PrimeRFP Insights
5 Trends Reshaping How Government Buys Cybersecurity in 2026
Evidence-backed analysis from Scout's live federal and SLED feed: Q1 scan stats, CMMC as a gate, standalone encryption/key management buys, NGA SHIELD 2.0 ICAM/PAM lifecycle, SLED examples, OASIS+ and Army C2-CFT BAA windows, FAA PQC RFI, buyer map, and deadline horizon — with solicitation IDs for verification.
LinkedIn carousel companion
Author: Charles Sanders, Founder, PrimeRFP
Data sources: PrimeRFP Scout, SAM.gov, USASpending.gov
Canonical web version of the March 2026 Scout Intelligence carousel — structured for reading, search, and verification. Every cited opportunity includes a solicitation identifier you can look up on SAM.gov or in Scout.
This article backs the Scout Intelligence LinkedIn carousel published in March 2026. Every claim below is sourced from active solicitations, award records, or regulatory filings pulled from Scout's live database. Solicitation numbers are included for cited opportunities so you can verify and track each one yourself.
Executive summary
The federal cybersecurity procurement market is not slowing down — it is accelerating and structurally changing. Scout's Q1 2026 database scan across NAICS codes 541512, 541519, 541511, and 541690 returned 22 qualified opportunities in a single targeted pass, with 18 of those inside the Department of Defense. Award history data from USASpending covers over $400M in recent cybersecurity-adjacent contract activity across DOE, DHS, DOD, VA, and GSA.
Five structural shifts are visible in live solicitation data right now — not in analyst projections alone, but in posted notices, RFIs, and RFPs on SAM.gov and state procurement portals. This article walks through each one with the evidence behind it.
The market context: what the numbers show
Before the trends, a baseline. Scout's award history pull across NAICS 541512 (Custom Computer Programming Services) from the past 24 months surfaced the following notable cybersecurity-related awards, which set the scale of the market:
| Awardee | Agency | Value | Description |
|---|---|---|---|
| Criterion Systems, LLC | DOE / NNSA | $52.1M | OCIO cybersecurity protection and IT coordination across NNSA |
| WidePoint Integrated Solutions | DHS | $74.4M | Identity management and credentialing task order |
| Booz Allen Hamilton | GSA (NEBULA) | $102.4M | NEBULA cloud infrastructure and security program |
| DNI Emerging Technologies | DOE | $24.4M | Cyber security support services + IT capital planning |
| Softrams LLC | DHS | $24.5M | DevSecOps services, ODOS III, USCIS |
| Leidos Innovations | DOT | $64.3M | Research support services with security components |
These are not the ceiling — these are individual task orders and awards from a single data pull. The broader federal IT security services market, per USASpending data, regularly exceeds $2B annually in obligated value across the relevant NAICS codes.
The top agency distribution in Scout's Q1 2026 discovery scan was stark: DoD accounted for 82% of matching opportunities (18 of 22), with VA, GSA, and HHS splitting the remainder. That DoD concentration is itself a trend signal — it reflects the downstream effect of CMMC enforcement beginning, which we cover first.
Trend 1: CMMC is a present gate, not a future requirement
What the regulation says
The Cybersecurity Maturity Model Certification rule — codified at 48 CFR 252.204-7021 — became effective November 10, 2025. That date is not a planning horizon. It is the start of phased rollout across DoD solicitations, beginning with Level 1 self-assessments and Level 2 certifications for companies handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI).
What Scout is showing in live solicitations
Scout's broad Q1 2026 scan surfaces CMMC certification language appearing as a qualification gate in active Navy and Army solicitations across multiple product categories — not just IT services contracts. The clause text appearing in solicitations is: “Notice of Cybersecurity Maturity Model Certification Level Requirements (NOV 2025)” — and it is showing up in supply chain solicitations for components, circuit cards, electrical assemblies, and hardware as well as software and services contracts.
