Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Dr. Tommy Gardner - How to accelerate U.S. supply chain and security innovation

By Maria Henriquez
5mw Gardner
August 17, 2021

Dr. Tommy Gardner, Chief Technology Officer of HP Federal, believes a proactive mindset that bridges the digital divide, recruits top talent and implements the right policies is needed for the U.S. to achieve success and remain competitive on a global scale. Here, he discusses how a national strategy for critical technologies can shape the industries of the future as well as address national security and global challenges.

 

Security: What is your background, current role and responsibilities?   

Dr. Gardner: Many years ago, I served in the U.S. Navy as the deputy for science and technology for the chief of naval research and oversaw the Navy’s Deep Submergence Program and its Advanced Technology Program. I also commanded the nuclear submarine, USS San Juan (SSN 751). When the time came for me to start thinking about life after the Navy, another submariner who I met at the Naval academy gave me some advice I never forgot. He told me that there would be many jobs out there and many I’d want to take, but he said I should never settle for a job at a company that didn’t have values and ethics I respected. That lesson eventually led me to HP, a company I have been very proud to work for and whose mission I strongly believe in. 

In my role as the Chief Technology Officer of HP Federal, I wear many hats. I help our customers across state, local and federal agencies transform their organizations with the right solutions, products and tech strategies. I help ensure that HP’s technology offers state-of-the-art security and that we are constantly innovating in the fields of data science, quantum computing and more. I’m also proud to serve alongside my peers in both the public and private sectors on taskforces to evolve how we view risk assessment, supply chain management and cybersecurity. 

 

Security: How can the U.S. accelerate supply chain and security innovation in light of recent supply chain attacks? 

Dr. Gardner: The message every organization should take from these attacks is, of course, to act now. No entity is immune to these threats, and everyone should be shoring up their security protocols. Now more than ever, it is critical for all U.S. vendors to develop advanced ICT supply chain security plans to protect citizens and government partners. To accelerate supply chain processes and enhance security efforts, government agencies need better visibility into the security strategies that their vendors implement. Having transparency into how technology is being developed, integrated and deployed can help organizations identify risks and threats sooner and establish stronger integrations throughout a supply chain. 

A vulnerability I see often occurs in the reseller system during the “last mile” of the ICT supply chain. As a way to prevent potential hacks or disruption, agencies should conduct an internal audit of their prime vendors to determine the potential exposure of risks and evaluate where improvements are needed. Security investments and consistent evaluations of threat-based ICT supplies can help make supply chains more resilient while preventing future hacks. All long-term business must be based on trust. Companies must spend the time, energy and resources necessary to get to know their vendors and suppliers in order to trust them. Build relationships for a robust supply chain. 

 

Security: How can U.S. leaders deploy a national strategy for critical technologies that will shape the industries of the future and address national security and global challenges? 

Dr. Gardner: Leaders at all levels of federal and local government should see an opportunity in adopting standards that encourage technology innovation while also addressing security challenges. Devoting resources to creating and deploying standards that address interoperability, privacy and usability can help the nation focus on future-proofing digital capabilities and modernizing sustainable initiatives for the future. The private sector must work with the government to adopt a federally mandated to-do list that outlines strategic actions and targeted outcomes for companies to follow and achieve. We are on the right path. Ultimately, enterprises that collectively operate around shared standards can address vulnerabilities early on, have more secure partnerships with different entities, and more easily identify improvements that can be made to their security protocols. The implementation of innovative standards is an imperative and a clear advantage for leaders in the public and private sectors.

 

Security: How can U.S. leaders expand the nation’s talent pool as a critical element of the federal government’s evolving role and responsibilities? 

Dr. Gardner:  Federal and local government leaders have the amazing privilege and responsibility of developing the tech workers of the future, including those who will be experts in rapidly evolving areas like cybersecurity, digital manufacturing and IT. We need to train new tech workers from the ground up and invest in the current workforce who already have foundational technology skills and experience. I am a strong advocate for reskilling veterans and federal workers through training and certification programs that help close the talent gap and create a pipeline for further innovation. Community Colleges can play a role here.

Higher education leaders play a key role in educating the future federal workforce. In collaboration with federal and government agencies, universities and colleges can introduce technical education to students earlier on so they become more familiar with the industry and acquire basic technical knowledge that will serve anyone on any career path today. Perhaps a factor in federal grant can be the number of graduates from the university that enter the federal workplace?

 

Security: Lastly, how can U.S. leaders promote sustainable production/consumption against a backdrop of supply chain resiliency and security?

Dr. Gardner: Prioritizing sustainability is imperative. Every organization must build it into its operating models and invest in it. It is critical for our nation’s leaders to address digital equity when updating security protocols and promoting sustainable initiatives. If sustainability is not at the core of current innovation, we should address it in the next round. From supply chains to online voting systems to telehealth portals and tax collection structures, our systems need technology that puts people, communities, and our planet’s health at the heart of the design. Operating with these tenets will ultimately reduce cybersecurity vulnerabilities and ensure resiliency throughout global supply chains. HP is committed to achieving ambitious sustainable impact targets, including initiatives to advance digital equity and enable better learning outcomes for 150 million people by 2030.

 

KEYWORDS: cyber security national security risk assessment risk management security management supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5mw Bai Cortese

    5 minutes with Tony Bai and Joe Cortese - The future of supply chain security

    See More
  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Dr. Brumley

    5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing