US flag   Official website of the Department of Homeland Security

2013 DHS S&T Cyber Security Division Principal Investigators’ (PI) Meeting

September 2013 | 8:30am – 5:30pm
Washington, DC

The 2013 DHS S&T Cyber Security Division Principal Investigators’ (PI) Meeting  will be held in September 2013 in the Washington D.C. Metro Area. The purpose of the 2013 PI meeting is to allow the CSD Broad Agency Announcement (BAA) 11-02 contract Principal Investigator (PIs) awardees, in the Type I (New Technologies) through Type III (Mature Technologies) phases , the opportunity to collaborate and present their research and technologies to researchers and cyber security leadership from the Government, International Partners, Private Sector and Academia; allowing additional knowledge sharing, improvement of existing deployed technologies and transition of innovative research to safeguard cyberspace.

The PI meeting will also include presentations from Cyber Security Division performers in Type I (New Technologies, three year effort), Type II (Prototype Technologies, two year effort), Identity Management and Small Business Innovation Research (SBIR). These cyber technologies are not as mature as Type III technologies and will allow CSD to acquire additional collaboration within the cybersecurity research community and private sector, federal and international partners, allowing gaps to be closed and additional milestones to be developed. 

Each day of the meeting, specific cyber technologies/ topics will be discussed in mid-morning track sessions. After the close of the tracks, these technologies will showcase their technologies in a Technology Demonstration/ Poster session, allowing additional hands-on critique and ultimately allowing the awardees to interact one-on-one with a potential pilot partner. The meeting will also offer attendees cybersecurity breakout session topics, allowing for additional collaboration and networking opportunities.

The goals of the workshop are to:

  • Showcase (PIs) awardees to demonstrate cutting edge cyber security research technologies both near and medium term solutions.
  • Improve security in both the Federal and the larger Internet community by enhancing exciting deployed and developing new technologies for the detection, prevention and response to cyber attacks on the national’s critical information infrastructure.
  • To facilitate the transfer of these technologies into operational environments of the Federal government and private sector.
Back to Top