Mary Ellen Seale National Protection and Programs Directorate May 16, 2012
|
|
- Dennis Paul
- 8 years ago
- Views:
Transcription
1 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012
2 Obtaining Federal Funding Understanding the Landscape Contracting Small Business Programs Larger R&D Solicitations Summary / Q&A Presenter s Name June 17,
3 Federal Research Community Agency/Org Research Agenda Researchers Customers National Science Foundation (NSF) Broad range of cybersecurity topics; several academic centers Academics and Non-Profits Basic Research no specific customers Defense Advanced Research Projects Agency (DARPA) Mostly classified; unclassified are focused on MANET solutions Few academics; large system integrators; research and government labs Mostly DoD; most solutions are GOTS, not COTS National Security Agency (NSA) SE Linux; Networking theory; CAEIAE centers Mostly in-house Intelligence community; some NSA internal, some open source Intelligence Advanced Research Projects Agency (IARPA) Accountable Information Flow; Large Scale System Defense; Privacy Protection Technologies Mostly research labs, system integrators, national labs; some academics Intelligence community Department of Homeland Security (DHS) All unclassified; secure Internet protocols; process control systems, Emerging Threats; Insider Threats; Cyber Forensics; Open Security Technologies; Next Generation Technologies Blend of academics, research & government labs, non-profits, private sector and small business DHS Components (including NPPD, USCG, FLETC, USSS); CI/KR Sectors; USG and Internet Presenter s Name June 17,
4 Increasing your success rate Understand your client Federal agencies have distinctly different characteristics and structure Different missions Different processes Federal agencies are not charities Money is appropriated to them for specific purposes You will be more successful if you can explain why your proposed technology supports their mission Presenter s Name June 17,
5 Federal R&D/Tech Insertion Process Planning Identify requirements Develop program plan and allocate resources Communicate plans and priorities to technical community Solicitation Posting Solicitations Solicitation Process White Papers. RFIs, RFPs, SOOs, SOWs, Submitting proposals Contract Different programs demand different contract vehicles Flexibility used to match mission Execution Programs tailored to meet unique conditions or objectives Active interaction with performers Presenter s Name June 17,
6 Mechanics of Proposing Technology Solutions Find agencies with closest mission match Identify R&D and operational element(s) within agencies Look for existing solicitations (Money already exists for these efforts!) Do your homework (LOOK AT PREVIOUS SOLICITATIONS, read websites, attend workshops; network with other successful solicitors and obtain presentations on your target program solicitation) Respond to solicitation carefully meet all administrative requirements and make sure your proposal matches the stated program needs If no solicitation, contact the R&D program manager, contracting office, small business office. Explain relevance of your techology solution to the organization s mission. Be patient. Be persistent. Presenter s Name June 17,
7 Contracting Vehicles The Government has a range of vehicles to match programmatic needs Grants Contracts Cooperative research agreements (CRADAs) Partnership Intermediary Agreements (PIAs) National Lab networks Other Transactions for Research or Prototypes Allows government to deal with non-traditional contractors who have desirable technologies, but do not want to keep Government books Must comply with GAAP - generally acceptable accounting principles Presenter s Name June 17,
8 R&D and Tech Insertion Proposals Defined business case/use case a good place to start Develop and present a team approach (technical and business) Solicit advice from a former government contracting expert who can help with FAR etc. Cost realism Cost or Price Analysis Different Contract types Presenter s Name June 17,
9 Cost or Price Analysis Level of Complexity will vary Contract type Dollar value Proposal Basis Be prepared to provide back up data Define indirect cost structure Financial Audit* Proposal Costs Accounting System Estimating System Financial Capabilities * If you ve never had a government contract, consider talking with DCAA (Defense Contract Audit Agency) Past Performance Presenter s Name June 17,
10 The Normal Contract (things you should know) Terms Read and understand the contract Contract Line Items/Deliverables Contract Clauses Performance Proposal what did you say you would do? Deliverables due dates Acceptance How Accomplished Payment Invoicing Procedures and Certification Prompt Payment Act Limitation of Funds/Limitation of Cost Presenter s Name June 17,
11 Helpful Contracting Websites Presenter s Name June 17,
12 Programs for U.S. Small Business Small Business Innovation Research (SBIR) - 2.5% Set-aside program for small business concerns to engage in federal R&D -- with potential for commercialization Small Business Technology Transfer (STTR) -.3% Set-aside program to facilitate cooperative R&D between small business concerns and research institutions -- with potential for commercialization SBIR 3 Phases PHASE I - Feasibility Study - $100K/approx 6 month effort PHASE II - Full Research/R&D - $750K/approx 24 month effort; Commercialization plan required PHASE III - Commercialization Stage - Use of non-sbir Funds Presenter s Name June 17,
