Santana leaves DHS, joins Energy

Catherine Santana, formerly program manager for the foundering Emerge 2 financial management project at the Homeland Security Department, has moved over to the Energy Department.

Santana spoke by phone from the Management and Operations Office of DOE. She declined to answer questions about her new role at the Energy Department.

The Emerge 2 program now is being led by other DHS personnel, she added, refusing to answer further questions.

Work on DHS' financial management system slowed to a crawl after DHS allowed a task order by prime contractor BearingPoint Inc. of McLean, Va., to expire in June. DHS halted the work after Emerge2 fell behind schedule and exceeded costs.

DHS officials were not available for comment on the status and future of DHS financial systems.

Industry sources said the department is reviewing several options to consolidate the financial systems of similar components within the department, possibly leading to a collection of enterprise resource planning systems linked by a data warehouse.

BearingPoint spokesman Steve Lunceford said, 'The [Emerge2 blanket purchase agreement] did expire in December. They [DHS] are looking at setting a new path for how they are going to take the program. I believe they are going to standardize on multiple internal systems.'

'One of systems I believe they are standardizing on is one BearingPoint helped put together for the Secret Service,' Lunceford added.

Other DHS agencies that operate financial systems include the Coast Guard, and Customs and Border Protection, industry sources said.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected