U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

Cyber Security Division Exhibiting at 2015 RSA Conference

The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) Cyber Security Division (CSD) develops innovative solutions to meet a broad array of cybersecurity challenges by leading and coordinating cybersecurity R&D across the U.S. government, international partners, academia and the private sector.  While at RSA CSD demonstrated 12 mature technologies ready for pilot deployments and commercialization into the marketplace. 

April 20-24, 2015
Booth 202 | Moscone Center | San Francisco, CA
Connect with us on Twitter! @dhsscitech #RSAC

EXHIBIT HOURS
Monday, April 20 5:00 - 7:00 pm Networking & Welcome Reception
Tuesday, April 21 11:00 - 6:00 pm
Wednesday, April 22 11:00 - 6:00 pm
Thursday, April 23 11:00 - 3:00 pm

TECHNOLOGY DEMONSTRATIONS

Tuesday, April 22, 2015
11:10-11:25:
CSD Overview "Enabling Federally Funded Technologies to Reach the Marketplace" presented by DHS S&T Cyber Security Division

11:30-11:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory:

12:00–12:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory

12:30–12:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory

1:00–1:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory

1:30–1:45
Sandia Cyber Omni Tracker (SCOT) "Turning Cyber Data Into Incident Response Threat Intel" presented by Sandia National Laboratory

2:00–2:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire

2:30–2:45
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia

3:00–3:15
Situ "Discovering and Explaining Suspicious Behavior" presented by Oak Ridge National Laboratory

3:30–3:45
Code DNA "Scalable, High-Speed, High-Volume, Shareable Malware Detection" presented by Johns Hopkins University—Applied Research Laboratory

4:00–4:15
CryptAC "Securing Data for Public Clouds" presented by Massachusetts Institute of Technology—Lincoln Laboratory

4:30–4:45
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill
 

Wednesday, April 22, 2015
11:10-11:25: Symbiote "Host-based Defense for Arbitrary Embedded Device Firmware" presented by Red Balloon Security and Columbia Univeristy

11:30-11:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory

12:00–12:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory

12:30–12:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory

1:00–1:15
AMICO "Accurate Behavior-Based Detection of Malware Downloads" presented by University of Georgia

1:30–1:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions

2:00–2:15
ZeroPoint "Advanced Weaponized Document Detection and Analytics" presented by University of North Carolina—Chapel Hill

2:30–2:45
Scalable Reasoning System (SRS) "Threat Landscape Analysis for the Cyber Defender" presented by Pacific Northwest National Laboratory

3:00–3:15
Mobile Threat Intelligence "Mobile Security Analytics" presented by Kryptowire

3:30–3:45
Traffic Circle / Clique "Displays Raw Network Traffic Through Multiple Time-Based Views" presented by Pacific Northwest National Laboratory

4:00–4:15
Network Mapping System (NeMS) "Network Characterization and Discovery Tool" presented by Lawrence Livermore National Laboratory

4:30–4:45
Code DX "Find, Prioritize and Visualize Software Vulnerabilities" presented by Secure Decisions
 

 

 

 

 

 



 

 

 
Last Updated: 01/12/2023
Was this page helpful?
This page was not helpful because the content