From 110K+ entities monitored
Pre-RFP signals for
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Grant County</div><div class='ecard-meta'>County Government · WA</div></div><div class='ecard-header-right'><span class='badge badge-hot'>High Intent</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Implementing mobile application security vetting policy with NIST guidelines</div><div class='signal-body-text'>Grant County is implementing a new policy for vetting mobile application security using NIST guidelines and establishing a scoring process for approving or denying app requests. This initiative requires automated security testing, penetration testing, supply-chain vetting, and continuous risk monitoring capabilities. No RFP has been issued; this is pre-solicitation intelligence.</div></div><div class='signal-item'><div class='signal-title'>Grant County secures mobile apps through continuous risk monitoring</div><div class='signal-body-text'>Grant County's formal app vetting policy creates compliance accountability and reduces liability exposure from unsecured applications accessing government data. By establishing standardized approval criteria, the organization can demonstrate due diligence to auditors and stakeholders while controlling which applications access sensitive systems.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 3 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>Joseph Carter</span><span class='contact-title'>Assistant Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Blair Kok</span><span class='contact-title'>Risk & Safety Coordinator</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Thomas Gaines</span><span class='contact-title'>Central Services Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://www.youtube.com/watch?v=xrZtyOucPvk&t=6872' target='_blank'>View source · 2026-05-11</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Victoria County</div><div class='ecard-meta'>County Government · TX</div></div><div class='ecard-header-right'><span class='badge badge-hot'>High Intent</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Texas HHS requiring mobile applications meet security testing standards</div><div class='signal-body-text'>Victoria County is subject to Texas HHS requirements mandating that public-facing mobile applications undergo security testing, including vulnerability and penetration testing per Texas Government Code Section 2054.516. This compliance initiative creates demand for automated mobile app security testing and penetration testing services to meet state standards. No RFP has been issued; this is pre-solicitation intelligence.</div></div><div class='signal-item'><div class='signal-title'>Victoria County mobile apps require continuous security risk monitoring</div><div class='signal-body-text'>Victoria County must demonstrate compliance readiness to Texas HHS, requiring documented security testing evidence before any mobile application deployment—a prerequisite that directly impacts project timelines and budget allocation. Establishing continuous mobile app risk monitoring now positions the county to avoid costly remediation cycles and accelerates procurement decisions when formal solicitations emerge.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 2 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>Matt Schneider</span><span class='contact-title'>It Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>John Sestak</span><span class='contact-title'>Director, Information Technology</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://victoriacotx.api.civicclerk.com/v1/Meetings/GetMeetingFileStream(fileId=4616,plainText=false)#page=233' target='_blank'>View source · 2026-05-18</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Texas State Technical College</div><div class='ecard-meta'>County Government · TX</div></div><div class='ecard-header-right'><span class='badge badge-active'>Active Signal</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Implementing enhanced controls for BYOD mobile device monitoring by December 2026</div><div class='signal-body-text'>Texas State Technical College is planning to implement enhanced controls for mobile devices accessing institutional information under a Bring Your Own Device (BYOD) plan, with deployment targeted for December 2026 pending funding approval. This initiative requires automated mobile app security testing, penetration testing services, and continuous risk monitoring capabilities to address identified control gaps on employee-owned devices. No RFP has been issued; this represents pre-solicitation planning activity.</div></div><div class='signal-item'><div class='signal-title'>Reduce mobile app security risks through continuous threat monitoring</div><div class='signal-body-text'>Texas State Technical College faces potential compliance violations and institutional liability if uncontrolled employee devices continue accessing sensitive data without proper governance. By establishing mobile device controls before December 2026, the institution protects student and operational data while demonstrating due diligence to auditors and stakeholders.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 5 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>Dale Bundy</span><span class='contact-title'>Vice Chancellor & Chief Information Officer</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Charlotte Ables</span><span class='contact-title'>Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Joseph Hornsey</span><span class='contact-title'>Director of Alignment for Cybersecurity</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Eric Vogelsinger</span><span class='contact-title'>Executive Director, Purchasing Agent</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Shelli Scherwitz</span><span class='contact-title'>Executive Vice President of Information Technology Support Operations</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://www.tstc.edu/wp-content/uploads/2026/05/May-2026-Audit-Book-DIGITAL.pdf#page=13' target='_blank'>View source · 2026-05-14</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>