The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) Cyber Security Division (CSD) develops innovative solutions to meet a broad array of cybersecurity challenges by leading and coordinating cybersecurity R&D across the U.S. government, international partners, academia and the private sector. While at RSA CSD demonstrated 12 mature technologies ready for pilot deployments and commercialization into the marketplace.
April 20-24, 2015
Booth 202 | Moscone Center | San Francisco, CA
Connect with us on Twitter! @dhsscitech #RSAC
EXHIBIT HOURS
Monday, April 20 5:00 - 7:00 pm Networking & Welcome Reception
Tuesday, April 21 11:00 - 6:00 pm
Wednesday, April 22 11:00 - 6:00 pm
Thursday, April 23 11:00 - 3:00 pm
TECHNOLOGY DEMONSTRATIONS
Tuesday, April 22, 2015
11:10-11:25:
CSD Overview "Enabling Federally Funded Technologies to Reach the Marketplace" presented by DHS S&T Cyber Security Division
11:30-11:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory:
12:00–12:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory
12:30–12:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory
1:00–1:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory
1:30–1:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory
2:00–2:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire
2:30–2:45
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia
3:00–3:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory
3:30–3:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory
4:00–4:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory
4:30–4:45
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill
Wednesday, April 22, 2015
11:10-11:25: Symbiote "Host-based Defense for Arbitrary Embedded Device Firmware" presented by Red Balloon Security and Columbia Univeristy
11:30-11:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory
12:00–12:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory
12:30–12:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory
1:00–1:15
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia
1:30–1:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions
2:00–2:15
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill
2:30–2:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory
3:00–3:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire
3:30–3:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory
4:00–4:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory
4:30–4:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions