Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Size: px
Start display at page:

Download "Mary Ellen Seale National Protection and Programs Directorate May 16, 2012"

Transcription

1 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

2 Obtaining Federal Funding Understanding the Landscape Contracting Small Business Programs Larger R&D Solicitations Summary / Q&A Presenter s Name June 17,

3 Federal Research Community Agency/Org Research Agenda Researchers Customers National Science Foundation (NSF) Broad range of cybersecurity topics; several academic centers Academics and Non-Profits Basic Research no specific customers Defense Advanced Research Projects Agency (DARPA) Mostly classified; unclassified are focused on MANET solutions Few academics; large system integrators; research and government labs Mostly DoD; most solutions are GOTS, not COTS National Security Agency (NSA) SE Linux; Networking theory; CAEIAE centers Mostly in-house Intelligence community; some NSA internal, some open source Intelligence Advanced Research Projects Agency (IARPA) Accountable Information Flow; Large Scale System Defense; Privacy Protection Technologies Mostly research labs, system integrators, national labs; some academics Intelligence community Department of Homeland Security (DHS) All unclassified; secure Internet protocols; process control systems, Emerging Threats; Insider Threats; Cyber Forensics; Open Security Technologies; Next Generation Technologies Blend of academics, research & government labs, non-profits, private sector and small business DHS Components (including NPPD, USCG, FLETC, USSS); CI/KR Sectors; USG and Internet Presenter s Name June 17,

4 Increasing your success rate Understand your client Federal agencies have distinctly different characteristics and structure Different missions Different processes Federal agencies are not charities Money is appropriated to them for specific purposes You will be more successful if you can explain why your proposed technology supports their mission Presenter s Name June 17,

5 Federal R&D/Tech Insertion Process Planning Identify requirements Develop program plan and allocate resources Communicate plans and priorities to technical community Solicitation Posting Solicitations Solicitation Process White Papers. RFIs, RFPs, SOOs, SOWs, Submitting proposals Contract Different programs demand different contract vehicles Flexibility used to match mission Execution Programs tailored to meet unique conditions or objectives Active interaction with performers Presenter s Name June 17,

6 Mechanics of Proposing Technology Solutions Find agencies with closest mission match Identify R&D and operational element(s) within agencies Look for existing solicitations (Money already exists for these efforts!) Do your homework (LOOK AT PREVIOUS SOLICITATIONS, read websites, attend workshops; network with other successful solicitors and obtain presentations on your target program solicitation) Respond to solicitation carefully meet all administrative requirements and make sure your proposal matches the stated program needs If no solicitation, contact the R&D program manager, contracting office, small business office. Explain relevance of your techology solution to the organization s mission. Be patient. Be persistent. Presenter s Name June 17,

7 Contracting Vehicles The Government has a range of vehicles to match programmatic needs Grants Contracts Cooperative research agreements (CRADAs) Partnership Intermediary Agreements (PIAs) National Lab networks Other Transactions for Research or Prototypes Allows government to deal with non-traditional contractors who have desirable technologies, but do not want to keep Government books Must comply with GAAP - generally acceptable accounting principles Presenter s Name June 17,

8 R&D and Tech Insertion Proposals Defined business case/use case a good place to start Develop and present a team approach (technical and business) Solicit advice from a former government contracting expert who can help with FAR etc. Cost realism Cost or Price Analysis Different Contract types Presenter s Name June 17,

9 Cost or Price Analysis Level of Complexity will vary Contract type Dollar value Proposal Basis Be prepared to provide back up data Define indirect cost structure Financial Audit* Proposal Costs Accounting System Estimating System Financial Capabilities * If you ve never had a government contract, consider talking with DCAA (Defense Contract Audit Agency) Past Performance Presenter s Name June 17,

10 The Normal Contract (things you should know) Terms Read and understand the contract Contract Line Items/Deliverables Contract Clauses Performance Proposal what did you say you would do? Deliverables due dates Acceptance How Accomplished Payment Invoicing Procedures and Certification Prompt Payment Act Limitation of Funds/Limitation of Cost Presenter s Name June 17,

11 Helpful Contracting Websites Presenter s Name June 17,

12 Programs for U.S. Small Business Small Business Innovation Research (SBIR) - 2.5% Set-aside program for small business concerns to engage in federal R&D -- with potential for commercialization Small Business Technology Transfer (STTR) -.3% Set-aside program to facilitate cooperative R&D between small business concerns and research institutions -- with potential for commercialization SBIR 3 Phases PHASE I - Feasibility Study - $100K/approx 6 month effort PHASE II - Full Research/R&D - $750K/approx 24 month effort; Commercialization plan required PHASE III - Commercialization Stage - Use of non-sbir Funds Presenter s Name June 17,

13 SBIR Small Business Eligibility Organized for profit Place of business located in the U.S. Operates primarily within the U.S. Or which makes significant contribution to the U.S. economy through payment of taxes or use of American products, materials or labor Is a legal entity - individual proprietorship, partnership, limited liability company, corporation, joint venture, association, trust or cooperative Fewer than 500 employees Principle Investigatro (PI) must be an employee with the small business concern at the time of award Presenter s Name June 17,

14 Useful Websites for SBIRs Presenter s Name June 17,

15 Broad Area Announcements R&D funding model that delivers both near-term and mediumterm solutions: To develop new and enhanced technologies for the detection of, prevention of, and response to cyber attacks on the nation s critical information infrastructure. To perform research and development (R&D) aimed at improving the security of existing deployed technologies and to ensure the security of new emerging systems; To facilitate the transfer of these technologies into the national infrastructure as a matter of urgency. Presenter s Name June 17,

16 BAA Program / Proposal Structure Type I (New Technologies) New technologies with an applied research phase, a development phase, and a deployment phase (optional) Funding not to exceed 36 months (including deployment phase) Type II (Prototype Technologies) More mature prototype technologies with a development phase and a deployment phase (optional) Funding not to exceed 24 months (including deployment phase) Type III (Mature Technologies) Mature technology with a deployment phase only. Funding not to exceed 12 months Presenter s Name June 17,

17 Technical Topic Areas (DHS) (11-02) Software Assurance Enterprise-Level Security Metrics Usable Security Insider Threat Resilient Systems and Networks Modeling of Internet Attacks Network Mapping and Measurement Incident Response Communities Cyber Economics Digital Provenance Hardware-Enabled Trust Moving Target Defense Nature-Inspired Cyber Health Software Assurance MarketPlace (SWAMP) Presenter s Name June 17,

18 A Roadmap for Cybersecurity Research Scalable Trustworthy Systems Enterprise Level Metrics System Evaluation Lifecycle Combatting Insider Threats Combatting Malware and Botnets Global-Scale Identity Management Survivability of Time-Critical Systems Situational Understanding and Attack Attribution Information Provenance Privacy-Aware Security Usable Security Presenter s Name June 17,

19 Federal Cybersecurity R&D Strategic Plan Research Themes Tailored Trustworthy Spaces Moving Target Defense Cyber Economics and Incentives Designed-In Security (New for FY12) Science of Cyber Security Transition to Practice Technology Discovery Test & Evaluation / Experimental Deployment Transition / Adoption / Commercialization Support for National Priorities Health IT, Smart Grid, NSTIC (Trusted Identity), NICE (Education), Financial Services Presenter s Name June 17,

20 Points of Contact: Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) / Mary Ellen Seale Chief Technologist for Technology Transition - cyber National Preparedness and Protection Directorate, (NPPD) maryellen.seale@dhs.gov / For more information, visit Presenter s Name June 17,

21

Cyber Security Division Overview

Cyber Security Division Overview Homeland Security Advanced Research Projects Agency Cyber Security Division Overview Douglas Maughan, Ph.D. Director October 9, 2012 http://www.cyber.st.dhs.gov Environment: Greater Use of Technology,

More information

DHS S&T Cyber Security Division (CSD) Overview

DHS S&T Cyber Security Division (CSD) Overview Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview TCIPG Industry Workshop UIUC November 8, 2011 Greg Wigton Program Manager Cyber Security Division

More information

Benefits of Collaborative Science and Innovation - Improve Cyber Security

Benefits of Collaborative Science and Innovation - Improve Cyber Security Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe A View from the U.S. Department of Homeland Security (DHS) Background Envision a future... in which universities

More information

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity

More information

DHS S&T Cyber Security Division (CSD) Overview

DHS S&T Cyber Security Division (CSD) Overview Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview NDIA Executive Briefing Crystal City, VA February 17, 2011 Douglas Maughan, Ph.D. Division Director

More information

US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program. NITRD Program US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

More information

Financing Small Firm Innovation in the United States

Financing Small Firm Innovation in the United States Financing Small Firm Innovation in the United States The Small Business Innovation Research (SBIR) and related programs Ronald S. Cooper, PhD Office of Technology Background: National Policy Shift 1950s-1960s

More information

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program Office of Investment and Innovation The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program Program Overview Mission of the SBIR/STTR Program SBIR Program To

More information

DHS S&T Cyber Security Division (CSD) Overview

DHS S&T Cyber Security Division (CSD) Overview Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview BAA 11-XX Industry Day WDC November 17, 2010 Douglas Maughan, Ph.D. Division Director Cyber Security

More information

Sources of Funding Cyber Security Research

Sources of Funding Cyber Security Research Cybersecurity: Alternative Sources of Funding Dr. Diane Murphy TECHNOLOGY AND INVESTOR FORUM SEPTEMBER 13, 2011 CYBERSECURITY BUSINESS SPACE Cybersecurity is everywhere: Defense Homeland Security Counterintelligence

More information

DHS S&T Cyber Security R&D Programs

DHS S&T Cyber Security R&D Programs Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security R&D Programs Ann Cox, PhD Program Manager October 24, 2014 http://www.dhs.gov/cyber-research Presentation Outline Threat Space

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

An Update from Washington Cybersecurity / R&D

An Update from Washington Cybersecurity / R&D Homeland Security Advanced Research Projects Agency An Update from Washington Cybersecurity / R&D Douglas Maughan, Ph.D. Division Director October 30, 2012 http://www.cyber.st.dhs.gov Environment: Greater

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

Participants: Introduction:

Participants: Introduction: National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)

More information

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Dr. Jeannette Wing Assistant Director for Computer

More information

Cyber Security Research and Development a Homeland Security Perspective

Cyber Security Research and Development a Homeland Security Perspective FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 5 R-1 Line #159

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 5 R-1 Line #159 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

Small Business Innovation Research (SBIR) & Small Business Technology Transfer (STTR) Seminar

Small Business Innovation Research (SBIR) & Small Business Technology Transfer (STTR) Seminar Small Business Innovation Research (SBIR) & Small Business Technology Transfer (STTR) Seminar Cheryl Vickroy, MBA Director, Business Development and Technology Transfer March 3, 2011 Wisconsin Entrepreneurs

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

DHS S&T Cyber Security R&D Program

DHS S&T Cyber Security R&D Program Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov

More information

NIH SBIR/STTR Program

NIH SBIR/STTR Program NIH SBIR/STTR Program Andrea Sawczuk, DDS, PhD Health Scientist Administrator Division of Clinical Innovation National Center for Advancing Translational Sciences 6701 Democracy Boulevard MSC 4874 Bethesda,

More information

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program Office of Investment and Innovation The Small Business Innovation Research () and Small Business Technology Transfer (STTR) Overview & Key Changes with Reauthorization August 15, 2013 Presenter: Lisa Younger

More information

Government Research Needs: Who Funds What?

