DoD Sends Industry Its Cyber Wish List


DOD Cyber Wish List


“The Pentagon’s Department of Defense, Rapid Reaction Technology Office  looks to develop prototypes and host technology demonstrations to counter emerging and anticipated threats.

“There is a potential for companies to be selected for pilot projects or experimentation if their technology appears to match the DoD’s cyber needs.”

[It] has issued a special notice to industry this week announcing its intention to conduct a solutions meeting to support the Cyber Science and Technology Community of Interest.

The meeting, which will occur in late October, will provide “selected innovative companies with an opportunity to make short technical presentations to government representatives about their technologies and products,” the notice states.

The notice lists a variety of innovative technology needs in cyber under a series of broad subject areas.

These include autonomous cyber defense; cyber situational awareness, planning and decision support; cybersecurity for infrastructure, endpoints and edge devices; control systems, internet of things security; and hardware and software assurance.

Last summer, the same organization issued a similar notice seeking a variety of technologies such as standoff detection/sensors, device neutralization, counter vehicle attached IEDs (VAIEDs), electronic countermeasures for advanced wireless signals and techniques, robotics, data analytics/predictive algorithms, counter tunnel and mapping technologies and biometric signature collection and exploitation.

Here’s an example of a few technologies this week’s notice lists under each category:

  • Autonomous cyber defense: Artificial intelligence/machine learning, automatic cyber resilience and configuration tools for cyberspace operations.
  • Cyber situational awareness, planning and decision support: Risk assessment, planning and course of action support, visibility of missions, systems and adversaries and automated mission mapping to infrastructure.
  • Cybersecurity for infrastructure, endpoints and edge devices: Rapidly deployable tools for network mapping/awareness and discovery, response and eradication of attacks as well as device and software anonymization.
  • Control systems, internet of things security: Manage, monitor, detect and alert abnormal behaviors and automated identification of devices and protocols.
  • Hardware and software assurance: Scalable, intelligent code/software analysis and repair.”




About rosecoveredglasses

2 Tours in US Army Vietnam. Retired from 36 Years in the Defense Industrial Complex after working on 25 major weapons systems, many of which are in use today in the Middle East. Volunteer MicroMentor. I specialize in Small, Veteran-owned, Minority-Owned and Woman-Owned Businesses beginning work for the Federal Government. MicroMentor is a non-profit organization offering free assistance to small business in business planning, operations, marketing and other aspects of starting and successfully operating a small enterprise. You can set up a case with me at MicroMentor by going to: key words: "Federal Government Contracting"

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s