Chairwoman & co-CEO
Baly Ambegaoker is co-Founder, Chairwoman and co-CEO of CENTERPOINT, a Virginia-based technology company delivering the next generation in cybersecurity services and solutions. Ms. Ambegaoker is responsible for strategic business planning and execution. Prior to CENTERPOINT, Ms. Ambegaoker served as a President & CEO of IDL Solutions, Inc. At IDL, Ms. Ambegaoker led the company in providing information technology solutions, data analytics, and systems support to numerous Federal, state, and local governments, as well as over 100 commercial clients. Under Ms. Ambegaoker’s leadership, IDL experienced consistent annual growth and achieved successful appraisals as an SEI CMMI® Level 3 and an SEI CMMI Level 4 SCAMPI B organization.
Ms. Ambegaoker’s years of dedication to excellence culminated in the successful acquisition of IDL Solutions by CACI International in December of 2012. Ms. Ambegaoker is a member of the Board of Directors at Wisconsin Procurement Institute and has been an active member of AFCEA, NVTC, ACT/IAC, National Association of Women Business Owners, the Council of Small Business Executives, the Governor’s E-Government Council, Goodwill Industries Technology Business Advisory Council, and Women in Homeland Security. She has been recognized as U.S. Small Business Administration’s Entrepreneur of the Year, and has earned the Top 40 Under 40, amongst other industry awards. Ms. Ambegaoker holds a Bachelor of Science degree in business, and an MBA from New York University’s Stern School of Business.
President & co-CEO
Ed Silva is co-Founder, President & co-CEO of CENTERPOINT, a Virginia-based technology company delivering the next generation in cybersecurity services and solutions. In addition to serving as co-CEO, Mr. Silva is responsible for client delivery, corporate growth and the implementation of business development strategies. Prior to founding CENTERPOINT, Mr. Silva was Senior Executive for Corporate Business Development for CACI International Inc., a global multi-billion information solutions and services company. Mr. Silva joined CACI through the company’s acquisition of IDL Solutions, where he was a partner and Senior Vice President.
Mr. Silva also served as President and Chief Executive Officer of IDL Government Solutions, a provider of information technology solutions, applications, and systems support. IDL-GS functioned as a critical business partner to IDL Solutions as it grew rapidly toward its successful acquisition by CACI in December of 2012. During his 30-year career, Mr. Silva has developed and implemented growth and operations strategies for a number of companies. He has served as Chair and Vice-Chair for the ACT/IAC Cybersecurity Community of Interest, Board Member for the Community Foundation of Northern Virginia, and is an active member of AFCEA, NVTC, and the Air Force Association (AFA).
Chief Financial Officer
Karen Dickey is responsible for corporate finance, accounting, DCAA compliance, M&A, and treasury management. In her CFO role, Ms. Dickey manages the company’s financial health, oversees sound budgeting and accounting practices, and ensures compliance with all federal, state and local government financial/accounting regulations. Ms. Dickey joins CENTERPOINT with over 30 years of accounting and finance experience in roles that have included corporate accounting, financial reporting, governance, and M&A.
The majority of Ms. Dickey’s career has been spent with Washington, D.C.-area government contractors, including QinetiQ North America, Professional and Scientific Associates (PSA), Serco, IDL Solutions (now CACI), and Primescape. Ms. Dickey is a Certified Public Accountant, and received her Bachelor’s degree from Marymount University and her MBA in Business Administration from Virginia Tech.
Chief Technology Officer
Tony Ambegaoker is the Chief Technology Officer for CENTERPOINT, a Virginia-based technology company delivering the next generation in cybersecurity services and solutions. Mr. Ambegaoker is responsible for the strategic direction of the company’s integrated technology solutions. Mr. Ambegaoker leads multi-disciplinary teams to solve problems with innovative solutions for government clients.
Mr. Ambegaoker is an innovative leader in cybersecurity, big data and analytics, and has a diverse background in cybersecurity and software engineering. Mr. Ambegaoker holds numerous industry certifications including CISSP, CSM, MCSE, and a PMP. Mr. Ambegaoker holds a Bachelor’s degree in Computer Science, and an MBA from the Massachusetts Institute of Technology.
Vice President of HR & FSO
Nisha Toskey is Vice President of Human Resources and Facility Security Officer of CENTERPOINT. Ms. Toskey brings over 20 years of business experience to the CENTERPOINT team in the areas of Human Resources, Security, and Corporate Development. She is responsible for connecting the company’s everyday results with long-term strategic plans. Through her extensive experience, Ms. Toskey delivers strategic vision and insight in developing and implementing the company’s strategic plans, efficiency, processes and procedures to enable CENTERPOINT recruit and retain top talent.
