This page contains a Flash digital edition of a book.
Lockheed Martin


Darrell Durst Program Management Vice President Lockheed Martin Corporation Information Systems & Global Solutions


Darrell Durst has supported the intelligence community for 25 years, and 21 of those years have been with Lockheed Martin. Mr. Durst leads a team of 600 people to deliver cyber technology services for the U.S. government. As vice president of cyber solutions, he is responsible for creating global network defenses that keep information secure and support missions vital to national security. Mr. Durst is responsible for all operations, including program performance, business and financial growth, personnel management, and R&D. His work helps to provide encryption technologies, intrusion detection, cyber training and war gaming.


In 2003, he was named director of the Communications and Electronics group, lead- ing integration efforts for a government agency. Mr. Durst ramped up to vice president, Signals Information Ground Systems, where he led the development and operations for an integrated mission management and intelligence fusion for a government customer. As a member of Lockheed Martin’s Executive Diversity Council, he has served as an ambassa- dor to the corporation’s business diversity councils since 2002.


MITRE


Joel Hypolite Lead Senior Information Security Engineer


Protection of


life and property is important to Joel Hypolite. At one point, he was a volunteer firefighter. He is the principal investigator of a team developing means to detect cyber attacks and to analyze attacks by botnets, or malicious software.


Hypolite’s goal


is to stop rogue programs built to infiltrate, disrupt,


or steal. In previous posts, he lead technical development in MITRE’s Cross Boundary Information Sharing Laboratory, and worked for National Geospatial-Intelligence Agency project. He has also been involved in source code analysis for the Internal Revenue Service and Department of Energy. Previously, he was a captain in the United States Air Force and responsible for the operation and maintenance of mission systems that supported the goals of the U.S. Atomic Energy Detection System and the U.S. National Data Center. MITRE operates federally funded research and development centers for the Department of Defense, the Federal Aviation Ad- ministration, the Internal Revenue Service and U.S. Department of Veterans Affairs, and the Department of Homeland Security. In 2010, Hypolite received the Modern Day Technology


Leader Award at the BEYA Science, Technology, Engineering, and Math (STEM) Global Competitiveness Conference.


www.blackengineer.com


National Institute of Standards and Technology


Ernest McDuffie, Ph.D. Lead, National Initiative for Cyber Security Education (NICE)


The division


was created by the Obama Administra- tion in 2010 to ex- pand cyber security education programs from a federal to a national focus. This was an outgrowth of the Comprehen- sive National Cyber Security Initiative to bolster future generations of Web and digital security specialists.


McDuffie is re- sponsible for getting


the Education Department, the White House’s Office of Science and Technology Policy, and the Office of Personnel Management “to work together to make the country’s computer networks more secure.” Last August, the former officer of the National Coordina- tion Office for Networking, and Information Technology Re- search and Development said NICE has an $18 million budget. A tough part of the job is always answering the question of how much cyber security is enough. McDuffie rhetorically que- ried Government Computer News: “How do you measure secure? Is your system 80 percent secure? 90 percent secure? Nothing is 100 percent secure...One of the things we’re going to be devel- oping is some kind of meaningful metrics for people to apply to their systems.”


McDuffie joined the NIST as a computer scientist in their


Information Technology Laboratory, Office of Federal and Indus- trial Relations.


USBE&IT I WINTER 2010 75


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92