Advancing Innovation Through Collaboration
Through SINET meetings and interactions with key government and industry experts in cyber security, we were able to focus our research & development on important cyber security capabilities. Addressing these issues in our SBIR/STTR proposals played an important factor in winning two Federal Government Phase II awards of $1.5 million.
Chairman of AVIRTEK, Inc.
SINET Workshops at ITSEF 2011
Tuesday, March 15, 2011
Frances C. Arrillaga Alumni Center at Stanford University
The fee to attend the workshops on March 15th is $595.
Workshops Designed to Give Entrepreneurs a Competitive Advantage!
Workshop Theme - How to Execute for Success
Join the Security Innovation Network (SINET) on March 15, 2011, for the SINET Workshops. Take away some proven tips, best practices and powerful guidance from experienced professionals and entrepreneurs who chased their dreams and succeeded. SINET has lined up a series of workshops on a broad range of pressing issues confronting early stage and emerging growth companies.
SINET has gathered subject matter experts from government, industry and the venture capital and investment banking communities to share their expertise on a broad range of business challenges facing early stage and emerging growth companies. These workshops present a unique opportunity for entrepreneurs to gain top-level guidance from specialized practitioners who know, understand and want to help high-tech emerging companies make a difference.
The workshops will be presented in two tracks on March 15, 2011: 1:00pm - 5:30pm. You do not need to stick with one track throughout, you may choose freely.
(Subject to change)
1:00pm - 2:00pm - Session One
Single Track: Obtaining Federal Research Funding
The Federal government is actively seeking to fund research and development of critical security technologies. Grants are available from several different agencies, but each has different application requirements. Finding the right match is crucial. Dr. Maughan will discuss the results that have occurred since the roll out of the Comprehensive National Cybersecurity Invitiaitive, to include Research & Development results. This workshop will help you determine whether you can get funding for your product development and the most likely sources to contact.
2:05pm - 3:05pm - Session Two
Track 1: "Working with the DoD Cyber Science and Technology Community," "International Cyber Collaboration: NATO and TTCP Research Activities" & "Accelerating Innovation Through Cyber Pilots"
"Working with the DoD Cyber Science and Technology Community"
The Department of Defense (DoD) Cyber Science and Technology (S&T) community actively engages innovative companies in order to quickly develop next generation technologies for the warfighter. Some of the best cyber security research and development (R&D) products come out of the entrepreneurial commercial marketplace, and the DoD wishes to take advantage of such rich technology maturation opportunities. This briefing summarizes the avenues by which companies can develop business relationships with the DoD Cyber S&T community in order to further refine their cyber security technologies and bring them to market.
"International Cyber Collaboration: NATO and TTCP Research Activities"
Joshua S. Caplan, CISSP, Associate Director for Computer Network Operations Technology, Office of the Assistant Secretary of Defense for Research & Engineering
A key aspect of the Department of Defense (DoD) cyber security science and technology (S&T) collaboration strategy involves engaging with international and coalition partners. In cyber security, "we are only as secure as our weakest link," and so ensuring that our allies with whom we interconnect our networks and communications infrastructure have systems as secure as our own is of paramount importance. Two primary methods by which the DoD works with foreign nations are the North Atlantic Treaty Organization (NATO) Research and Technology Organization (RTO) and The Technical Cooperation Program (TTCP). This briefing summarizes the cyber security research and development activities that take place within these collaborative arrangements.
"Accelerating Innovation Through Cyber Pilots"
The Department of Defense (DoD) has a number of existing mechanisms for identifying innovate commercial technologies coming out of the private sector. During the last year, the Department has begun exploring new approaches to augment its current programs. In particular, DOD has initiated cyber pilots that are focused on creating new relationships with commercial providers, making the Department a more attractive business partner, and about delivering more effective cybersecurity capabilities into the commercial market for the benefit of both the private and public sectors. This presentation will describe the Cyber Accelerator pilot that is currently being evaluated by DOD.
