Contributor Biography

Home  /  Blogs  /  Contributors  /  Contributor Biography
Charisse Stokes

Charisse Stokes

Charisse Stokes is the vice president of cyber security and network management for Telos Corporation. She joined the company in 2004 as the director of Alabama operations and the NETCENTS deputy program manager.

Before joining the Telos team, Charisse served on active duty as an officer in the U.S. Air Force, and then as a functional analyst at Titan Corp. She earned a B.S. in ceramic engineering from Clemson University and an MBA in finance from Auburn University. She has a Level II certification in program management from the Defense Acquisition University and is a member of the Armed Forces Communications and Electronics Association (AFCEA) and the National Contract Management Association (NCMA).

Peeling Back the Onion: LPTA and Acquisition Requirements

Charisse Stokes
September 16, 2013

Over the last few years, we have seen a number of trends in the acquisition community, the most recent being the switch to lowest priced technically acceptable (LPTA), versus best value evaluation. With the focus now on LPTA, it’s been difficult at times to decipher what the customers’ requirements really are.

Continue Reading ...

See you next week at AFCEA East

Charisse Stokes
May 9, 2013

As an AFCEAN myself, I can attest to the value of attending AFCEA East. I’m especially excited to be participating at this year’s conference, with its first-rate line-up of keynote speakers, panel sessions, and other opportunities for learning and sharing with colleagues.

Continue Reading ...

ASACoE Team Demonstrates Support Capabilities for Senior Air Force Leaders

Charisse Stokes
March 18, 2013

Over the past few months, the Application Software Assurance Center of Excellence (ASACoE) team stationed at Maxwell AFB – Gunter Annex in Montgomery, Alabama has hosted multiple visits from senior Air Force leaders and delivered an engaging presentation regarding the “proactive side of cybersecurity.” The ASACoE team stresses the importance of security of applications when protecting sensitive data against today’s threats.

Continue Reading ...