Lloyd McCoy Jr.

Opinions expressed by ICN authors are their own.

Lloyd McCoy is a DOD manager with immixGroup’s Market Intelligence team. He is responsible for providing subject matter expertise on Department of Defense agencies, identifying business opportunities, and providing timely, relevant, and actionable intelligence to clients.

Prior to immixGroup, Lloyd worked for the Defense Department for eight years, serving in a variety of senior analytic and project management positions both in the U.S. and abroad. In this capacity, Lloyd worked extensively with the acquisition and procurement offices within the Office of Secretary of Defense.

Lloyd earned an M.S. in Strategic Intelligence from the National Intelligence University in 2011, as well as an M.A. in Public Policy in 2004 and a B.A. in Political Science in 2002, both from the University of Maryland.

The opinions expressed in this blog are those of Lloyd McCoy Jr. and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

5 factors affected by disbanding the Defense Information Systems Agency

Stop playing “whack-a-mole” with your security

Stop playing “whack-a-mole” with your security

Google does it, so can you. Stop dealing with IT security problems when they happen; start addressing the root cause.

AI Wars: relax, it’s not the end of the world

AI Wars: relax, it’s not the end of the world

The profound implications of AI and machine learning on security are not lost on governments.

How agencies learned to stop worrying and love the blockchain

How agencies learned to stop worrying and love the blockchain

A little uncertainty is a small price to pay for the promise of better security.

The GDPR initiative and how it affects US government and industry

The GDPR initiative and how it affects US government and industry

Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home.

The Top 3 cyber priorities for DOD’s incoming CIO

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

Regulation is the best hope for IoT security – imagine that!

Regulation is the best hope for IoT security – imagine that!

Far from stifling technological innovation, regulation could in fact create lucrative new opportunities for security vendors.

Are shared services the answer to data protection?

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

Why the cybersecurity industry is failing government

Why the cybersecurity industry is failing government

One problem is that tech companies still try to force-fit their commercial applications into the federal space. But that's not the only issue...

The top 3 hot spots for federal IoT security

The top 3 hot spots for federal IoT security

We are closer than ever to enjoying the benefits of IoT, so let’s not forget these things need to be secure. It’s a promising technology that must be wrapped with security from the get-go. If we don’t get it right, the consequences...

The need for better proactive cyber defense

The need for better proactive cyber defense

We can learn more about bad actors by using the same kinds of visibility techniques many organizations are using to look at their own IT networks. Why not use these same tools to get a better handle on how cybercriminals work?

How data analytics can boost health IT security

How data analytics can boost health IT security

As interactive devices and the internet of things become more entrenched in military health, the health information of our military can easily become compromised. We don’t need systems to tell us what already happened, but to predict...

Load More