Apply today to present at DoD’s Cyber S&T COI solutions meeting
On July 10, the Department of Defense posted a request for applications to present at its upcoming Cyber S&T Community of Interest (COI) solutions meeting. Applications are due by 5:00pm EDT on August 8.
The Department of Defense, Rapid Reaction Technology Office (RRTO) will conduct a Solutions Meeting to support the Cyber S&T Community of Interest (COI). The Solutions Meeting will take place in late October in McLean, VA. The Meeting provides selected innovative companies with an opportunity to make short technical presentations to government representatives about their technologies and products. There is a potential for companies to be selected for pilot projects or experimentation if their technology appears to match the DoD’s cyber needs.
The COI is looking for innovative technologies and capabilities that support the cyber domain in the following areas:
Autonomous Cyber Defense
• Artificial Intelligence / Machine Learning
o Adaptive defenses and self-securing systems
o Real-time blocking
o Vulnerability enumeration
o Autonomic cyber resilience
• Cueing & orchestration of defenses and remediation
• Automated obfuscation, deception, resource reallocation
• Continuous monitoring from bus to user level
• Configuration tools for cyberspace operationsCyber Situational Awareness / Planning / Decision Support
• Risk assessment, planning, and Course of Action support
• Visibility of missions, systems, and adversaries
o Human understandable cyber situational awareness
o Internal and external network visibility
o Consequence/outcome analysis
• Automated mission mapping to infrastructure
• Threat reporting
• Identification and attribution of network activity of users and devices
• Distributed collaboration tools for cyber defenders
• Advanced analytics / data science / big data for cyber
o Federated data sources/analytic environments
o Correlation, integration, and fusion of disparate data sources
o Interoperable analytic platforms
o Isolated, edge, and low bandwidth/computing environmentsCybersecurity for Infrastructure, Endpoints, and Edge Devices
• Rapidly deployable tools
o Network mapping/awareness
o Discovery, response, and eradication of attacks
o Analysis for computing & bandwidth constrained environments
• Device and software anonymization
• Sandboxing, containerization, and restoration to known good states
• Secure browser technology
• Securing hard to patch infrastructure and legacy systems
• Anti-credential harvesting
• Advanced threat identificationControl Systems / Internet of Things (IoT) Security
• Manage, Monitor, Detect, and Alert abnormal behaviors
o Integration with larger security management ecosystem
o Patch management & validation
o Automated identification of devices and protocols
o IP to physical Layer
o Across multiple protocols
• Control system risk profiles management
• Vehicle (aviation, ground, marine) networks and controllers
• Anti-tamper / resiliency mechanismsHardware & Software Assurance
• Scalable, intelligent code/software analysis and repair
• Embedded SW/firmware
• Anti-Tamper / Anti-Counterfeit / Trusted and Assured Computing
• HW vulnerability mitigation
• Secure/verifiable design with split/third party manufacturing
• Non-destructive reverse engineering
• Trusted partitioning in low power devices
• HW authentication, root of trust, encryption for SoC
Full information is available here.
Source: FedBizOpps