This is the critical point most BD teams are missing: CMMC requirements are not limited to pure-play IT contracts. The clause is appearing in mixed-requirement solicitations for any vendor touching DoD systems or CUI. Scout flagged CMMC-tagged solicitations across NAICS codes 334412, 334511, 333998, 334290, and 335312 in the same data pull that returned IT services results.
What this means for BD: If your company handles CUI or provides products integrated into DoD systems, CMMC Level 2 is now a hard qualifier. Firms without a certification path or a clear POA&M are being screened before the proposal stage — at sources-sought — in some cases before a formal solicitation even exists.
The certification math
The CMMC ecosystem requires:
- Level 1: Annual self-assessment against 17 practices from FAR 52.204-21
- Level 2: Third-party assessment by a C3PAO against all 110 practices in NIST SP 800-171 Rev 2
- Level 3: Government-led assessment against a subset of NIST SP 800-172 requirements
For an MSSP or cybersecurity services firm pursuing DoD contracts, Level 2 certification is table stakes. For firms that support the DIB as a prime or sub, the flow-down requirements in the clause mean your entire supply chain must meet the applicable level before the prime can certify compliance.
Trend 2: Encryption and key management are becoming standalone budget lines
The signal from VA and DISA
Two solicitations from Q1 2026 point to the same structural shift: agencies are separating encryption and key management from broad IT infrastructure contracts and treating them as independent, dedicated procurements.
VA Network-Based Encryption Key Recovery Storage Solution
- Solicitation:
36C10B26Q0239(NAICS 541519) - Agency: Department of Veterans Affairs
- Notice type: RFI for planning purposes
- Scope: Professional services for a network-based encryption key recovery storage solution — standalone key management infrastructure, not bundled into a broader IT support vehicle
DISA Cloud-Based Internet Isolation Service
- Solicitation:
HC108426R0005(NAICS 541519) - Agency: Defense Information Systems Agency
- Notice type: Active RFP (proposals due March 23, 2026)
- Scope: Cloud-based web isolation as a distinct security service — zero-trust web access, not an add-on to a network infrastructure contract
DISA Enterprise Service Solutions IV
- Solicitation:
HC108426R0004(NAICS 541519) - Agency: DISA
- Value scope: Scalable managed storage (security-adjacent infrastructure)
- Proposals extended to April 7, 2026
Why this matters
When VA issues a standalone RFI for key recovery storage and DISA issues a standalone RFP for cloud-based internet isolation, the procurement signal is clear: these technologies have graduated from line items within larger IT contracts to independent acquisition categories with their own budget codes, program offices, and acquisition strategies.
For vendors, this means the competitive field narrows to firms with specific encryption, PKI, key lifecycle management, and zero-trust web gateway capabilities — rather than broad IT services primes who happened to include these as sub-tasks. Specialists win when procurement matures into standalone line items. This is the same trajectory SIEM went through between 2015 and 2020, and it is happening now for encryption infrastructure.
Trend 3: ICAM and PAM are getting lifecycle program status
NGA SHIELD 2.0 — the defining solicitation
The single most important cybersecurity RFI posted in Q1 2026 for firms with identity and access management capabilities is:
RFI: SHIELD 2.0
- Solicitation:
SHIELD_2_0(NAICS 541512) - Agency: National Geospatial-Intelligence Agency (NGA)
- Response deadline: April 10, 2026
- Notice type: RFI — market research for a program, not a single task order
The scope as described in the notice: NGA's Information Technology Security Services Office is seeking information on how a contractor could provide for the lifecycle management of NGA's Identity, Credential, and Access Management (ICAM) and Privileged Access Management (PAM) application services — including operations, sustainment, and future development.
The keyword here is lifecycle management. This is not a one-time ICAM deployment engagement or a time-and-materials security assessment. NGA is scoping a program — with sustained operations, ongoing sustainment, and a development roadmap — for its entire ICAM/PAM stack.
