Cyber Security Division Exhibiting at 2015 RSA Conference

Cyber Security Division Exhibiting at 2015 RSA Conference

The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) Cyber Security Division (CSD) develops innovative solutions to meet a broad array of cybersecurity challenges by leading and coordinating cybersecurity R&D across the U.S. government, international partners, academia and the private sector.  While at RSA CSD demonstrated 12 mature technologies ready for pilot deployments and commercialization into the marketplace. 

April 20-24, 2015
Booth 202 | Moscone Center | San Francisco, CA
Connect with us on Twitter! @dhsscitech #RSAC

EXHIBIT HOURS
Monday, April 20 5:00 - 7:00 pm Networking & Welcome Reception
Tuesday, April 21 11:00 - 6:00 pm
Wednesday, April 22 11:00 - 6:00 pm
Thursday, April 23 11:00 - 3:00 pm

TECHNOLOGY DEMONSTRATIONS

Tuesday, April 22, 2015
11:10-11:25:
CSD Overview "Enabling Federally Funded Technologies to Reach the Marketplace" presented by DHS S&T Cyber Security Division

11:30-11:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory:

12:00–12:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory

12:30–12:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory

1:00–1:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory

1:30–1:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory

2:00–2:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire

2:30–2:45
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia

3:00–3:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory

3:30–3:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory

4:00–4:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory

4:30–4:45
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill
 

Wednesday, April 22, 2015
11:10-11:25: Symbiote "Host-based Defense for Arbitrary Embedded Device Firmware" presented by Red Balloon Security and Columbia Univeristy

11:30-11:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory

12:00–12:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory

12:30–12:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory

1:00–1:15
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia

1:30–1:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions

2:00–2:15
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill

2:30–2:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory

3:00–3:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire

3:30–3:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory

4:00–4:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory

4:30–4:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions
 

 

 

 

 

 



 

 

 

Was this page helpful?

This page was not helpful because the content:
Back to Top