13 SBIR Small Business Eligibility Organized for profit Place of business located in the U.S. Operates primarily within the U.S. Or which makes significant contribution to the U.S. economy through payment of taxes or use of American products, materials or labor Is a legal entity - individual proprietorship, partnership, limited liability company, corporation, joint venture, association, trust or cooperative Fewer than 500 employees Principle Investigatro (PI) must be an employee with the small business concern at the time of award Presenter s Name June 17,
14 Useful Websites for SBIRs Presenter s Name June 17,
15 Broad Area Announcements R&D funding model that delivers both near-term and mediumterm solutions: To develop new and enhanced technologies for the detection of, prevention of, and response to cyber attacks on the nation s critical information infrastructure. To perform research and development (R&D) aimed at improving the security of existing deployed technologies and to ensure the security of new emerging systems; To facilitate the transfer of these technologies into the national infrastructure as a matter of urgency. Presenter s Name June 17,
16 BAA Program / Proposal Structure Type I (New Technologies) New technologies with an applied research phase, a development phase, and a deployment phase (optional) Funding not to exceed 36 months (including deployment phase) Type II (Prototype Technologies) More mature prototype technologies with a development phase and a deployment phase (optional) Funding not to exceed 24 months (including deployment phase) Type III (Mature Technologies) Mature technology with a deployment phase only. Funding not to exceed 12 months Presenter s Name June 17,
17 Technical Topic Areas (DHS) (11-02) Software Assurance Enterprise-Level Security Metrics Usable Security Insider Threat Resilient Systems and Networks Modeling of Internet Attacks Network Mapping and Measurement Incident Response Communities Cyber Economics Digital Provenance Hardware-Enabled Trust Moving Target Defense Nature-Inspired Cyber Health Software Assurance MarketPlace (SWAMP) Presenter s Name June 17,
18 A Roadmap for Cybersecurity Research Scalable Trustworthy Systems Enterprise Level Metrics System Evaluation Lifecycle Combatting Insider Threats Combatting Malware and Botnets Global-Scale Identity Management Survivability of Time-Critical Systems Situational Understanding and Attack Attribution Information Provenance Privacy-Aware Security Usable Security Presenter s Name June 17,
19 Federal Cybersecurity R&D Strategic Plan Research Themes Tailored Trustworthy Spaces Moving Target Defense Cyber Economics and Incentives Designed-In Security (New for FY12) Science of Cyber Security Transition to Practice Technology Discovery Test & Evaluation / Experimental Deployment Transition / Adoption / Commercialization Support for National Priorities Health IT, Smart Grid, NSTIC (Trusted Identity), NICE (Education), Financial Services Presenter s Name June 17,
20 Points of Contact: Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) / Mary Ellen Seale Chief Technologist for Technology Transition - cyber National Preparedness and Protection Directorate, (NPPD) maryellen.seale@dhs.gov / For more information, visit Presenter s Name June 17,
21
Cyber Security Division Overview
Homeland Security Advanced Research Projects Agency Cyber Security Division Overview Douglas Maughan, Ph.D. Director October 9, 2012 http://www.cyber.st.dhs.gov Environment: Greater Use of Technology,
More informationDHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview TCIPG Industry Workshop UIUC November 8, 2011 Greg Wigton Program Manager Cyber Security Division
More informationBenefits of Collaborative Science and Innovation - Improve Cyber Security
Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe A View from the U.S. Department of Homeland Security (DHS) Background Envision a future... in which universities
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationDHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview NDIA Executive Briefing Crystal City, VA February 17, 2011 Douglas Maughan, Ph.D. Division Director
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationIn December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity
Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,
More informationFinancing Small Firm Innovation in the United States
Financing Small Firm Innovation in the United States The Small Business Innovation Research (SBIR) and related programs Ronald S. Cooper, PhD Office of Technology Background: National Policy Shift 1950s-1960s
More informationThe Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program
Office of Investment and Innovation The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program Program Overview Mission of the SBIR/STTR Program SBIR Program To
More informationDHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview BAA 11-XX Industry Day WDC November 17, 2010 Douglas Maughan, Ph.D. Division Director Cyber Security
More informationSources of Funding Cyber Security Research
Cybersecurity: Alternative Sources of Funding Dr. Diane Murphy TECHNOLOGY AND INVESTOR FORUM SEPTEMBER 13, 2011 CYBERSECURITY BUSINESS SPACE Cybersecurity is everywhere: Defense Homeland Security Counterintelligence
More informationDHS S&T Cyber Security R&D Programs
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security R&D Programs Ann Cox, PhD Program Manager October 24, 2014 http://www.dhs.gov/cyber-research Presentation Outline Threat Space
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationAn Update from Washington Cybersecurity / R&D
Homeland Security Advanced Research Projects Agency An Update from Washington Cybersecurity / R&D Douglas Maughan, Ph.D. Division Director October 30, 2012 http://www.cyber.st.dhs.gov Environment: Greater
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationParticipants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
More informationPreventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationRESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
More informationToward a Federal Cybersecurity Research Agenda: Three Game-changing Themes
Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Dr. Jeannette Wing Assistant Director for Computer
More informationCyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 5 R-1 Line #159
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationSmall Business Innovation Research (SBIR) & Small Business Technology Transfer (STTR) Seminar
Small Business Innovation Research (SBIR) & Small Business Technology Transfer (STTR) Seminar Cheryl Vickroy, MBA Director, Business Development and Technology Transfer March 3, 2011 Wisconsin Entrepreneurs
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationDHS S&T Cyber Security R&D Program
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov
More informationNIH SBIR/STTR Program
NIH SBIR/STTR Program Andrea Sawczuk, DDS, PhD Health Scientist Administrator Division of Clinical Innovation National Center for Advancing Translational Sciences 6701 Democracy Boulevard MSC 4874 Bethesda,
More informationThe Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program
Office of Investment and Innovation The Small Business Innovation Research () and Small Business Technology Transfer (STTR) Overview & Key Changes with Reauthorization August 15, 2013 Presenter: Lisa Younger
More informationGovernment Research Needs: Who Funds What?
Dept. of Homeland Security Science & Technology Directorate Government Research Needs: Who Funds What? ACSAC 2009 Honolulu, HI December 10, 2009 Douglas Maughan, Ph.D. Branch Chief / Program Mgr. douglas.maughan@dhs.gov
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationThe DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results
The DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results Thomas A. Cellucci, Ph.D., MBA Director, Office of Public-Private Partnerships Science
More informationGaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
More informationThe Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Program
Office of Investment and Innovation The Small Business Innovation Research () and Small Business Technology Transfer (STTR) Overview & Key Changes with Reauthorization Table of Contents Overview Participating
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationNational Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
More informationThe Cybersecurity Research Alliance
The Cybersecurity Research Alliance Executive Summary Motivation is a national priority that must be addressed to defend our society economy from attacks that undermine their digital foundation. A coherent
More informationInitiative Three Exercise
for the Initiative Three Exercise March 18, 2010 Contact Point United States Computer Emergency Readiness Team (US-CERT) (888) 282-0870 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
More informationWritten Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More informationHow To Transition Research Into Practice
2013 IEEE. Appears in IEEE Security & Privacy Magazine, Vol. 11, No. 2, March- April 2013, pp. 14-23. (https://ieeexplore.ieee.org/xpl/articledetails.jsp?tp=&arnumber=6493323) Crossing the Valley of Death
More informationIntroduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
More informationWhy Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
More informationCharles Eason SBIR/STTR Specialist Tech Futures Group (707) 863-7846 charles.eason@solano.edu
Charles Eason SBIR/STTR Specialist Tech Futures Group (707) 863-7846 charles.eason@solano.edu ShapeMaker Technology Rapid Prototyping Process called Thick Layer Object Manufacturing Can produce objects
More informationScience or Security. George O. Strawn NSF & NITRD (retired)
Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations
More informationNorthrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationCyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationAT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationEvaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,
More informationDHS S&T Cyber Security Division (CSD) PREDICT Overview
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) PREDICT Overview Douglas Maughan Division Director November 2, 2015 http://www.dhs.gov/cyber-research DHS S&T Research
More informationBefore the Federal Communications Commission Washington, D.C.
Before the Federal Communications Commission Washington, D.C. In the Matter of Cyber Security Certification Program PS Docket No. 10-93 COMMENTS OF THE NATIONAL ASSOCIATION OF STATE UTILITY CONSUMER ADVOCATES
More informationEffective Information Sharing and Analysis Process
Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting
More informationTestimony of. Cita M. Furlani Director
Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce Joint Hearing Before the United States House
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationFederal Regulatory Compliance Best Practices Washington Technology Webcast. September 27, 2012
Federal Regulatory Compliance Best Practices Washington Technology Webcast September 27, 2012 Agenda Topic Minutes Regulatory compliance overview 5 Major areas of financial compliance risk 15 Best practices
More informationJune 9, 2014. Dear Colleagues:
June 9, 2014 Dear Colleagues: Today our Nation s security, economic progress, and modern lifestyle all rely upon maintaining a trustworthy digital infrastructure that is resilient and responsive to threats.
More informationBlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
More informationSmall Business Innovation Research (SBIR) Programs. Science and Technology (S&T) Directorate Domestic Nuclear Detection Office (DNDO)
U.S. Department of Homeland Security Small Business Innovation Research (SBIR) Programs Science and Technology (S&T) Directorate Domestic Nuclear Detection Office (DNDO) 2015 SBIR Road Tour March 24 th,
More informationCyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
More informationClick to edit Master title style
Click to edit Master title style National Aeronautics and Space Administration Mark Davidson Technology Infusion Manager (JPL) June 1, 2016 www.nasa.gov 1 . Starts Here on Earth SBIR Assists in Emergency
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationU.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
More informationCapabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
More informationNetwork Security Deployment Obligation and Expenditure Report
Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate
More informationCyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
More informationMethodology for Assessment of Security Properties
Methodology for Assessment of Security Properties Cyber Security Division 2012 Principal Investigators Meeting October 9-11, 2012 Cynthia E. Irvine Professor of Computer Science Naval Postgraduate School
More informationHomeland Open Security Technology (HOST)
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING Homeland Open Security Technology (HOST) Daniel Massey Program Manager CSD September 16, 2013 Connecting GovIT with Open Security Solutions
More informationCyber Security Research Developments Global and Indian Context
Cyber Security Research Developments Global and Indian Context Authors: Atul Kumar, Sr. Analyst Chiranshu Ahuja, Sr. Analyst 1. Problem Definition Today, given the increasing dependence on information
More informationUS Federal Cybersecurity R&D Strategic Plan
US Federal Cybersecurity R&D Strategic Plan NITRD (Program) Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationSTATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
More informationSECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
More informationChanging Legal Landscape in Cybersecurity: Implications for Business
Changing Legal Landscape in Cybersecurity: Implications for Business Presented to Greater Wilmington Cyber Security Group Presented by William R. Denny, Potter Anderson & Corroon LLP May 8, 2014 Topics
More informationComputer Network Security & Privacy Protection
Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and
More informationDHS S&T Cyber Security Division (CSD) Strategic Vision
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) Strategic Vision Douglas Maughan Division Director December 16, 2014 http://www.dhs.gov/cyber-research Presentation
More informationEnterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014
Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Acting Deputy Director Kenneth Gantt Office of Biometric Identity
More informationSecuring the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information
More informationStrategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
More informationCyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
More informationREQUEST FOR INFORMATION
Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325
More informationSMAL BUSINESS INNOVATIVE RESEARCH
POSITION STATEMENT SMAL BUSINESS INNOVATIVE RESEARCH Adopted by the IEEE-USA Board of Directors, 18 Sept. 2014 The Small Business Innovation Research (SBIR) and related Small Business Technology Transfer
More information23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationNIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
More informationDocket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
More informationCyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
More informationGovernment Perspectives on the Future of Advanced Networking Technologies
Government Perspectives on the Future of Advanced Networking Technologies Combined briefings presented at: GLOBALCOMM GLOBALCOMM Government Summit and Innovations Summit June 5, 2006 June 7, 2006 Simon
More informationCyber Legislation & Policy Developments 2014
Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal
More informationIndiana Economic Development Corporation
Indiana Economic Development Corporation 21 st Century Research and Technology Fund SBIR/STTR Handbook 1 TABLE OF CONTENTS Introduction Page 3 About the IEDC and the 21 st Century Fund Page 3 History of
More informationTHE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
More informationThe Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
More informationIntroduction to SBIR/STTR Funding Yale University. Lisa M. Kurek
Developing the Business of Technology Introduction to SBIR/STTR Funding Yale University Presented by: Lisa M. Kurek Managing Partner lisa@bbcetc.com www.bbcetc.com 734.930.9741 Copyright 2013 BBC Entrepreneurial
More information