Ms. Toskey is a results-oriented professional who keenly focuses on building high performance teams, reaching short and long term corporate goals. She has extensive experience in Mergers and Acquisitions, Initial Public Offerings, and stock option planning. Ms. Toskey holds a B.A. in Communication and Sociology from Virginia Tech, is an active member of the Society for Human Resource Management, and is certified as a Facility Security Officer by the U.S. Department of Defense.
Chief Cybersecurity Advisor
Shaun Khalfan is Chief Cybersecurity Advisor of CENTERPOINT, a Virginia-based technology company delivering the next generation in cybersecurity services and solutions. Mr. Khalfan is a member of CENTERPOINT’s senior management team, and is responsible for carrying out the company’s vision and guiding its cyber strategy. Mr. Khalfan is also tasked with enhancing CENTERPOINT’s operations and delivery capabilities.
Shaun previously served as the Chief Information Security Officer and senior cybersecurity executive for the largest law enforcement agency in the country, U.S. Customs and Border Protection. He led the development and execution of cybersecurity strategy and was responsible for aligning security initiatives with enterprise programs and business objectives. Prior to CBP, Shaun’s positions included cybersecurity leadership with the Department of the Navy (DON), the Defense Logistics Agency (DLA), and the Navy Military Sealift Command.
Shaun serves as an advisor on federal technology committees, is a fellow with the American Council for Technology, and is an adjunct professor at George Washington University. He received his MBA from George Washington University and is a graduate of the University of Maryland. He is also a graduate of the DoD Executive Leadership Development and DHS Executive Capstone Programs.
Director of Business Operations
Alex Silva is Director of Business Operations of CENTERPOINT, a Virginia-based technology company delivering the next generation in cybersecurity services and solutions. He joined the company at its inception in 2014 to support the business development activities of the company. In November of 2016, Mr. Silva was appointed Director of Business Operations to lead Corporate Communications, Recruiting, and Proposal Support.
Prior to CENTERPOINT, Mr. Silva was Membership and Communications Coordinator for a DC Area-based trade association, where, among other accomplishments, he coordinated the successful execution of the largest food processing trade show in the Americas. Mr. Silva has served as Board Vice Chair-Social Media of Young AFCEA Bethesda, and has been an active member of the govcon community, including AFCEA, NVTC, and WashingtonExec. He holds a Bachelor’s degree in Business – Marketing from the University of Maryland – Robert H. Smith School of Business.
GSA OASIS Small Business (Subcontractor)
Ordering Information: email@example.com or (703) 880-8741 x100
Ordering Period: May 20, 2014 – May 19, 2024
As a subcontractor to Credence, CENTERPOINT has the ability to offer core professional services to support all Federal missions, including:
Features and Benefits
When agencies use the OASIS contract, they sign on to a one-of-a-kind, flexible, full-service contract vehicle that delivers a number of benefits to the agency, while driving down costs. Using OASIS:
For detailed information on how CENTERPOINT can meet your needs using this contract, please contact us here or at (703) 880-8741 x100.
NGA ESMARTS (Subcontractor)
Ordering Period: March 28, 2016 – December 31, 2017
NGA is a Department of Defense (DoD) Combat Support Agency and a member of the National Intelligence Community (IC). NGA develops imagery and map-based intelligence solutions for U.S. national defense, homeland security, and safety of navigation. NGA’s mission is to provide timely, relevant, and accurate geospatial intelligence in support of national security. The NGA Vision is Know the Earth…Show the Way. The services performed under this acquisition will assist NGA in accomplishing its mission and vision.
The ESMARTS program objective is to acquire the technical, management and support services required by the NGA Key Components (KC) and Offices for accomplishing its mission and vision. These requirements are defined in separate KC Consolidated SOWs, and support generally falls under the following labor categories:
GSA CYBERSECURITY SERVICES SCHEDULE / HACS SINs 132-45A-D
Contract No.: GS-35F-515DA
Ordering Information: firstname.lastname@example.org or (703) 880-8741 x100
Ordering Period: September 30, 2016 – September 29, 2021
GSA awarded CENTERPOINT four (4) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on IT Schedule 70 to provide agencies quicker access to key, pre-vetted support services that will expand agencies’ capacity to test their high-priority IT systems, rapidly address potential vulnerabilities, and stop adversaries before they impact their networks.
GSA SCHEDULE 70 for Cybersecurity Services provides many unique features and benefits to government agencies, including:
CENTERPOINT’s Highly Adaptive Cybersecurity Services (HACS) SINs are a set of specialized cybersecurity offerings for federal, state, and local governments, as follows:
132-45A Penetration Testing is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network.
132-45B Incident Response services help organizations impacted by a Cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a secure state.
132-45C Cyber Hunt activities are responses to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Cyber Hunt activities start with the premise that threat actors known to target some organizations in a specific industry, or specific systems, are likely to also target other organizations in the same industry or with the same systems.
132-45D Risk and Vulnerability Assessment teams conduct assessments of threats and vulnerabilities, determine deviations from acceptable configurations, enterprise or local policy, assess the level of risk, and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations. This SIN offers the following services:
Click here for more information about CENTERPOINT’s GSA Cybersecurity Contract.
Click here for general information on GSA Schedule 70 HACS SINs.
GSA SCHEDULE 70 for IT SERVICES / SIN 132-51
CENTERPOINT’s multi-disciplinary IT Services Schedule contract under SIN 132-51 provides government agencies the ability to acquire quality, effective and cost competitive IT Services. Services available from CENTEPOINT include:
And much more
NIH CIO-SP3 Small Business (Subcontractor)
Ordering Period: July 15, 2012 – July 14, 2022
The NIH Chief Information Officer – Solutions and Partners 3 (CIO-SP3) contract is a ten (10) year Indefinite Delivery/ Indefinite Quantity (IDIQ) Government-wide Acquisition Contract (GWAC) contract with a $20B ceiling.
CIO-SP3 provides IT solutions and services, including health and biomedical-related IT services to meet scientific, health, administrative, operational, managerial, and information management requirements. The contract also contains general IT services, since medical systems are increasingly integrated within a broader IT architecture and therefore require a systems approach to their implementation and a sound infrastructure for their operation.
Task areas support and provide consistency with the accountability goals of the Federal Health Architecture (FHA), whereby federal agencies are able to coordinate effective capital planning activities and invest in and implement interoperable health IT. CENTERPOINT is a subcontractor for all ten task areas under CIO-SP3. The Task Areas:
CENTERPOINT’s certified penetration testers and ethical hackers apply advanced offensive techniques that mimic real world attacks. With these reality-based scenarios, we readily identify methods that would be attackers could use to circumvent the security features of applications, systems, or networks. We conduct penetration testing as a controlled attempt to achieve a specific, attacker-simulated goal using the attacker’s techniques, hardware and software tools.
Our penetration testing provides system owners the ability to test their confidence in their security posture and bring to light the level of effort required for adversaries to breach system safeguards. At the end of penetration testing, CENTERPOINT delivers a penetration test report indicating if and how security was breached and recommendations for remediating identified vulnerabilities.
After an intrusion, you must respond swiftly and effectively. We provide you the expertise in data collection and correlation to:
Our teams collect intrusion artifacts and use the data we discover to mitigate potential Computer Network Defense incidents within the enterprise. We also perform command and control functions in response to incidents and correlate incident data to identify specific vulnerabilities, make recommendations, and implement solutions that enable swift and effective remediation.
Experience in cybersecurity, innovative solutions and engineering talent: these three critical components prepare CENTERPOINT’s teams to face and defeat today’s most daunting cyber threats. We engineer cybersecurity architecture and solutions with emphasis on system resilience, compliance, and early identification of vulnerabilities. As we work diligently to secure your systems, we will:
Today’s threats demand a more proactive role in detecting and isolating sophisticated attacks. We enable you to locate and eradicate entrenched threats through dynamic and adaptable hunting techniques of hypothesizing, collecting intrusion artifacts, and correlating data. In the end, we help you find and eradicate any cyber threads lurking in the darkness of your digital environment.
CENTERPOINT Cyber Hunters respond to crisis or urgent situations to mitigate immediate and potential threats. Our Cyber Hunters start with the hypothesis that threat actors known to target organizations or systems that are similar to those of our clients are likely to also target our clients. We use information and threat intelligence specifically focused on the proximate incident to identify undiscovered attacks and eradicate them from systems.
CENTERPOINT’s teams of assessors conduct risk and vulnerability assessments to determine clients’ exposure to threats and vulnerabilities as a result of deviations from acceptable configurations and policies. We assess the level of risk, and develop recommendations for appropriate mitigation countermeasures in operational and non-operational situations.
During risk and vulnerability assessments, our teams conduct:
We perform all assessment activities with an eye towards identifying and mitigating any and all vulnerabilities that may expose our clients to unintentional or intentional security breaches.