TTP Workshop 1
February 25-26, 2015
Transitioning Funded Research Outcomes to Practice: Barriers, Opportunities, and Challenges
The purpose of this workshop is to identify ways to move more NSF and DHS funded research (particularly cybersecurity research) into practice. The discussion will identify the current state of the Technology Transfer to Practice (TTP) process. We will also identify factors that affect the success rate of current TTP, e.g., barriers that academic researchers face in using commercial models for transfer, specific initiatives intended to match research artifacts to existing areas of need/opportunity, and restrictions on transfer of specific types of artifacts. Including members of the numerous constituents of the current TTP community in a highly participative gathering creates an efficient feedback loop that can identify what is and is not happening in the current process, how those factors affect TTP success rates, how best to address impediments, and what changes in the existing TTP process are most likely to improve the odds of success.
This workshop is jointly funded by NSF/DHS and is organized by the University of South Alabama, where Rebecca Bace† served as workshop lead. She was Chief Strategist of the Center for Forensics, Information Technology, and Security (CFITS). Ms. Bace brought a rare range and depth of expertise to bear in leading this program. She worked in the area of IT Security research and development, venture capital, and TTP for almost three decades, with an industry-acclaimed track record for success in this area. Her experience spanned both government and commercial environments, and she advised several major initiatives elsewhere in the U.S. (specifically the CyberMaryland security incubator program, the Accelerate DC initiative and the NSF TRUST initiative.)
Barry Costa, Director, Technology Transfer The MITRE Corporation |
Roberto Perdisci, Assistant Professor University of Georgia |
David Balenson, Senior Computer Scientist, SRI International |
Donald Dixon, Managing Director, VC |
Deborah Shands, Program Director, National Science Foundation |
Angelos Stavrou , Founder Kryptowire, Associate Professor GMU |
Robin Sommer, Senior Researcher, ICSI |
Jenny McNeill, Project Manager, SRI International |
Anita D'Amico, Director, Secure Decisions |
Ulf Lindqvist, Program Director, SRI International |
Jim Basney, Sr. Research Scientist, NCSA at University of Illinois |
Robert Stratton, General Partner Mach37 |
Randy Sabett, Special Counsel Cooley LLP |
Peter Kuper, Partner IQT |
William Arbaugh, Emeritus Associate Professor, Five Directions, Inc. |
Mark Cummings, Chief Technology Officer Orchestral Networks |
Matthew Alderman, VP, Strategy Tenable Network Security |
Richard Abramson, VP Legal & Business Affairs SRI International |
Chenxi Wang, Vice President, Cloud Security and Strategy, CipherCloud |
David Stampley, Partner, Kamber Law |
Eric Byres, President Byres Security |
Wenke Lee, Professor Georgia Institute of Technology |
Robert Stratton, General Partner, Mach37 Cyber Accelerator |
Inder Monga, CTO ESnet |
Paul Vixie, Founder/CEO Farsight Security, Inc. |
KC Claffy, Director, Caida |
Robert Broberg, Distinguished Engineer, Cisco Systems |
Alberto Dainotti, Research Scientist CAIDA, UC San Diego |
2015 Government Cyber Security Workshop
The 2015 Government Cyber Security SBIR Workshop was held on January 13-15, 2015 at Mayflower Renaissance Hotel Washington, DC. The workshop was Sponsored by the Department of Homeland Security (DHS) Science & Technology Directorate (S&T) Cyber Security Division (CSD), Department of Defense (DoD) Assistant Secretary of Defense for Research and Engineering (ASD [R&E]), and National Science Foundation (NSF). The workshop aimed at allowing SBIR awardees to present their research and technologies to researchers from academia, private sector and cyber security leadership. It successfully attempted in letting small businesses showcase their research technologies, improve security by developing technologies and to facilitate these technologies to deployment. The workshop concentrated on increasing transition of technology for SBIR funded research through Briefings,Featured Speakers,Networking and so forth.
Cyber Security Division TTP Technology Guide
The CSDTTP guide identifies Cyber Security technologies developed at Department of Energy National laboratories, Department of Defense affiliated laboratories and National Science Foundation funded academic institutions. This guide represents the steps involved in identifying innovative, federally funded research that meets the needs of cyber security that are transitioned into Enterprise Level. This guide further presents all such technologies that have been implemented and ready to be deployed from last two fiscal years to the present.