IS&GS-Defense & Intelligence Solutions
Enterprise Information Technology Solutions
Christopher (Chris) Kearns is the Vice President of Enterprise Information Technology Solutions within Lockheed Martin’s Information Systems and Global Solutions (IS&GS)-Defense & Intelligence Solutions business. In this role, he is responsible for leading Lockheed Martin Corporation’s information technology business serving U.S. Department of Defense customers. The scope of these programs include the operation and cyber defense of critical national infrastructure, the management of private datacenters and high performance computing laboratories, migration and security of cloud computing used by the DoD, and mission and enterprise application management.
Previously, Mr. Kearns was the Program Director for the Defense Information Systems Agency (DISA) programs. He led a global team of more than 1,000 engineers, technicians, and cyber analysts across approximately 40 partner companies and small businesses. In that role, Mr. Kearns was responsible for leading the operations, maintenance and cyber network defense activities for the DoD Information Network.
Mr. Kearns has also served as the director of Desktop Services for Lockheed Martin’s Enterprise Business Services (EBS). In that role he managed the corporation’s desktop portfolio including the strategy, service desk, technology projects, and operations for 140,000 desktop devices, 50,000 mobile and telecommunication devices, messaging accounts for 150,000 employees and partners, and more than 20 terabytes of data for engineering and business information systems. He has also held roles as the Operations Director for the Center for Leadership Excellence (CLE) and program management roles in the CIO organization.
Chris holds a master’s degree in information science from Pennsylvania State University and a bachelor’s degree in electrical engineering from the University of Scranton. He serves on the Industrial Advisory Board to the Engineering Department at the University of Scranton. He is an adjunct professor at Temple University’s Fox School of Business. In 2015, he was recognized as one of Federal Computing Week’s Top 100 Executives.
Dr. Prunier has 15+ years of experience in information technology specifically in the areas of cyber security, incident response, and computer forensics. Dr. Prunier is the engineering and cyber capabilities sr. manager and provided expert support in the areas of forensics and incident response. Dr. Prunier has supported cyber efforts for multiple government and civilian agencies to include the Executive Office of the President of the United States.
Dr. Prunier has a Bachelor’s Degree in Computer Operation Technology from Southwestern College, a Master’s Degree in the Management of Information Technology from Webster University, and a Doctorate in Computer Science from Colorado Technical University. Dr. Prunier is a Certified Information System Security Professional (CISSP) and has held various certifications in Security and Forensics.
Dr. Prunier is a Professor at Colorado Technical University in the Doctorial Computer Science Program. Dr. Prunier is published and has presented at professional conferences to include ISC2 World Congress 2014, Guidance Software Forensic Conference 2013 SC Congress 2010, CSI Conference 2009 and 2010. Dr. Prunier was a member of the 44th President of the United States Cyber Collaboration Task Force, Columbia University Future Tech Panel and the National Sheriff’s Associations Computer Technology Panel.
Kim Trieu attended James Madison University and holds a BS degree in Computer Science. He has dedicated most of his professional career in support of both private and Government agencies. Mr. “Kim” has demonstrated exceptional leadership within Lockheed Martin in his 9 year tenure with the company. His superb skills and talents have been recognized by Lockheed Martin’s government customer, and have shaped the views of senior community leaders.
Kim brings with him 17+ years of cyber security experience supporting defensive programs. His drive and dedication for mission success has helped him become noticed by Lockheed leadership and he thrives in difficult assignments. He has led several high profile cyber assignments and has won the 2012 Most Promising Asian American Engineer Award industry award from AAEOY. Kim has provided his technical expertise to some high profile incident response efforts for the Executive Office of the White House, DHS, DoE and DoD. He has traveled CONUS and OCONUS to assess and stand up Security Operation Centers for sensitive national programs. As well as technically executing customer missions he also is a senior cyber security instructor for Lockheed training internal and external customer sets in the cyber trade craft.
He has served as a program manager leading several Task Orders and subcontractors and supports various cyber defensive operations on multiple progams. He has both strong technical and program management experience and has leveraged his experience to successfully execute those missions. Most recently he has supported LM-CIRT, Executive Office of the President White House, Defense Cyber Crime Center DC3, National Threat Operations Center.
Katie Grzywacz is a security engineer with over eleven years of experience at Lockheed Martin. Her expertise includes penetration testing, application security testing, secure coding, secure software engineering, and architecture risk analysis. A graduate of Lockheed Martin’s Information Systems Leadership Development Program, she has prior experience that includes red teaming, application security engineering, and software engineering. She has a depth of experience that ranges from Fortune 500 companies to government agencies to internal programs at Lockheed Martin. Katie has a Master’s in Information Technology from Rensselaer Polytechnic and a Bachelor’s from Pennsylvania State University.
GPEN, GREM, CEH, Security+/Cyber Intel Analyst
Aaron is Cyber Intel Analyst for Lockheed Martin with over 9 years of professional experience in cyber security. Aaron’s areas of focus in the cyber security realm include vulnerability assessments, penetration testing, and more recently incident response and malware reverse engineering. He has led and participated in penetration testing and vulnerability assessments in corporate networks, SCADA/substation environments, smart grid components, US DoD and Intelligence networks. His current assignment is as one of the lead analyst for White House Communications Agency’s SOC (Security Operation Center) where he performs monitoring and initial detection for all attacks directed against White House assets. Aaron graduated with a B.S. in Computer Engineering from the University of Delaware and currently has the following certifications: SANS Reverse Engineering Malware (GREM), SANS Network Penetration Testing (GPEN), Certified Ethical Hacker (CEH) and Security+.