Red Hat’s David Egts: Agencies Should Look Into Existing Tech Capabilities Before Making New Investments

David Egts

TYSONS CORNER, VA, February 15, 2019 — David Egts, chief technologist for Red Hat‘s (NYSE: RHT) North American public sector business, has said government agencies can collaborate with vendors to determine if their existing technology delivers the agency’s needed security capabilities, ExecutiveBiz reported Feb. 6.

Egts wrote in a guest piece published Feb. 5 that vendors, as well as various federal information technology communities and other resources, can help guide agencies’ technology investment decisions and optimize the use of their current technology stack without the need to procure new applications.

About Executive Mosaic: Founded in 2002, Executive Mosaic is a leadership organization and media company. Executive Mosaic offers highly coveted executive events, breaking business news on the Government Contracting industry, and robust and reliable content through seven influential websites and four consequential E-newswires. Headquarters are located in Tysons Corner, VA. www.executivemosaic.com

You may also be interested in...

7th Annual Defense Research and Development Summit

Potomac Officers Club to Host 7th Annual R&D Summit TODAY; Learn More About Event Speakers

During Potomac Officers Club’s 7th Annual Defense Research and Development (R&D) Summit, notable federal and industry leaders will meet to discuss the latest priorities across the R&D landscape. The summit will feature Dr. Mark Lewis, Rear Adm. Lorin Selby and Dr. Victoria Coleman as keynote speakers. To register for the 7th Annual Defense R&D Summit, as well as view upcoming opportunities, visit Potomac Officers Club’s Event Page

Sean Berg President

Forcepoint’s Sean Berg Suggests Zero Trust, Behavioral Analytics, Continuous Monitoring Combination for Gov’t Cybersecurity

TYSONS CORNER, VA, January 13, 2021 — Sean Berg, president of Forcepoint's global governments and critical infrastructure business, has said combining a zero-trust architecture, continuous monitoring tools and behavioral analytics would allow agencies to authenticate users and prevent unauthorized network access, ExecutiveBiz reported Thursday.