What “lifecycle program status” means competitively
When an agency moves from project-based ICAM work to a lifecycle management program acquisition, the competitive dynamics shift:
- Duration: Lifecycle programs typically run 5–10 years with options, versus 1–3 year task orders. The revenue base is larger and more predictable.
- Depth of integration: The awardee operates, not just implements. Incumbents leverage institutional knowledge at recompete. Engaging at the RFI stage — before requirements are finalized — is how firms position for the eventual award.
- Budget visibility: Once a program has its own lifecycle budget line, it shows up in agency budget justification documents and becomes trackable through forecasting ahead of formal solicitations.
ICAM as a precedent: NGA is not the only agency moving toward ICAM lifecycle programs. The pattern is visible at VA (identity management tied to network security), DHS (WidePoint's $74M identity management award is a lifecycle engagement), and DISA (zero trust architecture requires persistent ICAM operations). SHIELD 2.0 is the most explicit example of the trend, but it is not isolated.
Trend 4: SLED cyber is opening a second front — and it's underserved
The federal-first bias problem
The overwhelming majority of GovCon cybersecurity firms focus exclusively on federal procurement. SAM.gov is the primary monitor, federal NAICS codes are the primary filter, and DoD/civilian agency relationships are the primary BD focus. That creates a supply-demand imbalance in state, local, and education (SLED) cyber markets: buyer demand is growing while competitive supply remains thin.
Scout tracks SLED opportunities alongside federal solicitations. Two Q1 2026 examples illustrate the scale and legitimacy of the SLED cyber market:
State of Alaska — RFP 26-33-03
- Agency: Alaska Division of Legislative Audit
- Solicitation:
RFP 26-33-03(amended as RFP 26-33-03 A1 on 03/12/2026) - Deadline: March 31, 2026
- Source: State procurement portal (aws.state.ak.us)
- Scope: Sealed proposals from IT security and audit firms to perform cybersecurity reviews of select State of Alaska IT systems using the NIST Cybersecurity Framework (CSF) and Center for Internet Security (CIS) Controls
This is a full RFP — not an RFI — for real assessment work against real state systems. The scope mirrors what federal agencies buy under NIST SP 800-53 assessment frameworks. Firms with FedRAMP, FISMA, or NIST CSF experience are directly qualified.
San Diego County Regional Airport Authority
- Agency: San Diego County Regional Airport Authority
- Notice: On-Call Information Technology Cyber Services RFI
- Deadline: March 23, 2026
- Source: PlanetBids procurement portal (non-federal)
- Scope: On-call cybersecurity services for airport IT infrastructure
Airport authorities, port authorities, transit agencies, and utility districts are a segment of the SLED cyber market that receives almost no attention from federal contractors — despite operating critical infrastructure under DHS guidance, using NIST frameworks, and buying cybersecurity services on multi-year on-call contracts that rival federal task orders in value.
The SLED competitive advantage
For firms with established federal cyber credentials, SLED markets offer three advantages:
- Lower competition density: Federal primes rarely pursue SLED work. Small and mid-size cyber firms that do face significantly fewer competing proposals.
- NIST framework alignment: Most SLED cyber procurement aligns to NIST CSF and CIS Controls — the same frameworks used in federal civilian agency work. The technical transition is minimal.
- Scout coverage: Scout systematically surfaces SLED cyber opportunities alongside SAM.gov federal data, so pipeline building across both markets is possible from a single tool.
Trend 5: Long-duration contract vehicles are open now — most firms aren't using them
Why long-duration vehicles matter
By the time most firms see an RFP, the competitive outcome is already shaped. Incumbent relationships, requirements that reflect an existing provider's capabilities, and evaluation criteria written to reward specific past performance accumulate during the pre-RFP period. Firms winning consistently in the federal cyber market are working opportunities 12 to 24 months before the RFP posts.
Long-duration vehicles — IDIQs, BAAs, and continuously-open contract mechanisms — are the primary tool for entering this pre-RFP period legitimately. Two are open now with substantial remaining runway. For a candid view of who is competitive on a major vehicle, see our OASIS+ reality check.
OASIS+ — GSA/FAS
- Solicitation family:
47QRCA23R0006-P2and related pool solicitations (47QRCA23R0001-P2through47QRCA23R0006-P2) - Agency: GSA Federal Acquisition Service, Office of Professional Services and Human Capital Categories
- Current status: Amendment 0008, continuously open
- Deadline: January 11, 2027
- NAICS: 541990 (primary), covers broad professional services including IT and cybersecurity
- Set-aside pools: Unrestricted, Total Small Business, 8(a), HUBZone, SDVOSB, WOSB — six separate pools
OASIS+ is a multi-agency IDIQ — meaning any federal agency can use it to issue task orders without a separate full and open competition. For cybersecurity firms, getting on OASIS+ means being accessible to the entire federal civilian agency market through a single contract vehicle for the life of the IDIQ.
The current amendment reopened submissions in January 2026 under a new evaluation framework. Firms that submitted under prior amendments and were not awarded can re-compete. Firms that never submitted have until January 2027.
The opportunity cost of waiting: OASIS+ task orders are already being issued to current holders. Every month a qualified firm is not on the vehicle is a month of task order revenue going to competitors who moved earlier.
Army C2 Cross-Functional Team BAA — BAA-25-R-C2CFT
- Solicitation:
BAA-25-R-C2CFT(NAICS 334290 primary; scope covers C2 technology broadly) - Agency: U.S. Army Contracting Command / PEO C3N
- Posted: March 2026
- Open through: March 23, 2030 — four full years of rolling submission
- Entry mechanism: White papers submitted at any time during the open period; full proposals invited for selected WPs; awards may be made during or after the BAA expiration date
The C2-CFT BAA covers R&D in command and control technologies, including secure communications, cyber resilience for tactical networks, data-centric security operations, and intelligence automation. White papers do not require a live RFP to exist — they can be submitted at any time, reviewed on a rolling basis, and form the basis for funded research agreements.
For cyber firms with R&D capabilities, this is a low-friction entry point into Army modernization priorities. The four-year window means there is no artificial deadline pressure — but there is also no natural urgency, which is why most firms deprioritize it. Scout tracks BAA activity and white paper windows so BD can time submissions to funding cycles rather than scrambling ad hoc.
The FAA post-quantum cryptography signal — a trend to watch
One additional solicitation from Q1 2026 that does not fit neatly into the five primary trends deserves attention as a leading indicator:
Post Quantum Cryptography Support for FAA IT and NAS Systems
- Solicitation:
697DCK-26-RFI-PQC(NAICS 541511) - Agency: Federal Aviation Administration
- Deadline: April 10, 2026 (RFI responses)
- Scope: Market research for post-quantum cryptography support across FAA information technology systems and National Airspace System infrastructure
NIST finalized its first post-quantum cryptography standards in 2024 (FIPS 203, 204, 205). Federal agencies are now beginning planning for migrating cryptographic infrastructure to quantum-resistant algorithms — a migration that will affect every system handling sensitive data across the federal government.
The FAA RFI is a major civilian agency public procurement signal tied directly to this migration. It will not be the last. Firms with PQC capabilities — or relationships to algorithm developers and cryptographic infrastructure vendors — should be responding to this RFI and positioning for the formal solicitation that will follow.