Track 2: Other Transaction (OT) Authority: Use of Technology Investment Agreements to Accelerate Cyber Technology into the U.S. Government
Introduction of new cyber technology into the U.S. Government (and, specifically the Department of Defense (DoD)) takes a considerable amount of time. This can result in a threat going unmitigated or poorly addressed for unacceptably long periods. Through the use of (OT) authority under 10 USC § 2371, new contracting structures can be established that represent the opportunity to accelerate the introduction of technology from the commercial sector into the DoD using new business models that benefits both parties. This session will provide details on OT authority, the use of a Technology Investment Agreement (TIA) under that authority, and how such an instrument can dramatically accelerate delivery of technology into the Government, without significantly burdening the intellectual property of the commercial sector participants.
3:05pm - 3:25pm - BREAK
3:25pm - 4:25pm - Session Three
Track 1: "Results that Matter - Women IT Entrepreneurs"
The panel will explore the performance characteristics/results of women entrepreneurs, business strategies in the federal small business arena, and highlight success stories of woman owned IT entrepreneurs. This is NOT a panel for women but about how women are changing business performance when integrated into senior positions.
- Mary Ellen Seale, Deputy Director, National Cyber Security Center, Department of Homeland Security
- Paul Chann, Procurement Center Representative, Office of Government Contracting - Area VI (San Francisco), U.S. Small Business Administration
- Barbara Kasoff, President & Co-Founder, Women Impacting Public Policy, Inc. (WIPP)
- Laura Mather, Ph.D., Founder & Vice President of Product Marketing, Silver Tail Systems
- Cynthia B. Padnos, Founding Managing Director, Illuminate Ventures
Track 2: IronKey: Experiences and Success with DHS BAA Government Contracts
Dave Jevans, Chairman & Founder, IronKey
In 2005, IronKey was a newly founded security startup. Hear first-hand how the CEO worked with the Department of Homeland Security to acquire a $1.5M contract to perform crucial research and development that resulted in the development of successful encryption and security products for enterprises, government and consumers.
You will hear details on how the application process was performed, challenges to accepting government research and development projects, accounting issues, how to get paid effectively, and how to leverage these contracts to create successful private companies.
The founder and Chairman of the Board of IronKey will share with you his experiences on turning a visionary DHS research project into a real world product, and will answer questions on all aspects of leveraging government funding to create successful companies.
4:30pm - 5:30pm - Session Four
Track 1: "Developing a Successful Market Entry Strategy for the Federal Cyber Security Enterprise"
The U.S. Federal Cyber Security Market remains an attractive segment for business growth over the long-term in spite of current budgetary pressures. Most of this growth is likely to be concentrated in programs related to the Comprehensive National Cyber Security Initiative and a set of related and similarly classified programs.
Entry into this market can present challenges for innovative companies and investors who may be unfamiliar with the Federal Cyber Security Enterprise. Successful entrants have executed practical strategies that have helped them establish key positions in this market and are continuing to grow those positions as the market evolves.
- Analysis of the cyber security problem and the policy drivers that will continue to create ongoing market opportunities for new entrants
- Identification of current key buyers and their existing and emerging priorities
- An examination of solution migration beyond the .mil and .ic and into the .gov and .com domains
- Overview of government contracting and sales dynamics
- Identification and overview of key contract vehicles / channels to market
- A discussion of the need to establish strategic partnerships to support market entry
- Discussion of requirements specific to government customers (e.g., Common Criteria, FIPS, other Approved Product Lists)
- Overview of the role of government relations and lobbying
- An analysis of several case studies of companies that have established early victories.
Track 2: Meeting Government's Cyber Solutions Needs: A small company perspective
This presentation will describe what it takes to enter the federal market for a small, silcon valley based company, the opportunities and challenges, and some of the key thought processes and partnerships required to succeed. In the world of cyber, there is no "silver bullet" in providing security for the critical networks. It takes the recognition that first there is no cyber integrator and second that it takes companies to partner to provide the solution the customer needs. In this presentation we will explore the cyber ecosystem, present how it has worked in the global marketplace.