Team Lead: Brian Epley, CIO Commerce
Team: Ryan Higgins, CISO Commerce
Read full write-up
Brian Epley is a visionary CIO whose leadership at the Department of Commerce (DOC) has accelerated secure digital modernization, strengthened mission delivery, and advanced a unified, service-driven approach to technology. He has aggressively modernized cybersecurity protections across the DOC’s multibillion-dollar IT portfolio—safeguarding sensitive data and critical systems supporting agencies such as the Census Bureau and NOAA—while driving enterprise-wide transformation rooted in his prior strategic work at DOE. Since joining Commerce, he has rapidly implemented a cohesive modernization strategy that reduces technical debt, enhances operational agility, and ensures a secure, scalable foundation for mission delivery. Equally committed to the human element, Mr. Epley prioritizes intuitive, user-centered technology and a customer service mindset, making government services more accessible, effective, and responsive to the public and the businesses the department serves.
Team Lead: Montae Brockett, Chief Information Security Officer
Team: Trinadh Reddy, Jasmine Brooks, Sohan Tandukar, Sai Neti, Corey Williams, Martin Yorgov
Read full write-up
The team transformed DHCF’s fragmented compliance process into a unified, automated RegScale GRC ecosystem that delivers real-time governance, dramatically improves efficiency, and strengthens the agency’s ability to safeguard healthcare data. By integrating automated evidence collection, continuous authorization checks, and standardized workflows aligned with HIPAA, NIST 800-53, and OCTO requirements, they reduced manual review time by more than 60%, increased control assessment accuracy by 45%, and enabled tasks that once took weeks to be completed in hours. Their innovative redesign replaced paper-driven processes with dynamic dashboards and real-time control monitoring, allowing DHCF to anticipate risks rather than react to them. Through close collaboration across DHCF offices, OCTO security teams, and RegScale engineers, the team delivered a scalable, enterprise-grade compliance program that accelerates audit readiness, eliminates longstanding bottlenecks, and provides lasting transparency and data-driven decision-making across the agency.
Team Lead: An-Thinh Le, Cybersecurity Operations Lead, NSWC Panama City
Team:
An-Thinh Le, Richard Alva, Franklyn Brognano, Jessy Butzke, Gary Colbert,
Benjamin Ebel, Wendy Hankins, Luke Hayes, Nicholas Horn, Joshua Kim
+ 32 more
Read full write-up
JEXC2 Cybersecurity Operations significantly strengthened the Navy’s expeditionary mission by sustaining 123 deployed Information Systems, developing patches and hotfixes that resolved more than 11,000 critical and high-severity vulnerabilities, and executing four major Maintenance Releases to replace obsolete software and eliminate security weaknesses. Their efforts produced a 78% reduction in Patch System Integration Testing timelines, enhanced ATO risk management across eight authorizations, and delivered seven direct warfighter support visits that improved operational readiness at the tactical edge. The team’s innovative use of Model-Based Systems Engineering, including a new CAMEO-driven process for tracking system hardware, software, and network architecture, revolutionized traceability and enabled a stronger focus on resiliency and survivability. Through close collaboration with Program Offices, ship crews, the NSWCPCD Cybersecurity Community of Practice, and the Security Control Assessor Office, the team accelerated fielding of mission-critical capabilities and strengthened cybersecurity awareness across the fleet. Their work ensured a secure, resilient operational environment that directly supports effective Navy expeditionary operations.
Team Lead: Dr. Frank Ofori, Cyber Security Specialist, U.S. Department of State
Team: Jared Butterfield, Hohsi Huang
Read full write-up
Dr. Frank Ofori led the Department of State’s first-ever design, build, and accreditation of a classified AWS IL6 environment, delivering a fully hardened, zero-trust architecture 38% faster than previous on-premises timelines and enabling secure, scalable Assessment & Authorization operations across global classified networks. Rejecting years-long hardware procurement cycles, he pioneered a modern cloud-based approach that cleared a decade-long A&A backlog, negotiated the first State–AWS Direct Connect classified circuit—cutting latency for overseas posts by 88%—and engineered a Department-wide compliance-as-code framework now enforced across cloud and data center systems. Uniting five major organizations and a 28-person joint team, Dr. Ofori leveraged collaboration tools inside classified environments to transparently track more than 3,400 artifacts and achieve a full IL6 Authority to Operate ahead of schedule, under budget, and with greater capability than originally planned, setting a new standard for secure cloud innovation in the federal government.
Team Lead: Jeffrey Lessie, Cybersecurity Lead, USSOCOM
Team: Phillip Stoops, Curtis Rahman, Taylor Bray, Jared Prather, David Terrell
Read full write-up
The USSOCOM J62 Compliance Team revolutionized how the command identifies and mitigates cyber risk by developing the Cybersecurity Heat Map—an actionable, color-coded dashboard that highlights the highest-risk vulnerabilities across Components and TSOCs rather than overwhelming administrators with thousands of raw findings. Built initially in SharePoint and upgraded in 2025 to a more powerful Microsoft Power BI platform, the Heat Map integrates ACAS scanner data to provide drill-down views of missing patches, “fix-these-first” systems, and other critical compliance metrics, all at minimal cost. Since its deployment, network compliance has improved by more than 31%—with gains concentrated in the areas of greatest risk—and the tool is now briefed weekly at the J6 NETOPS forum to drive rapid remediation and leadership oversight. By giving globally dispersed units a clear view of cyber health and helping system administrators prioritize what matters most, the J62 team solved a long-standing vulnerability management challenge and significantly strengthened USSOCOM’s ability to maintain a secure, resilient operational network.
Team Lead: Jerald Jeffrey - IT Cybersecurity Analyst, City of Winston-Salem, NC
Team: Patti Martin, Todd Haywood, Josh Arnder
Read full write-up
Jerald Jeffrey has demonstrated exceptional innovation and leadership in strengthening cybersecurity across the City of Winston-Salem by redesigning the new-hire cybersecurity program to include modern threats, acceptable AI use, real-world breach analysis, and best practices for securing devices—content now delivered 26 times annually and so effective it is being considered mandatory for all employees. His creative approach extended to Cybersecurity Awareness Month, where he deployed engaging, multi-vendor educational materials and reinforced critical habits like phishing vigilance through memorable messaging that helped shift the city’s security culture. Jerald also exemplifies outstanding collaboration, uniting department heads, vendors, and stakeholders, establishing a team-monitored rapid-response channel, and fostering trust and accountability following a major breach. Through proactive outreach, accessible communication, and a focus on shared responsibility, he has significantly improved organizational resilience, elevated security awareness across all departments, and strengthened partnerships across the broader community.
Team Lead: Rachel Bondi, Director, USN
Team: Duane Phillips, Mark Compton
Read full write-up
The team serves as the Navy’s primary engine for innovative cybersecurity solutions, rapidly incubating, testing, and deploying zero trust capabilities for Fleet Cyber Command and Joint Forces under U.S. Cyber Command. Through their CyberX process—which aligns sponsors, funding sources, and technologies in a unified data tool—they match mission needs with cutting-edge commercial and government solutions, advancing programs of record across the DODIN-N and delivering first-of-their-kind capabilities aligned to MITRE D3FEND for identity, application, data, device, and network security. Drawing on Silicon Valley experience and agile delivery methods, the team works in small, fast-paced increments to translate warfighter requirements and field capabilities within a single quarter rather than traditional multiyear cycles, accelerating tools for cyber operators in tactical and maritime environments. Their extensive partnerships span all Services, DIU, the Defense Industrial Base, academia, and over 150 vendors per quarter, enabling continuous technology scouting and rapid acquisition navigation. By bridging the “skills gap” that often stalls innovation, the team delivers transformative, non-kinetic warfighting capabilities and strengthens the Navy’s operational cybersecurity posture at speed and scale.