Government Research Needs: Who Funds What? Dept. of Homeland Security Science & Technology Directorate Government Research Needs: Who Funds What? ACSAC 2009 Honolulu, HI December 10, 2009 Douglas Maughan, Ph.D. Branch Chief / Program Mgr. douglas.maughan@dhs.gov

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

The DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results

The DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results The DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results Thomas A. Cellucci, Ph.D., MBA Director, Office of Public-Private Partnerships Science

More information

Gaming System Monitoring and Analysis Effort

Gaming System Monitoring and Analysis Effort for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting

More information

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program

The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program Office of Investment and Innovation The Small Business Innovation Research () and Small Business Technology Transfer (STTR) Overview & Key Changes with Reauthorization Table of Contents Overview Participating

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)

More information

The Cybersecurity Research Alliance

The Cybersecurity Research Alliance The Cybersecurity Research Alliance Executive Summary Motivation is a national priority that must be addressed to defend our society economy from attacks that undermine their digital foundation. A coherent

More information

Initiative Three Exercise

Initiative Three Exercise for the Initiative Three Exercise March 18, 2010 Contact Point United States Computer Emergency Readiness Team (US-CERT) (888) 282-0870 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

How To Transition Research Into Practice

How To Transition Research Into Practice 2013 IEEE. Appears in IEEE Security & Privacy Magazine, Vol. 11, No. 2, March- April 2013, pp. 14-23. (https://ieeexplore.ieee.org/xpl/articledetails.jsp?tp=&arnumber=6493323) Crossing the Valley of Death

More information

Introduction to NICE Cybersecurity Workforce Framework

Introduction to NICE Cybersecurity Workforce Framework Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,

More information

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government

More information

Charles Eason SBIR/STTR Specialist Tech Futures Group (707) 863-7846 charles.eason@solano.edu

Charles Eason SBIR/STTR Specialist Tech Futures Group (707) 863-7846 charles.eason@solano.edu Charles Eason SBIR/STTR Specialist Tech Futures Group (707) 863-7846 charles.eason@solano.edu ShapeMaker Technology Rapid Prototyping Process called Thick Layer Object Manufacturing Can produce objects

More information

Science or Security. George O. Strawn NSF & NITRD (retired)

Science or Security. George O. Strawn NSF & NITRD (retired) Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

AT&T Cybersecurity Policy Overview

AT&T Cybersecurity Policy Overview AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Evaluation of DHS' Information Security Program for Fiscal Year 2015 Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,

More information

DHS S&T Cyber Security Division (CSD) PREDICT Overview

DHS S&T Cyber Security Division (CSD) PREDICT Overview Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) PREDICT Overview Douglas Maughan Division Director November 2, 2015 http://www.dhs.gov/cyber-research DHS S&T Research

More information

Before the Federal Communications Commission Washington, D.C.

Before the Federal Communications Commission Washington, D.C. Before the Federal Communications Commission Washington, D.C. In the Matter of Cyber Security Certification Program PS Docket No. 10-93 COMMENTS OF THE NATIONAL ASSOCIATION OF STATE UTILITY CONSUMER ADVOCATES

More information

Effective Information Sharing and Analysis Process

Effective Information Sharing and Analysis Process Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting

More information

Testimony of. Cita M. Furlani Director

Testimony of. Cita M. Furlani Director Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce Joint Hearing Before the United States House

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Federal Regulatory Compliance Best Practices Washington Technology Webcast. September 27, 2012

Federal Regulatory Compliance Best Practices Washington Technology Webcast. September 27, 2012 Federal Regulatory Compliance Best Practices Washington Technology Webcast September 27, 2012 Agenda Topic Minutes Regulatory compliance overview 5 Major areas of financial compliance risk 15 Best practices

More information

June 9, 2014. Dear Colleagues:

June 9, 2014. Dear Colleagues: June 9, 2014 Dear Colleagues: Today our Nation s security, economic progress, and modern lifestyle all rely upon maintaining a trustworthy digital infrastructure that is resilient and responsive to threats.

