Sign in to view Anita’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Anita’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Leesburg, Virginia, United States
Sign in to view Anita’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
6K followers
500+ connections
Sign in to view Anita’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Anita
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Anita
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Anita’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
LLC, working as a…
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
6K followers
-
Anita Reppert liked thisAnita Reppert liked thisHow To Buy Land & Real Estate In The Metaverse We are quickly heading towards the age of the #metaverse – connected, persistent #virtual #realities where we will live #digital lives alongside our real lives. Increasingly we will use these spaces to work, play, socialize and learn – anything we can do in the real world will have a “#digitaltwin” in the metaverse that we can interact with without leaving our homes.How To Buy Land & Real Estate In The MetaverseHow To Buy Land & Real Estate In The MetaverseBernard Marr
-
Anita Reppert liked thisLearn the latest information about this flaw from our X-Force team, how to check for vulnerable versions of Apache Log4j in your environment and understand how to reduce the risk of an attack against your organization.Anita Reppert liked thisIBM Security X-Force is continuing to track the vulnerability in the Log4j Java library, dubbed Log4Shell or LogJam. Join this session to hear from Global Lead, X-Force Threat Intelligence Nick Rossman, X-Force Red Research Lead, Dan Cowley and X-Force Associate Partner, Abby Ross to know what you need to know now. Learn the latest information about this flaw from our X-Force team, how to check for vulnerable versions of Apache Log4j in your environment and understand how to reduce the risk of an attack against your organization.
-
Anita Reppert liked thisAnita Reppert liked thisIBM Security X-Force is continuing to track the vulnerability in the Log4j Java library, dubbed Log4Shell or LogJam. Join this session to hear from Global Lead, X-Force Threat Intelligence Nick Rossman, X-Force Red Research Lead, Dan Cowley and X-Force Associate Partner, Abby Ross to know what you need to know now. Learn the latest information about this flaw from our X-Force team, how to check for vulnerable versions of Apache Log4j in your environment and understand how to reduce the risk of an attack against your organization.
-
Anita Reppert liked thisAnita Reppert liked this🎙️ Cyber Leaders Live 🎙️ Simon hosts our weekly LIVE stream 🎙️ Cyber Leaders Live 🎙️ where he gets the chance to ask some of our industries biggest leaders questions around cyber security! This week we have very special STAR guests in the Whole Cyber Human Initiative! This is going to be epic! Powered by Restream https://restream.io/
-
Anita Reppert liked thisAnita Reppert liked thisComplimentary Gold Tickets to 8th Annual Veterans Awards for all veterans and active duty until midnight tomorrow: Veterans Day. Visit: http://ow.ly/NaPf50GKQ1i
-
Anita Reppert liked thisAnita Reppert liked thisI’m proud to announce that I’ll be joining the University of San Diego’s faculty as an adjunct professor. I will be teaching Secure Software Design and Development as part of the Masters in Cyber Security Operations and Leadership program starting this fall. The future depends on what we teach today and I’m grateful for the opportunity to leave a positive impact.
-
Anita Reppert liked thisAnita Reppert liked thisTypes of Cyber-Attacks (Infographic) Source: https://lnkd.in/dhC_zkS #cybersecurity #security #infosec #cyberattacks #informationsecurity #datasecurity #cybercrime #cyber
Experience & Education
-
Momentum Shift, LLC
****** ***** ******** ********
-
******* ********** ***
****** ***** ******** ********
-
*********
********* ***** ******** ********
-
********** ** ***** ********
** undefined undefined
-
-
***** ******** **** ******
-
-
View Anita’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Volunteer Experience
-
MRC volunteer
Loudoun County Medical Reserve Corps
- 7 years 9 months
Recommendations received
View Anita’s full profile
-
See who you know in common
-
Get introduced
-
Contact Anita directly
Other similar profiles
Explore more posts
-
DoD Inspector General
29K followers
ICYMI: The DoD OIG gave the Defense Contract Management Agency Office of Internal Audit and Inspector General (DCMA OIA-IG) a peer review rating of "pass" on its system of quality control. 🏆 The DoD OIG’s review, which focused on a three-year period, found that the DCMA OIA-IG’s system of quality control was suitably designed and complied with generally accepted government auditing standards. Check out the report 🔗 https://lnkd.in/gEyXE_NZ #Oversight #GAGAS
39
2 Comments -
DMI
149K followers
Stay mission-ready with DMI’s 24x7 security operations for federal agencies. Our solutions integrate enhanced visibility, cyber analytics, orchestration, and automation with policy, architecture, and governance, providing a well-defined security framework and allowing agencies to identify and remediate ever-evolving cyber threats. According to IBM’s Cost of Data Breach 2024, organizations extensively deploying security AI and automation experienced an average reduction of $2.2 million in breach costs compared to those without such technologies. Get customized cybersecurity solutions tailored to your agency’s risk profile: https://lnkd.in/e9Kkg58F Source - https://lnkd.in/gRzjFmTd #DMIDoMore #Cybersecurity #FederalIT
32
1 Comment -
Cybersecurity and Infrastructure Security Agency
590K followers
In her latest blog, Director Jen Easterly highlights CISA’s mission to protect America’s critical infrastructure and strengthen resilience against cyber threats, including those posed by the PRC. https://go.dhs.gov/UCf As the Nation’s Cyber Defense Agency, we are committed to safeguarding the critical services Americans rely on daily and ensuring our collective security. Learn more about how we’re addressing these evolving challenges: https://go.dhs.gov/UCf
59
5 Comments -
Sonatype
39K followers
As AI adoption accelerates across government agencies, so do the risks — from compromised datasets and shadow models to prolonged ATO timelines. Discover how Sonatype helps federal agencies and contractors align with mandates like EO 14028 and SWFT — strengthening mission assurance with automated compliance, transparent SBOMs, and risk-based controls that accelerate, not slow, innovation. 🔐 Read on: https://lnkd.in/gVJ4Hhhf #AICompliance #FederalIT #SoftwareSupplyChain #SWFT #CyberResilience #SBOM #DevSecOps
25
-
Stephanie Tharp
2K followers
The Deputy Secretary of Defense has issued a directive to disestablish JCIDS (Joint Capabilities Integration and Development System) and reform the way the Department identifies and funds requirements. For DoD civilians: - less process - more speed - tighter budget alignment For industry: - earlier access - more transparency - better chances to cross the valley of death (if solutions are aligned with Joint Force problems) https://lnkd.in/gWXbcvJ3
181
15 Comments -
ExtraHop
42K followers
‼️This just in: The ExtraHop modern #NDR platform is officially FedRAMP authorized! With this latest designation, U.S. government agencies and the Department of Defense (DoD) can rapidly deploy our industry-leading solutions for a comprehensive view of the network that powers fast, high-fidelity threat detection and response. Learn more: https://xtra.li/3VU3vKW
135
3 Comments -
SOSi
66K followers
Our Chief Technology Officer, Kyle Fox, will be a speaker at the 3rd Annual DoD Zero Trust Virtual Symposium. Kyle will bring his insights to a talk titled "Zero Trust and Software Defined Perimeter," sharing perspectives from our work implementing robust security architectures across complex environments. As organizations continue to evolve their cybersecurity postures, the software-defined perimeter approach remains a critical component of comprehensive Zero Trust frameworks. This year's symposium theme, "Zero Trust: Implement, Mature and Modernize," aligns perfectly with our commitment to advancing security solutions that protect mission-critical systems. At SOSi, we're proud to contribute to this important dialogue through leaders who understand both the technical challenges and operational realities of implementing Zero Trust principles in high-stakes environments. The symposium runs April 2-4, 2025 and is hosted by the DoD Zero Trust Portfolio Management Office, Defense Acquisition University, MIT Lincoln Laboratory, Cloud Security Alliance, ATARC (Advanced Technology Academic Research Center), and National Defense University. 👉 Interested in attending? This virtual event is designed for members of the U.S. Department of Defense and affiliated industry, academic, and international partners.
52
2 Comments -
DefenseScoop
36K followers
Secretary of Defense Pete Hegseth has issued a new directive aimed at limiting the Defense Department’s hiring of IT consultants. The edict came in a memo sent Tuesday to Pentagon leadership, combatant commanders, and DOD agency and field activity directors regarding implementation of the Trump administration’s Department of Government Efficiency (DOGE) cost-saving initiatives. “While we rely on our vital industrial base to deliver cutting-edge technology and support, we must in-source more expertise and harness the unparalleled talent of our existing experts to drive financial efficiency and operational strength,” Hegseth wrote. https://hubs.ly/Q03pJB5J0
177
43 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content