Smashing the Box:  Innovation Submissions Due March 22

Smashing the Box: Innovation Submissions Due March 22

smashing the box high resSince GTSC’s inception, our members have been concerned about how our public sector partners find and reach new ideas and innovations.  With technology, threats, and ideas changing at the speed of light, those concerned about achieving the homeland and national security mission are concerned too.  So, GTSC members launched “Smashing the Box” events, a project grown out of our efforts to help the government more thoroughly perform market research and reach innovative new players.  These events seek to provide our government partners with a method and mechanism to forage for the latest cutting edge ideas to help us protect the nation.

ODNI seal


Smashing the Box Event:  ODNI & the IC Community

March 2016
Tyson’s Corner, Virginia

GTSC’s March 2016 Smashing the Box Event will focus on technologies, ideas, and products to assist the Office of the Director of National intelligence (ODNI) and the Intelligence Community (IC).  This event will feature in-person presentations from companies selected from the applicants, and ALL applicants will be included in an abstract compiled and distributed to our partner agencies.  Applicants are asked to submit a nonproprietary, unclassified, proposal that tells us why we should pick their innovation and how it assists with the mission sets below.  The event will be held in the Tysons Corner Virginia Area.

UPCOMING PREP
March 3, 2015:  ODNI INDUSTRY DAY  Briefing of the IC/ODNI Science & Technology Strategic Plan by Dr. David Honey, Director, for Science & Technology and Assistant Deputy Director for National Intelligence for Science & Technology for the Office of the Director of National Intelligence will brief us on the FY 2016-2020 S&T Strategic Plan for the IC Community and the requirements being built around the plan.  This briefing is an opportunity to hear about the challenges and strategies that the IC Community will employ to “manage risk and ensure intelligence advantage” over our adversaries.  Read the Strategic Plan here.  This briefing will prepare companies interested in submitting their innovative technologies for GTSC’s Smashing the Box Innovation Day in March.

TOPICS:

GTSC Smashing the Box Event with the Intelligence Community & the Office of the Director of National Intelligence’s Office of Science & Technology 

Vulnerabilities and malicious functionality in software and firmware
>>Autonomous discovery of structure in software and firmware
>>Inspection techniques for software & firmware, for identification of unusual functionality
>>Automated vulnerability identification

Novel sensing technologies
>>For various types of sensors: imaging, signals, acoustics, etc.
>>Proximity: close up vs. long range standoff
>>Digital, online, sensors and exploitation
>>Discovery of adversary activities; information gained from integrated sensor systems

Enhanced processing and management of data from disparate sources
>>Data recognition, formatting, ingest and storage from disparate sources
>>Free form vs. structured data management techniques
>>Searching, comparing, extracting information from a variety of data formats

Maximizing analytic insight from fused datasets
>>Information gained from various visualization techniques and strategies
>>Information gained from various analytics techniques
>>Techniques to capitalize on and re-use information gained; machine learning and automation
>>Hybrid approaches, multiple strategies, to gaining insight from data

Technologies to support detection of global proliferation activities
>>Global CBN threats, identification, anticipation, warnings and signatures
>>Proliferation trends, techniques, forecasting, tracking
>>Techniques for anticipating, discerning, and characterizing global proliferation

Bonus Area – Game changing technologies
>>Do you have a project developing the next generation of game changing technology, such as “stealth” or “GPS” were in their early stages?

Vulnerabilities and opportunities in the Internet of Things
>>Autonomous discovery of structure in software and firmware
>>Inspection techniques for software & firmware, for identification of unusual functionality
>>Automated vulnerability identification

Secure Mobility
>>For various types of devices: Tablets, smart phones, etc.
>>Proximity: close up vs. long range standoff

Social Media Trends
>>New Applications = new sources and new vulnerabilities
>>Cover and asset concerns
>>Security clearance and CI implications

Future of Personally Identifiable Information
>>Can PII be considered protected and private anymore?
>>Validating Personal Information following Major Data Breaches

TIMELINE

Abstracts will be accepted until March 22, 2016.
Presenters will be notified by April 1, 2016.

LEARN MORE HERE.