The Top 5 Insights for Government from Sea-Air-Space聽2026聽

Sea-Air-Space 2026 convened naval leaders, defense technologists and industry partners with renewed urgency. Across panels, one message resonated clearly: the United States cannot sustain maritime superiority through technology and tactics alone. The industrial, organizational and digital foundations of naval power are being re-examined and, in many cases, rebuilt. 

From domestic shipbuilding to space-enabled operational speed and the cultural transformation modern cybersecurity requires, the conference presented a sea services enterprise in motion.  

Five critical insights emerged to define the path forward for naval readiness in an era of sustained great power competition.  

Shipbuilding Strength Starts with Industrial and Commercial Foundations 

Panel discussions on maritime dominance challenged the foundational assumption that naval strength begins with warships 鈥 it starts with the economics and infrastructure behind it.  To put this in prospective, the United States was a world leader in shipbuilding up until 1975.  Today we build less than .1% of global commercial ships, and China has become the #1 global shipbuilder followed by South Korea and Japan.  Without a self-sustaining domestic shipbuilding sector anchored in commercial demand, the U.S. cannot field or sustain the naval force it needs. This is a strategic imperative. 

Assured shipping access emerged as a critical operational concern. In crisis, the assumption that commercial shipping will always be available dissolves as capacity reprices, realigns and becomes politically unavailable. This gap between theoretical and reliable access directly affects forward naval operations, contested logistics and distributed maritime operations that depend on commercial sealift. 

The policy implication that maritime power cannot be separated from maritime commerce is clear. Deregulatory frameworks, investment incentives and alignment across Government agencies were cited as necessary conditions, not peripheral considerations, for restoring the industrial base to include maintenance and repair, that will deliver naval deterrence credible and sustainable. 

Force Design Modernization Demands Speed, Scale and Cost Discipline 

Lt. Gen. Paul Rock and the Marine Corps leaders framed Force Design not as a completed transformation but as an ongoing operational imperative. The shift from legacy formations toward multi-domain distribution across the littorals, with reduced signature and expanded logistics reach, requires industry to deliver capability faster, at greater volume and at a sustainable cost structure. Uniformed and industry panelists alike returned to speed, scale and cost as the defining metrics of partnership value. 

Logistics modernization stood out as a near-term priority. Maj. Gen. Andy Niebel, Assistant Deputy Commandant for Installation and Logistics, described sustaining distributed forces forward as a defining Force Design execution challenge especially in a contested environment. Advanced manufacturing, including producing and repairing components at forward locations and resolving technical data rights barriers, were highlighted as targets for industry engagement. Rear-echelon sustainment alone cannot support the dispersed, low-signature posture Force Design envisions.  

Admiral (Ret) Mike Rogers, former Commander of U.S. Cyber Command and National Security Agency, also emphasized engaging industry at the 鈥減roblem level鈥 rather than the 鈥渟olution level鈥 by presenting operational deficiencies to the Private Sector instead of prescribing widget requirements. This approach unlocks more solutions and better leverages innovation from non-traditional suppliers, dual-use technology providers and venture-backed entrants into the defense industrial ecosystem. 

Space is the Enabling Domain for Every Other Domain of Operations 

Multi-domain integration discussions reinforced the principle that space is not one domain among equals. It is the foundational layer upon which sea, air, land and cyber operations depend on timing, navigation, targeting and communications. Rear Admiral Tracy Hines, Deputy Director of Global Space Operations at U.S. Space Command, noted that no military operation of consequence occurs today without space as an enabler, a reality our adversaries have designed capabilities to exploit. 

The Space Development Agency鈥檚 (SDA) acquisition model is a template for delivering space capabilities at operational speed. By structuring satellite constellations around two-year launch cycles with five-year satellite lifetimes, SDA compresses traditional spiral development into a continuous refresh cycle, limiting requirements creep, maintaining technological currency and ensuring the architecture evolves faster than adversary counter-space capabilities. 

Developing dedicated maritime space officers and a trained sea services cadre was cited as essential to realizing this capability. Space domain awareness, or understanding the real-time health, availability and vulnerability of orbital and terrestrial space assets, requires personnel who understand both the naval operating environment and the physics and threat dynamics of space. Artificial intelligence (AI) tools are increasingly helping analysts manage the volume and complexity of space situational data. 

Cyber Resilience Requires Visibility into Operational Technology 

Cybersecurity panelists drew a distinction with significant implications for naval acquisition and maintenance: Operational Technology (OT) presents a fundamentally different threat surface than traditional IT. Legacy systems built decades ago without cybersecurity in mind are now network-connected, creating vulnerabilities that adversaries are actively seeking to exploit across afloat and shore infrastructure. 

Coast Guard leaders highlighted their model of deploying cyber protection teams to assess port and maritime transportation systems, treating cybersecurity readiness as part of physical safety and operational resilience. The emphasis was not on perfect security but maintaining impact and the ability to respond and recover after penetration, making resilience the goal rather than prevention alone. 

Building cyber resilience at scale requires cultural and technological change. Panelists noted that cybersecurity must evolve from an individual compliance exercise to a shared organizational process where intelligence flows directly to operators, vulnerabilities are treated as tactical liabilities and industry partnerships provide reach and expertise no single service can generate internally. AI was identified as valuable for managing threat noise, prioritizing response actions and balancing speed with security. 

Interoperability Is Won Through the Convergence of Training and Technology 

Interoperability discussions returned to the lesson that technological superiority does not guarantee operational success. The most capable systems deliver a decisive advantage only when operators are trained to employ them together across services, with coalition partners and in degraded communications and distributed command environments. Admiral Thad Allen, former Commandant of the U.S. Coast Guard, framed joint maritime interoperability not as a coordination challenge, but as a warfighting imperative built into training regimens, not assumed from capability inventories. 

Ms. Barbara Supplee, Executive Vice President of the Army and Navy Business Group at SAIC, cited AI as a meaningful interoperability accelerator when applied to the right problems, including reducing operational data processing time, helping communities get ahead of emerging threats and enabling distributed forces to maintain a coherent common operating picture. But panelists cautioned that AI adoption must be paired with institutional investment in training operators to use new tools effectively, not simply acquiring them. 

Panelists emphasized that the most valuable interoperability gains come from working through complexity together by embedding analysts and operators with joint and industry partners, surfacing unit-level capability gaps and designing experiments that change one variable at a time to generate actionable insight. The sea services are making progress, but leaders were clear that integration must accelerate to match how quickly adversaries are learning to operate across domains simultaneously. 

Sea-Air-Space 2026 reinforced that sustainable maritime superiority requires synchronized investment across industrial foundations, space capabilities, cyber resilience, Force Design execution and multi-domain training. The seas services are not simply fielding new platforms; they are rethinking the economic, organizational and technological systems that generate and sustain naval power. Progress depends on industry partners that understand the full challenge and can deliver at the speed, scale and cost the mission demands. 

Explore 探花视频鈥檚 defense portfolio of leading solutions that support naval modernization priorities including AI, cybersecurity, cloud infrastructure and advanced analytics. 

Contact the Aerospace and Maritime team at DOW@carahsoft.com or (888) 662-2724 to discuss how 探花视频鈥檚 technology partners can support your mission requirements. 

TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More聽

Technology is a vital part of the United States Department of Defense (DoD)鈥檚 capabilities, making security and enhancements essential to the nation’s stability and growth. AFCEA International鈥檚 flagship event, TechNet Cyber, emphasizes the role of cybersecurity and IT within the DoD. Alongside its partners, such as such as Amazon Web Services (AWS), Everfox and Ciena, 探花视频 attended TechNet Cyber to support DoD mission objectives. 探花视频 maintains a unique position in the defense industry with the ability to connect DoD and intelligence community (IC) personnel, Government IT decision-makers, thought leaders and industry and vendor partners. At this year鈥檚 conference, leaders and operators in the IT and Defense Department joined to network, facilitate problem solving and explore ways to expedite and secure the procurement process.


Expanding Zero Trust: 鈥淔lank Speed鈥 is Ready to Scale聽

To safeguard against potential cybersecurity attacks, the DoD is working to secure its networks with Zero Trust, a security strategy focused on identity, credential and access management. In the session 鈥淒oD Zero Trust Success Stories,鈥 David Voelker, Zero Trust Architecture Lead for the Department of the Navy, discussed recent initiatives to bolster Zero Trust within Flank Speed, the Navy鈥檚 single enterprise solution that provides productivity tools, collaboration tools and OneDrive storage. The Department of the Navy is planning to conduct autonomous penetration testing to determine the quality of Zero Trust capability implementation. Last year Flank Speed met 151 of 152 Zero Trust activities, meeting target far ahead of schedule. Flank Speed is the Navy鈥檚 single enterprise Microsoft 365 solution that provides productivity tools, collaboration tools and OneDrive storage.

