recommended reading

Powers-King to Retire from GSA


By Gautham Nagesh December 9, 2009

recent posts

Just confirmed that Mary Powers-King, director of governmentwide acquisition contracts and Schedule 70 for GSA's Integrated Technology Service will retire shortly after the New Year. Powers-King has 31 years of federal service, including more than 25 years managing IT programs. No successor has been named yet, although her deputy, Jim Ghiloni, is probably near the top of the list.

I spoke with Powers-King this week about the challenges facing GSA's governmentwide acquisition contracts in a market where agencies are increasingly creating their own multiple award vehicles. Whoever succeeds her at ITS will have to work with the new head of the Office of Federal Procurement Policy, Daniel Gordon, to convince agencies that GSA is capable of handling their acquisition needs, which is definitely not an easy task.

We wish Powers-King the best and look forward to finding out who will takeover management of the government's biggest and most visible IT contracts.

Full announcement:

Mary Powers-King, Director of GWACS and IT Schedule Programs in the Integrated Technology Service, GSA's Federal Acquisition Service has announced that she will retire on January 3, 2010 after 31 years of distinguished federal service.

Mary joined GSA in 2007 as the Director of GWACs and IT Schedule Programs in the Integrated Technology Service, which is a major component of GSA's Federal Acquisition Service. Mary has over 25 years of experience managing information technology programs in federal government, local government and private industry. She came to GSA from the U.S. Department of Transportation where she spent most of her career managing a variety of high profile information technology programs. While at DOT she held many management, and executive positions at the Federal Aviation Administration, and just prior to joining GSA she was the Director of Information Technology and Deputy CIO at the Federal Motor Carrier Safety Administration.

At GSA Powers-King led the development and award of some of the government's most crucial information technology contracts including Alliant and Alliant Small Business. Powers-King provided oversight to the transition of the COMMITS contract from Department of Commerce to GSA, and she is currently leading the 8(a)STARS II follow-on procurement which is expected to be awarded next summer. She has also had responsibility for approximately 4,700 IT Schedule 70 contracts that comprised approximately $16.4B in business volume in Fiscal Years 08-09.

Her immediate retirement plans include travel, spending time with family, attending some educational classes and keeping her options open.


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.