The buyer landscape: who is actively spending on cyber in Q1 2026
The following table summarizes the active buyer landscape as of March 2026, drawn from Scout's opportunity database and award history data:
| Buyer | Active signals | Primary focus | Key vehicle |
|---|---|---|---|
| DoD (Army, Navy, Air Force) | 18 open opportunities | CMMC compliance, C2 security, network resilience | OASIS+, C2-CFT BAA, direct awards |
| DISA | 3+ active solicitations | Zero trust, managed storage, internet isolation | Direct IDIQ / standalone |
| NGA | SHIELD 2.0 RFI | ICAM/PAM lifecycle operations | Program award (TBD) |
| Veterans Affairs | 2+ RFIs | Key management, network security, ITAM | T4NG, standalone |
| USDA / CSD | STRATUS GUS RFI | API security, cybersecurity division support | Direct award |
| FAA | PQC RFI | Post-quantum cryptography migration | TBD |
| GSA / FAS | OASIS+ vehicle | Governmentwide cyber services access | OASIS+ IDIQ |
| State of Alaska | RFP 26-33-03 | NIST CSF assessments of state IT systems | Direct contract |
| San Diego Airport Authority | On-call cyber RFI | Airport IT cybersecurity services | On-call IDIQ |
Action horizon: deadlines that matter right now
The following deadline map reflects Scout data as of March 23, 2026. Verify current dates on SAM.gov, agency portals, or in Scout before you commit capture resources.
Closing within days
- State of Alaska Cyber Assessment RFP — March 31, 2026 (full proposals required)
Closing within ~30 days
- NGA SHIELD 2.0 ICAM/PAM RFI — April 10, 2026
- FAA Post-Quantum Cryptography RFI — April 10, 2026
- DISA Enterprise Service Solutions IV — April 7, 2026 (extended)
- USDA STRATUS GUS API Security SME — April 12, 2026
- BIA Security Onion Support for OIT — April 2, 2026 (NAICS 541519)
- Army INSCOM Intelligence and Automation Operations — April 17, 2026 (NAICS 541519)
Continuously open — strategic positioning
- OASIS+ (all six set-aside pools) — January 11, 2027 (new submissions under Amendment 0008)
- Army C2-CFT Broad Agency Announcement — March 23, 2030 (rolling white paper submissions)
What this means for BD strategy in 2026
The five trends are not independent — they are reinforcing. CMMC enforcement concentrates qualified vendor supply, driving agencies to look harder at specialized firms who have done the compliance work. ICAM/PAM lifecycle programs create multi-year revenue for firms willing to pursue them before the RFP. Encryption and key management specialization rewards depth over breadth. SLED cyber opens new segments for federal-credentialed firms. Long-duration vehicles create the pre-RFP access that separates consistent winners from occasional bidders.
The common thread is early access and early positioning. By the time a solicitation is a full RFP, the firms that responded to the RFI, submitted a white paper, or engaged at sources-sought are already at a structural advantage.
Scout is designed to give your BD team that early access systematically — through a live data feed that surfaces signals before the broad market clocks them.
About this data
All opportunity data in this article was sourced from PrimeRFP Scout's live database as of March 2026. Scout aggregates federal solicitations from SAM.gov, award history from USASpending.gov, and state/local/education opportunities from procurement portals across all 50 states — updated continuously.
Solicitation numbers are provided for cited opportunities. Readers can verify notices on SAM.gov by searching the solicitation number, or log into Scout for full detail views, AI analysis, Proposability™ scoring, and recompete intelligence.
Award values cited reflect obligated contract values from USASpending federal contract records. Ceiling values for IDIQs may differ from obligated amounts.
Start your own scan
The opportunities in this article represent a single themed search across a subset of Scout's database. Your pipeline scan — filtered to your NAICS codes, agencies, clearances, and certifications — will surface a different and more targeted set of signals.
Explore plans and start a discovery workflow at primerfp.com and primerfp.com/scout. For platform comparison context, see our GovCon search platform index (Q1 2026).
For organizations pursuing the opportunities cited here, Scout Premier provides capture strategy support, Advantage Statement™ positioning, and expert BD guidance from a team that has supported over $2B in federal contract wins. See pricing for plans.
Related reading
OASIS+ reality check — past performance on similar IDIQs and who is actually competitive.
© 2026 PrimeRFP. Data sourced from PrimeRFP Scout, SAM.gov, and USASpending.gov. All solicitation information is public record. This article is provided for market intelligence purposes and does not constitute legal or procurement advice.
