Search
Achievements Mr. Uster is a 2020, 2021 and 2022 CIO ORBIE award finalist and was selected to the distinguished list of “Top 100 CIO” by CIO Magazine in 2012. He was also selected as one of WashingtonExec's "Top CIOs to Watch" in 2020 and in 2022.
Achievements Mr. McHugh has 30+ years of experience serving the nation’s intelligence community, including a distinguished 28-year career with the CIA and National Security Agency. He served as chief of station in various Middle Eastern and East European locations and managed several...
Achievements Mr. Pedersen has received the prestigious Eagle Award from Federal Computer Week magazine and twice was named to its highly coveted Federal 100 list. He was selected for “his leadership in the federal technology sector” and as the person from industry “who has gone above and...
All government agencies seek to develop and maintain a modern, agile and effective IT infrastructure. Often, IT modernization means transforming legacy systems into proven simple-to-use systems operating on optimized platforms that deliver the most efficient and easiest end user customer...
With cyberattacks proliferating, organizations the need for real-time, dynamic cyber solutions that defeat penetration on contact to protect vital infrastructure and data from theft, compromise or destruction is critical. Defense, Intelligence Community and federal civilian agencies look...
We interviewed Steve, who is President of ManTech's Federal Civilian Sector. You can view the full interview below: When did you first come to work for ManTech? I started working for ManTech in November 2009, after 10 years with CSC. I chose to join ManTech for several reasons: 1) ManTech...
ACRE® - The ManTech Advanced Cyber Range Environment Learn to respond with tactical speed and effectiveness in real-life cyber attack scenarios through immersion in the most advanced cyber testing, evaluation and training environment. The ManTech Advanced Cyber Range Environment is a...
Insider threats are the cause of some of the biggest security breaches and are very expensive to remediate. They are also among the most damaging threats to national security. And while “shadow brokers” who hack remotely pose a high risk, it is the person at the next desk who does serious...