Another speaker, Ian Leatherman, the Zero Trust Strategy Lead for Microsoft U.S. Federal, discussed key takeaways from 惭颈肠谤辞蝉辞蹿迟鈥檚 work with Flank Speed. Visibility into agency networks is critical to emboldening existing Zero Trust strategies. Mr. Leatherman stated, 鈥淲hen in doubt, collect the telemetry: you never know what new or novel adversary techniques you may find.鈥 Knowing exactly how many endpoints, applications and users are on the network at any given time positions the DoD to swiftly deal with incoming threats. 

Leatherman also discussed recent initiatives to involve all Navy personnel in a cybersecurity strategy; security is more than a technology solution, but a way to ensure safety within the agency. David Voelker, Zero Trust Architecture Lead at the Department of the Navy echoes this statement. While the Zero Trust Portfolio Office set their DoD-wide Zero Trust adoption target as the end of fiscal year 2027, Flank Speed is already operational. Voelker notes that the Flank Speed configuration could be lifted and shifted to other customers in the DoD, with a quick deployment time of under 24 hours. Mr. Voelker also recommends automating this shift.  

探花视频 and our vendor partners offer several cybersecurity solutions to help Government agencies implement Zero Trust architectures that protect critical information and reduce national security risk. Our offerings align with Public Sector Zero Trust maturity models developed by NIST, the DoD and CISA.  


探花视频, TechNet, blog, embedded image, 2025

How Mission Objectives Drive Acquisition聽聽

Acquiring powerful, up-to-date technology enables the DoD to protect against persistent and increasingly sophisticated cyber-attacks. The DoD aims to streamline its procurement process to maintain pace and safeguard against attacks. In the session 鈥淒oD Software Modernization Senior Steering Group,鈥 speaker Sean Brady, Senior Lead for Software Acquisition Enablers at the Office of the Undersecretary of Defense (Acquisition and Sustainment), explained that there are two key drivers to this transformation. The first is mission objectives; software should be tailored to allow the DoD to adapt its systems to rapidly changing threats. The second is access to commercial innovation, which allows the DoD to access products in weeks or months rather than years.  


Digital Transformation for Operational Effectiveness聽

Digital transformation in the DoD is crucial for maintaining pace with an increasingly technology-driven security environment. Thomas W. Simms, Principal Deputy Executive Director for Systems Engineering and Architecture at the Office of the Under Secretary of Defense for Research and Engineering, discussed the major digital transformation efforts within the DoD. 

The main four are: 

  1. , a congressional requirement that integrates technical and business strategies to promote acquisition and drives modular designs 
  1. The DoD鈥檚 , which requires programs to use digital engineering in their design process 
  1. Application Program Interfaces (APIs), a ruleset that allows communication between software applications and is driven by the DoD鈥檚 guidebook, which enables the DoD to become more data-centric   
  1. The DoD鈥檚 Guidebook, which is currently undergoing an update to incorporate guidance from the Secretary of Defense鈥檚 latest memos  

By modernizing legacy systems and enabling the DoD to acquire the newest and greatest in IT, these initiatives enhance operational effectiveness and improve decision-making speed.


Fast-Tracking Authority to Operate (ATO)聽

In the defense industry, technology must be approved to mitigate security risks. The a process that expedites software verification within the U.S. Government, is changing the way the DoD manages risks and conducts Authority to Operate (ATO). Contractors can get involved with the latest software acquisition and risk management changes by participating in the three recently released requests for information (RFIs).  

These RFIs, which close May 20th, are: 

  •  
  •  
  •  

Katie Arrington, the Acting DoD Chief Information Officer (CIO), also discussed the set to launch on June 1st of this year. The initiative will replace the traditional Authority to Operate (ATO) structure and add a few requirements, such as third-party Software Bill of Materials (SBOM), third-party risk assessments and the population of Enterprise Mission Assurance Support Service (eMASS) with artifacts. Once these guidelines are in place, contractors will gain a Provisional ATO. 

Ms. Arrington attests that these changes will revolutionize the Risk Management Framework (RMF) by allowing industry experts to provide feedback to the DoD. Paper compliance isn鈥檛 enough anymore, Ms. Arrington says. The DoD is looking for 鈥渃ontinuous monitoring, red-teaming and people to continually evaluate their capability.鈥  

She also added that the DoD will be sunsetting the Approved Products List (APL). Additional sponsor additions are no longer being accepted. Instead, the SWFT initiative will take over, establishing a 鈥渢rust, but verify鈥 procedure, promoting both security and swift ATO action.


Using Interoperability to Pitch to DoD聽

As operations increasingly move online, interoperability becomes increasingly important to efficiency and accessibility. Venice Goodwin, the outgoing CIO for the Department of the Air Force, offered advice to industry professionals on navigating changes within DoD. Goodwin recommends that the industry practice 鈥渆xtreme teaming;鈥 rather than service each department individually: vendors should focus on servicing the DoD as a whole. As the DoD prioritizes capabilities that have cross-departmental benefits, industry experts should demonstrate the effectiveness of their capabilities and solutions in every domain across land, sea, air and space. With this collaboration, both the Private and Public Sector can get the results they need.


The digital transformation journey within the Department of Defense represents not just an evolution of systems, but a commitment to defending interests at home and abroad. Acquisition, ATO and Zero Trust are all valuable assets to maintaining pace with the current, constantly evolving technological climate, ensuring the United States carries out its mission of protecting the nation. 

To learn more about mission-critical technology, visit 探花视频鈥檚 defense portfolio to explore solutions showcased at TechNet Cyber. For additional research into the key takeaways that industry and Government leaders presented at TechNet Cyber, view 探花视频鈥檚 full synopsis of key sessions from the tradeshow.鈥 

Healthcare Program Executive: HIMSS 2025: Top 5 Insights

At the Healthcare Information and Management Systems Society (HIMSS) Global Health Conference and Exhibition 2025, health IT professionals, healthcare personnel and Government leaders joined to connect on the latest trends in the healthcare industry. As a provider and distributor of health IT solutions, 探花视频 and its partners are equipped to communicate recent trends and connect care providers, agencies and companies with the technology they need to embrace the future of healthcare. 

Here are the top 5 insights for the technology industry and Government from this year鈥檚 conference.鈥 


1. Utilizing Artificial Intelligence in Healthcare  

Healthcare must ensure all provided tools are safe, effective and ethical to ensure the best outcomes for patients. As the widespread adoption of artificial intelligence in the healthcare industry is relatively new, providers and public health officials should employ risk management practices, strong governance and transparency with their usage of the tool.  

Providers should employ best practices for AI usage:  

  • Understand AI鈥檚 risk profile 
  • Ensure that data is representative of patients 
  • Address potential biases  

With continuous monitoring, providers can mitigate any potential model drifts and gain better oversight of the dynamic nature of AI systems. By highlighting the areas of risk, the healthcare system can make informed decisions on which tools, solutions and personnel to deploy to mitigate risk.  

探花视频 HIMSS AI Interoperability Tradeshow Recap Blog Embedded Image 2025

There are many opportunities for AI in Healthcare. In the session 鈥淗L鈥檚 Ride on the AI Train,鈥 the Chief Executive Officer of HL7 International, Charles Jaffe, discussed how AI can enable healthcare providers to promote interoperability. AI can also help providers address industry concerns, such as data provenance and data lineage. In the session 鈥淪haping the Future of healthcare: A Collaborative Care Journey Where Technology and Humanity Coexist,鈥 speakers Seung Woo Park and Meong Hi Son, respectively the President and Chief Medical Information Officer and Associate Professor at Samsung Medical Center (SMC), mentioned that SMC reduced the nurse turnover rate from 9.3% to 5.9% by assisting their workflow with AI and automation. In the session 鈥淒isruptive Technologies: Examining the Challenges and Opportunities of Cyber, AI and Beyond,鈥 the Former Commander and U.S. Cyber Command and Former Director at the National Security Agency, Paul Nakasone, noted that AI-driven behavior changes could transform healthcare and prevent chronic diseases. Using AI to get suggestions on sleep, meditation, diet and stress management can all help in between doctor visits to chip away at chronic diseases. Through the collaboration of providers and technology, service in healthcare can be reshaped for the better, providing a gateway into personal medicine. 


2. Improving Healthcare Quality through Interoperability  

Another point of discussion at HIMSS was the role of digital technology and standards in improving healthcare quality. The National Committee for Quality Assurance (NCQA) has several initiatives, such as the Healthcare Effectiveness Data and Information Set (HEDIS) Fast Healthcare Interoperability Resources (FHIR) data model and the Bulk FHIR Quality Coalition, aimed at enhancing digital quality measurement by enabling end-to-end FHIR data exchanges. Quality measurement has evolved, and standardized clinical data helps accelerate that evolution. With modern computing platforms and technologies, such as Bulk FHIR, healthcare institutions can utilize real-time, continuous data processing, improving data encryption, data security and quality measurement. With comprehensive and timely data sharing among healthcare stakeholders, patients can get results from labs and pharmacies quicker, and can share their data across different healthcare offices, improving the affordability and quality of services.   


3. Addressing Veteran Needs in Collaboration with CMS 

On average, patients have their medical data located at 5.6 different locations, making interoperability, the ability of information to be exchanged between different health systems or technology systems, instrumental in helping patients and providers alike to improve the healthcare experience. 

In the session 鈥淎 Discussion: Transforming Care Through Interoperability,鈥 members of the Department of Veteran Affairs (VA) and University of Oklahoma discussed the benefits of interoperability for veterans. Data sharing between the VA and the Center for Medicare and Medicaid Services (CMS) can address healthcare challenges, such as dementia, suicidal ideation, traumatic brain injury (TBI) and oncology by enabling the two agencies to collaborate to achieve actionable approaches for real-world cases. For example, improving care coordination, optimizing resource utilization and driving better outcomes for veterans and other patients. 

Data sharing and collaboration is key to achieving efficient and effective healthcare delivery in the modernized health data infrastructure. In modernizing the infrastructure of the healthcare industry through interoperability, providers and patients can alleviate the work burden and work towards finding solutions at an expedited and swifter rate. The need for remote patient monitoring tools (RPM) is key to assist physicians and clinicians with increased data collection to support real-time treatment of these chronic illnesses for our veterans. 

HIMSS_Day 1_Case Study - Missouri Mission to Transform Digital Health


4. Leveraging Data to Improve Service 

Digital health increases the speed of learning, helps patients and providers overcome health inequity and increases the effectiveness of virtual care. In the session 鈥淐ase Study: Missouri鈥檚 Mission to Transform Digital Health,鈥 speakers Joshua Wymer, the Chief Health Information and Data Strategy Officer of the Missouri Department of Health and Senior Services (DHSS), and Natasha Ramontal, the Digital Health Strategist in Community Outcomes for HIMSS, discussed the DHSS鈥 journey to transform digital health. To address the needs of businesses, HIMSS and the DHSS teamed up, eliminating duplicate data sets, reducing volumes of data entry and improving regulatory oversight. Through their collaboration in improving the handling of data, the Missouri Department of Health and Senior Services became the first state level organization to successfully implement HIMSS鈥 Digital Health Indicator model.  


5. Bolstering Cybersecurity Mitigation with OCR and HIPAA 

In the session 鈥淧reparing for OCR鈥檚 Revived HIPAA Security Audits,鈥 speaker Nadia Faheem Coster, the Executive Vice President of Permit Intelligence Services, discussed the Department of Health and Human Services鈥 Office of Civil Rights (OCR) 2025 audit program, which applies to fifty entities and business associates. The audit focuses on decreasing hacking and ransomware attacks.  

HIMSS_Day 1_Preparing for OCR Revived HIPAA Security Audits

To combat bad actors, Coster recommends:  

  1. Maintaining a risk management plan 
  1. Conducting annual secure risk assessments 
  1. Ensuring all policies and procedures are up to date 

Coster also emphasized the need for segmentation and asset inventory under the proposed Health Insurance Portability and Accountability Act (HIPAA) Security 2.0 rule. All related health systems and the IT industry should ensure their software and hardware are compliant under the proposed ruling. System resiliency is the gold standard for health systems looking to comply with the HIPAA Security 2.0 ruling. 


Data sharing, cybersecurity awareness, interoperability and artificial intelligence all enable cheaper and quicker work, whether it is sharing information between healthcare providers or on internal day-to-day operations, while ensuring quality care. By enabling the latest solutions in healthcare technology, health systems can create a better work environment for providers and a seamless experience for patients.  


To learn more about interoperability, legislation, cybersecurity and AI in healthcare, visit 探花视频鈥檚 Healthcare Technology solutions portfolio to explore solutions showcased at HIMSS. For additional research into the key takeaways thought, industry and Government leaders presented at HIMSS, view 探花视频鈥檚 extensive market research brief for a deeper dive.