91ÌÒÉ«

TTP Workshop 1

February 25-26, 2015

Transitioning Funded Research Outcomes to Practice: Barriers, Opportunities, and Challenges

The purpose of this workshop is to identify ways to move more NSF and DHS funded research (particularly cybersecurity research) into practice. The discussion will identify the current state of the Technology Transfer to Practice (TTP) process. We will also identify factors that affect the success rate of current TTP, e.g., barriers that academic researchers face in using commercial models for transfer, specific initiatives intended to match research artifacts to existing areas of need/opportunity, and restrictions on transfer of specific types of artifacts. Including members of the numerous constituents of the current TTP community in a highly participative gathering creates an efficient feedback loop that can identify what is and is not happening in the current process, how those factors affect TTP success rates, how best to address impediments, and what changes in the existing TTP process are most likely to improve the odds of success.

This workshop is jointly funded by NSF/DHS and is organized by the University of South Alabama, where Rebecca Bace† served as workshop lead. She was Chief Strategist of the Center for Forensics, Information Technology, and Security (CFITS). Ms. Bace brought a rare range and depth of expertise to bear in leading this program. She worked in the area of IT Security research and development, venture capital, and TTP for almost three decades, with an industry-acclaimed track record for success in this area. Her experience spanned both government and commercial environments, and she advised several major initiatives elsewhere in the U.S. (specifically the CyberMaryland security incubator program, the Accelerate DC initiative and the NSF TRUST initiative.)

â–¼   Participants
Barry Costa, Director, Technology Transfer The MITRE Corporation
Roberto Perdisci, Assistant Professor University of Georgia
David Balenson, Senior Computer Scientist, SRI International
Donald Dixon, Managing Director, VC
Deborah Shands, Program Director, National Science Foundation
Angelos Stavrou , Founder Kryptowire, Associate Professor GMU
Robin Sommer, Senior Researcher, ICSI
Jenny McNeill, Project Manager, SRI International
Anita D'Amico, Director, Secure Decisions
Ulf Lindqvist, Program Director, SRI International
Jim Basney, Sr. Research Scientist, NCSA at University of Illinois
Robert Stratton, General Partner Mach37
Randy Sabett, Special Counsel Cooley LLP 
Peter Kuper, Partner IQT 
William Arbaugh, Emeritus Associate Professor, Five Directions, Inc.
Mark Cummings, Chief Technology Officer Orchestral Networks 
Matthew Alderman, VP, Strategy Tenable Network Security
Richard Abramson, VP Legal & Business Affairs SRI International
Chenxi Wang, Vice President, Cloud Security and Strategy, CipherCloud
David Stampley, Partner, Kamber Law 
Eric Byres, President Byres Security 
Wenke Lee, Professor Georgia Institute of Technology 
Robert Stratton, General Partner, Mach37 Cyber Accelerator
Inder Monga, CTO ESnet
Paul Vixie, Founder/CEO Farsight Security, Inc.
KC Claffy, Director, Caida
Robert Broberg, Distinguished Engineer, Cisco Systems 
Alberto Dainotti, Research Scientist CAIDA, UC San Diego
â–¼   Links

2015 Government Cyber Security Workshop

The 2015 Government Cyber Security SBIR Workshop was held on January 13-15, 2015 at Mayflower Renaissance Hotel Washington, DC. The workshop was Sponsored by the Department of Homeland Security (DHS) Science & Technology Directorate (S&T) Cyber Security Division (CSD), Department of Defense (DoD) Assistant Secretary of Defense for Research and Engineering (ASD [R&E]), and National Science Foundation (NSF). The workshop aimed at allowing SBIR awardees to present their research and technologies to researchers from academia, private sector and cyber security leadership. It successfully attempted in letting small businesses showcase their research technologies, improve security by developing technologies and to facilitate these technologies to deployment. The workshop concentrated on increasing transition of technology for SBIR funded research through Briefings,Featured Speakers,Networking and so forth.

Cyber Security Division TTP Technology Guide

The CSDTTP guide identifies Cyber Security technologies developed at Department of Energy National laboratories, Department of Defense affiliated laboratories and National Science Foundation funded academic institutions. This guide represents the steps involved in identifying innovative, federally funded research that meets the needs of cyber security that are transitioned into  Enterprise Level. This guide further presents all such technologies that have been implemented and ready to be deployed from last two fiscal years to the present.

Click here to view the CSDTTPFY15 Guide .