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

Small Business Innovation Research (SBIR) Programs. Science and Technology (S&T) Directorate Domestic Nuclear Detection Office (DNDO)

Small Business Innovation Research (SBIR) Programs. Science and Technology (S&T) Directorate Domestic Nuclear Detection Office (DNDO) U.S. Department of Homeland Security Small Business Innovation Research (SBIR) Programs Science and Technology (S&T) Directorate Domestic Nuclear Detection Office (DNDO) 2015 SBIR Road Tour March 24 th,

More information

Cyber Security key emerging risk Q3 2015

Cyber Security key emerging risk Q3 2015 Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style National Aeronautics and Space Administration Mark Davidson Technology Infusion Manager (JPL) June 1, 2016 www.nasa.gov 1 . Starts Here on Earth SBIR Assists in Emergency

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

Network Security Deployment Obligation and Expenditure Report

Network Security Deployment Obligation and Expenditure Report Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

Methodology for Assessment of Security Properties

Methodology for Assessment of Security Properties Methodology for Assessment of Security Properties Cyber Security Division 2012 Principal Investigators Meeting October 9-11, 2012 Cynthia E. Irvine Professor of Computer Science Naval Postgraduate School

More information

Homeland Open Security Technology (HOST)

Homeland Open Security Technology (HOST) CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING Homeland Open Security Technology (HOST) Daniel Massey Program Manager CSD September 16, 2013 Connecting GovIT with Open Security Solutions

More information

Cyber Security Research Developments Global and Indian Context

Cyber Security Research Developments Global and Indian Context Cyber Security Research Developments Global and Indian Context Authors: Atul Kumar, Sr. Analyst Chiranshu Ahuja, Sr. Analyst 1. Problem Definition Today, given the increasing dependence on information

More information

US Federal Cybersecurity R&D Strategic Plan

US Federal Cybersecurity R&D Strategic Plan US Federal Cybersecurity R&D Strategic Plan NITRD (Program) Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Changing Legal Landscape in Cybersecurity: Implications for Business

Changing Legal Landscape in Cybersecurity: Implications for Business Changing Legal Landscape in Cybersecurity: Implications for Business Presented to Greater Wilmington Cyber Security Group Presented by William R. Denny, Potter Anderson & Corroon LLP May 8, 2014 Topics

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information

DHS S&T Cyber Security Division (CSD) Strategic Vision

DHS S&T Cyber Security Division (CSD) Strategic Vision Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) Strategic Vision Douglas Maughan Division Director December 16, 2014 http://www.dhs.gov/cyber-research Presentation

More information

Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014

Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Acting Deputy Director Kenneth Gantt Office of Biometric Identity

More information

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information

More information

Strategic Progress Update July 2014 March 2015

Strategic Progress Update July 2014 March 2015 Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida

More information

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc. Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your

More information

REQUEST FOR INFORMATION

REQUEST FOR INFORMATION Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325

More information

SMAL BUSINESS INNOVATIVE RESEARCH

SMAL BUSINESS INNOVATIVE RESEARCH POSITION STATEMENT SMAL BUSINESS INNOVATIVE RESEARCH Adopted by the IEEE-USA Board of Directors, 18 Sept. 2014 The Small Business Innovation Research (SBIR) and related Small Business Technology Transfer

More information

23.9.2015. Kangas Cybersecurity strategy

23.9.2015. Kangas Cybersecurity strategy Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

Government Perspectives on the Future of Advanced Networking Technologies

Government Perspectives on the Future of Advanced Networking Technologies Government Perspectives on the Future of Advanced Networking Technologies Combined briefings presented at: GLOBALCOMM GLOBALCOMM Government Summit and Innovations Summit June 5, 2006 June 7, 2006 Simon

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

Indiana Economic Development Corporation

Indiana Economic Development Corporation Indiana Economic Development Corporation 21 st Century Research and Technology Fund SBIR/STTR Handbook 1 TABLE OF CONTENTS Introduction Page 3 About the IEDC and the 21 st Century Fund Page 3 History of

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure

More information

Introduction to SBIR/STTR Funding Yale University. Lisa M. Kurek

Introduction to SBIR/STTR Funding Yale University. Lisa M. Kurek Developing the Business of Technology Introduction to SBIR/STTR Funding Yale University Presented by: Lisa M. Kurek Managing Partner lisa@bbcetc.com www.bbcetc.com 734.930.9741 Copyright 2013 BBC Entrepreneurial

More information