CTOs on the Move

CMI Management

www.cmimgmt.com

 
CMI Management is a Alexandria, VA-based company in the Computers and Electronics sector.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.cmimgmt.com
  • 5285 Shawnee Rd Ste 401
    Alexandria, VA USA 22312
  • Phone: 703.738.5300

Executives

Name Title Contact Details

Similar Companies

National Health Information Sharing and Analysis Center

The security threat landscape continues to expand globally at an incredible pace representing an environment vulnerable to sector and cross-sector potential cascading impacts. As the nation`s healthcare and public health critical infrastructure continues to broaden the integration of technology to support healthcare innovation and service delivery, organizations continue to face unprecedented cybersecurity challenges. Securing the resilience of the nation`s health sector, comprised of a vast network of interconnecting infrastructures, depends upon the stakeholders ability and capability to work together. The National Health ISAC (NH-ISAC), is the nationally recognized Information Sharing & Analysis Center (ISAC) for the nation`s healthcare and public health critical infrastructure by the U.S. Department of Health & Human Services (HHS), U.S. Department of Homeland Security (DHS), the HHS Sector Coordinating Council (SCC) representing the nation`s healthcare private sector, and the National Council of ISACs (representing all national critical infrastructures). As the health sector`s primary communications channel for cybersecurity intelligence, information sharing, and incident response, NH-ISAC`s mission is to enable and preserve the public trust by advancing health sector cybersecurity protection and the ability to prepare for and respond to threats and vulnerabilities. NH-ISAC, a non-profit, membership-sustained organization, is entrusted with the provision of security situational awareness intelligence, CTI sharing and coordinated response for a nationwide healthcare and public health trusted community. The delivery of timely, relevant and actionable cyber and physical (all-hazards) intelligence from trusted public and private sources, are distributed via the NH-ISAC at the Space Life Sciences Laboratory at NASA/Kennedy Space Center.

iControl Systems

iControl provides retailers, consumer product goods companies, brokers, mainline distributors, and DSD wholesalers with a collaborative SaaS solution where they can share critical trading information such as POS activity in a normalized, harmonized, secure Value Chain Portal.. Our platform enables fact-based, timely, data-driven decisions that boost sales, reduce waste, promote efficiency, reward transparency, and align performance metrics. Offered in the form of SaaS, our platform providing trade partners a shared opportunity to make informed decisions based on a single, undisputed version of the truth. Empowered by timely information presented in a highly actionable way, our clients are able to minimize waste and maximize sales and improve outcomes.

Future Link of Illinois

Future Link of Illinois is a Carol Stream, IL-based company in the Computers and Electronics sector.

Mperativ

Mperativ provides the first strategic platform to align marketing with sales, customer success, and finance on the cause and effect relationships between marketing activities and revenue outcomes. Despite pouring significant effort into custom analytics, marketers are struggling to convey the value of their initiatives. By recentering marketing metrics around revenue, Mperativ makes it possible to uncover data narratives and extract trends across the entire customer journey, with beautifully-designed interactive visualizations that demonstrate the effectiveness of marketing in a new revenue-centric language. As a serverless data warehouse, Mperativ eliminates the complexity of surfacing compelling marketing insights. Connect marketing strategy to revenue results with Mperativ.

Preempt

Preempt was founded in 2014 by global security and networking experts with a passion for making IT security teams more effective in protecting their organizations from breaches and malicious insiders.