From 110K+ entities monitored
Pre-RFP signals for
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Victoria County</div><div class='ecard-meta'>County Government · TX</div></div><div class='ecard-header-right'><span class='badge badge-hot'>High Intent</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Mobile applications must meet security testing and penetration standards</div><div class='signal-body-text'>Victoria County is subject to Texas HHS requirements mandating that public-facing mobile applications handling confidential information undergo vulnerability and penetration testing per Texas Government Code. This compliance obligation creates demand for automated mobile app security testing and penetration testing services to meet state standards. No RFP has been issued; this is pre-solicitation intelligence.</div></div><div class='signal-item'><div class='signal-title'>Protect confidential data with continuous mobile app risk monitoring</div><div class='signal-body-text'>Victoria County must establish ongoing mobile app security validation to prevent data breaches that could expose confidential information and trigger regulatory penalties. Implementing continuous risk monitoring and supply-chain vetting reduces incident response costs and protects the county's operational integrity and public trust.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 5 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>David Gonzales</span><span class='contact-title'>Secretary</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Samantha Friar</span><span class='contact-title'>Deputy Assistant Director and Finance Officer</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Kim Kirbo</span><span class='contact-title'>Program Manager</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Matt Schneider</span><span class='contact-title'>It Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>John Sestak</span><span class='contact-title'>Director, Information Technology</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://victoriacotx.api.civicclerk.com/v1/Meetings/GetMeetingFileStream(fileId=4616,plainText=false)#page=375' target='_blank'>View source · 2026-05-18</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Grant County</div><div class='ecard-meta'>County Government · WA</div></div><div class='ecard-header-right'><span class='badge badge-hot'>High Intent</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Implementing mobile application security vetting policy with NIST guidelines</div><div class='signal-body-text'>Grant County has developed and is implementing a new mobile application security vetting policy aligned with NIST guidelines, establishing a formal scoring and approval process for applications. This initiative directly requires automated security testing, penetration testing, supply-chain vetting, and continuous risk monitoring capabilities. No RFP has been issued; this is pre-solicitation intelligence.</div></div><div class='signal-item'><div class='signal-title'>Grant County reduces mobile app security risks through continuous monitoring</div><div class='signal-body-text'>Grant County's formal application approval process creates accountability gaps if security assessments lack standardized rigor, exposing the organization to liability and audit findings. By implementing structured vetting with measurable scoring criteria, the county reduces risk exposure and demonstrates due diligence to stakeholders and oversight bodies.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 3 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>Joseph Carter</span><span class='contact-title'>Assistant Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Blair Kok</span><span class='contact-title'>Risk & Safety Coordinator</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Thomas Gaines</span><span class='contact-title'>Central Services Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://www.youtube.com/watch?v=xrZtyOucPvk&t=6872' target='_blank'>View source · 2026-05-11</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>
<div class='ecard'><div class='ecard-header'><div><div class='ecard-name'>Texas State Technical College</div><div class='ecard-meta'>County Government · TX</div></div><div class='ecard-header-right'><span class='badge badge-active'>Active Signal</span></div></div><div class='ecard-signals'><div class='signal-item'><div class='signal-title'>Implementing enhanced controls for BYOD mobile device monitoring</div><div class='signal-body-text'>Texas State Technical College is planning to implement enhanced controls for mobile devices accessing institutional information under a Bring Your Own Device (BYOD) plan, with deployment targeted for December 2026 pending funding approval. This initiative requires automated mobile app security testing, penetration testing services, and continuous risk monitoring capabilities to address identified control gaps on employee-owned devices. No RFP has been issued; this is pre-solicitation intelligence.</div></div><div class='signal-item'><div class='signal-title'>Reduce mobile app security risks through continuous monitoring</div><div class='signal-body-text'>Texas State Technical College faces potential compliance violations and institutional liability if employee-owned devices remain uncontrolled, threatening accreditation and student data protection. By securing funding and deploying mobile device controls before December 2026, the institution can eliminate audit findings, reduce breach exposure, and demonstrate governance maturity to regulators.</div></div></div><div class='ecard-contacts'><div class='ecard-contacts-label'>Key Contacts · 5 verified by Pursuit</div><div class='contact-list'><div class='contact-row'><div class='contact-info'><span class='contact-name'>Dale Bundy</span><span class='contact-title'>Vice Chancellor & Chief Information Officer</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Charlotte Ables</span><span class='contact-title'>Director</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Joseph Hornsey</span><span class='contact-title'>Director of Alignment for Cybersecurity</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Eric Vogelsinger</span><span class='contact-title'>Executive Director, Purchasing Agent</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div><div class='contact-row'><div class='contact-info'><span class='contact-name'>Shelli Scherwitz</span><span class='contact-title'>Executive Vice President of Information Technology Support Operations</span></div><div class='contact-data-hints'><span class='data-hint'>Email</span><span class='data-hint'>Phone</span></div></div></div></div><div class='ecard-footer'><a class='ecard-source-link' href='https://www.tstc.edu/wp-content/uploads/2026/05/May-2026-Audit-Book-DIGITAL.pdf#page=13' target='_blank'>View source · 2026-05-14</a><span class='ecard-timing'>⏱ Pre-RFP — no solicitation issued</span></div></div>