA
Team: Giovanni Onwuchekwa, Jeanine Tyson, Nicole Gima, Keierrah Beasley, Pierre Williams, Theodore Williamson, Terence Rountree, Albert Ingram, Jeannette Grover, Mohammad Abul-Hawa
Read full write-up
Giovanni Onwuchekwa, Terence Rountree, and the SCRIPTS Team delivered a first-of-its-kind, governmentwide acquisition solution for Supply Chain Risk Illumination Professional Tools and Services (SCRIPTS), providing federal agencies with a shared capability to screen, vet, and continuously monitor suppliers for cybersecurity, foreign ownership, compliance, and financial risk. Through the creation of multiple-award BPAs, the team replaced fragmented, agency-specific approaches with a scalable, secure model aligned with Executive Order 13873 and Federal Acquisition Security Council priorities. SCRIPTS is already delivering measurable impact: a GSA Agile Acquisition Unit pilot has enabled $5.1 million in orders, achieved line-item savings of up to 98%, and reduced acquisition timelines to an average of just nine days from final requirements to award. Built through close collaboration with the Department of Defense, FASC, legal and cybersecurity experts, small businesses, and internal GSA stakeholders, the solution supports both classified and unclassified environments and streamlines secure data sharing across agencies. SCRIPTS fundamentally transforms how the federal government manages supply chain risk, strengthening mission resilience while delivering lasting value through speed, cost savings, and enterprise-wide coordination.
Team Lead: Jason Belford, Chief Information Security Officer, Information Technology Services at the City of Alexandria , VA
Team: Scott Sutherland, Tiffany Searcy, and Tony Houdek
Read full write-up
Over the past year, Jason Belford led a comprehensive cybersecurity transformation that significantly strengthened the City’s operational resilience, security posture, and service delivery across more than 40 departments. He stabilized and accelerated vulnerability scanning—reducing turnaround from days to hours—migrated monitoring and detection tools to the cloud to lower administrative overhead, optimized log management to reduce data volume and licensing costs, and implemented a 24/7 managed detection and response capability that enables real-time threat response. Jason also applied AI-driven automation to modernize information risk assessments, cutting timelines from weeks to just 2–4 hours, standardizing evaluations, and improving audit readiness and decision-making. His leadership extended to deploying zero trust network access for more than 2,000 users, eliminating legacy VPN complexity, reducing login times from minutes to under two, and improving workforce productivity. Equally impactful was his collaborative approach—working with Legal, Audit, HR, Communications, and Emergency Management to modernize policies, develop and exercise a robust incident response plan, strengthen password and phishing defenses, and reinforce cybersecurity as a shared responsibility. Through technical innovation, operational discipline, and cross-functional leadership, Jason delivered lasting improvements in security, compliance, and the City’s ability to deliver secure public services.
Team Lead: Dustin Hughes, LWRF Lab Manager, NSWC PCD
Team: Jake Wobser, Keith Taylor, Russell Mace, Trace Russell, Gary Bills, Janice Cook and Frank Bobe
Read full write-up
The Littoral Warfare Research Facility (LWRF) RDT&E Lab has become a model of collaborative, mission-focused IT support by breaking down silos across NSWC PCD and partnering closely with other RDT&E labs to rapidly solve complex technical and cybersecurity challenges. By openly documenting and sharing solutions—such as resolving a cyber issue that blocked LABVIEW installation at another lab—and adopting best practices for remediation and patching from peer organizations, the team streamlined compliance processes and redirected effort toward direct mission support. LWRF also transformed how hardware and software are acquired by proactively managing commonly used tools, including enterprise MATLAB licenses and toolboxes, enabling rapid response to shifting project demands while eliminating duplicative purchases and unnecessary costs. Supporting approximately 140 scientists, engineers, and technicians across mission areas including Mine Warfare, Subsea and Seabed Warfare, and Maritime Special Programs, the team delivers highly customized IT environments built from secure baseline images and tailored to individual project needs. Through early coordination for new hires, deep technical expertise across multiple operating systems and hundreds of applications, and a customer-first mindset, LWRF ensures users have the tools they need on day one—directly accelerating research execution and strengthening the Command’s ability to deliver critical warfighting capabilities.
Team Lead: Christopher Nappier, IT Project Manager, Drug Enforcement Administration
Team: Anthony Scott , Thomas Chadwick, Sovandaro Thach, Winrich DeGuzman, Waarith Muhammad-Abdullah, Rafael Johnson, Tauris Fuller, Robert H. Knapp
Read full write-up
The DEA Zero Trust Initiative Team delivered a major advancement in identity security by leading the global rollout of PIV-I–enabled FIDO phishing-resistant multi-factor authentication, providing strong, passwordless authentication to a highly distributed workforce that previously lacked reliable access to PIV credentials. By eliminating weak legacy authentication methods and advancing a phishing-resistant, zero-trust identity model, the team met federal Zero Trust mandates while significantly reducing user friction and operational risk. Rather than treating PIV-I and FIDO as competing technologies, the team took a thoughtful, policy-aligned approach to integrate them in a way that works naturally for agents and staff in the field. Their collaborative mindset brought security, identity, and operational stakeholders together early, fostering alignment and accelerating adoption without shortcuts or added risk. Through forward-thinking design, clear communication, and durable partnerships, the team established a scalable, resilient identity infrastructure that strengthens DEA’s cybersecurity posture while enabling personnel to stay focused on critical enforcement missions.
Team Lead: Brad Searle, Deputy CDAO and Cloud Team – Enterprise Generative AI Lead, Department of the Navy (DON)
Team: Tara Jones, Sean O’Reilly, Christopher Wall, Lisbeth Santana - Justin Wernoski - Robert Murray - Christopher Figueroa, Arthur Reppel, Leyah King, Alicia Murphy, Fallon Carrico, Christopher Curwood, Stephanie Alvey, Jamie Haynes, Kevin Fallin, Hans Lasher, Curtis Haney, Brennan Sahut, Alex Angermeier, Mike Hill, Christi Lee, Jason Christopher, Donald Balcom
Read full write-up
Brad Searle led NAVAIR’s enterprise generative AI modernization by delivering the Navy’s first fully authorized GenAI platform in just eight months—cutting the typical 12–15-month ATO timeline nearly in half—while ensuring secure, traceable, and mission-aligned adoption at scale. By closing data-security gaps and deploying responsible GenAI infrastructure with advanced capabilities such as API access and model context protocols, he enabled safe use across engineering, logistics, acquisition, administration, and aircraft safety analysis, informed by more than 700 workforce use cases. Brad drove measurable efficiency gains, reducing annual-review processing time from up to two hours to as little as 20–30 minutes per employee, saving 30–60% of supervisor time. To build trust and transparency, he pioneered a cybersecurity benchmarking approach using adversarial testing to rapidly assess model risk, and applied GenAI itself to streamline complex ATO preparation by mapping hundreds of security controls in days rather than weeks. Through close collaboration with cyber authorizing officials, DON leadership, SYSCOMs, fleet and warfare center stakeholders, and key industry partners, Brad removed organizational and policy barriers, accelerated approval, and established a repeatable enterprise blueprint for responsible GenAI adoption—strengthening readiness and enabling scalable, secure modernization across NAVAIR and the Department of the Navy.