Defensive Cyber Operations

#CADCO

Spring2023

Colorado Springs, CO

How might the United States Space Force leverage commercial capabilities to identify and automate cyber terrain mapping of complex systems, in order to support existing cyber operations tool suites?

Problem Statement

Defensive Cyberspace Operations (DCO) provide defensive cyber capabilities that protect USSF mission system networks, to include their associated computer systems, software applications and sensitive operational information against unauthorized intrusion, corruption, and/or exploitation.

Resilient cyberspace architecture is a key to USSF system security. USSF cyber operators must provide mission assurance of the critical networks and systems they protect, in an increasingly contested, congested, and degraded environment.

Topics of Interest

  • Complex Cyber Network Mapping
  • Automation of Identification of Devices and Data Flows
  • Model and Simulation of Network
  • Identification of Mission Critical Services
  • Predictive and Automated Vulnerability Assessments
  • Sensor Placement
  • Bridging Gap Between Network Mapping and Optimization of Sensor Placement
  • Network Mission Assurance
  • Cyber Domain Awareness (Internal and External)
  • Automation
  • Threat Detection

 

Schedule

January 12, 2023 at 1 pm MT‘Ask Me Anything’ Virtual Session
January 24, 2023 at 5 pm MTExtended Application Deadline
January 31 - February 2, 2023Applicant Pitch Days
February 6, 2023Final Cohort Company Selection
March 7-10, 2023On-Week
March 13-16, 2023On-Week
April 4-7, 2023On-Week
April 10-13, 2023On-Week
May 2-5, 2023On-Week
May 8-11, 2023On-Week
May 30- June 2, 2023Final Week
June 1, 2023Demo Day
January 12, 2023 at 1 pm MT‘Ask Me Anything’ Virtual Session

Watch Recording HERE

January 24, 2023 at 5 pm MTExtended Application Deadline
January 31 - February 2, 2023Applicant Pitch Days
February 6, 2023Final Cohort Company Selection
March 7-10, 2023On-Week
March 13-16, 2023On-Week
April 4-7, 2023On-Week
April 10-13, 2023On-Week
May 2-5, 2023On-Week
May 8-11, 2023On-Week
May 30- June 2, 2023Final Week
June 1, 2023Demo Day

Cohort Blog

  • #CADCO Week 10

    #CADCO Week 10

    It was another exciting week in the #CADCO Accelerator! As always, thank you to the SMEs and Navigators who support these companies and offer guidance and resources, and THANK YOU to Two Six Technologies for being the Session 3 Sponsor! We are so grateful for each and every one of you, and we look forward […]
  • #CADCO Week 9

    #CADCO Week 9

    The Catalyst Accelerator team welcomed back the #CADCO cohort to Colorado Springs for Session 3 of the program on May 2nd. The team was thrilled to have Two Six Technologies back as the Session 3 Sponsor, especially since they had generously sponsored Session 1 earlier in the cohort. We cannot run an Accelerator without our […]
  • #CADCO Week 6

    #CADCO Week 6

    It was another wonderful week for the Catalyst Accelerator’s Defensive Cyber Operations for Space (#CADCO) cohort all thanks to ISSAC, LLC, the Session Two Sponsor! Thank you for your support, ISSAC, LLC! The Catalyst Accelerator team feels so delighted to have spent the last two weeks with this group and we look forward to reuniting […]

Cohort Companies

Aronetics company logo

Aronetics

Aronetics is advancing cybersecurity solutions that support and defend national efforts and global security enterprises.

Our digital hammer THOR, defends any network device and mission system, whether a satellite, a laptop or a mobile device.

Deterrence, protection, and recognition of normal versus abnormal computer behaviors are our top priority.

Location:
Westlake, Ohio

Axellio company logo

Axellio advances network intelligence for cyber security analysis and forensics for the defense and intelligence community.
Our mission is to provide expertise and technology that secures our customers’ critical infrastructure closing visibility
gaps, accelerating decision making, and reducing analysis complexity.

Axellio provides an extreme high-performance, scalable, compact, and open network packet storage, analysis, and distribution platform for unprecedented detail and insight into any network activity through behavioral analytics and access to days or months of detailed network traffic. This solution enhances the performance, efficiency, and accuracy of existing security analysis applications in the DoD today.

Location:
Colorado Springs, Colorado

CTCI company logo

CTCI is a company that aims to protect organizations from cyber threats through its cutting-edge vulnerability and threat detection solutions. It offers a SaaS solution called CEWL (CVE Early Warning list) that identifies and prioritizes vulnerabilities by identifying vulnerabilities being exploited by threat actors. This technology significantly reduces the likelihood of being compromised as 60% of all breaches are from unpatched vulnerabilities.

Location:
Beaverton, Oregon

Cyberspatial company logo

Cyberspatial

Cyberspatial is developing a next-generation cyber reconnaissance and security platform which provides a digital twin of our network and a shared operating picture for Cyber operations and intelligence management. Our goal is to make Cyber
operators and leaders powerful, by making the most advanced analytic environment on the planet accessible to everyone.

Location:
Arlington, Virginia

Diode company logo

Diode’s Zero Trust software secures teams and assets operating in fluid IT environments. Diode is a leader in Smart
Network solutions that are higher security than a VPN, are as
easy to deploy and use as a SaaS app, and enable enterprises to rapidly extend their security perimeters. Diode is deploying these capabilities to industries with teams responsible for IT, OT, or IoT assets – we offer these teams a disruptive, offthe- shelf alternative to complicated SSE and VPN solutions.

Location:

Portland, Oregon

Ironwood Cyber company logo

Ironwood Cyber

At Ironwood Cyber, we have built a SaaS suite of full spectrum cybersecurity services and products focused on automation to reduce cost and complexity, while enabling customers to have continuous cybersecurity testing without the costs of employing full time cybersecurity resources. Our Firethorn™ technology represents a revolutionary approach to threat detection using side channel analysis vs. signature based and direct observations of malicious behaviors, as these are easily evaded by threat actors.

This AI/ML based technology has proven to be highly effective in standard computing environments with a small footprint and low utilization of resources. We are developing this technology for use on embedded platforms including but not limited to vehicles such as satellites that have the most extreme challenges with size, weight and power (SWaP).

Location:
Fort Worth, Texas

Rebel Space company logo

Rebel Space

At Rebel Space, we advance the security of in-space communications and space systems for safer, more reliable
commercial operations in low-earth orbit and beyond. Our vision is a space ecosystem where commercial, research and national security interests can cooperate securely and effectively without the risk of cyber threats disrupting critical space systems. Rebel Space is developing essential cybersecurity software that leverages artificial intelligence to secure space systems and wireless communication links across dynamic and contested space environments. With Rebel Space, commercial space operators receive autonomous authentication, risk mitigation, and secure interoperability services to ensure their systems are resilient against environmental disruptions and wireless security threats.

Location:
Long Beach, California

SylLab company logo

Post Quantum Security for Networks and IoT. We deliver cryptographic schemes that speed up computation and lower the computation cost. PQC Certificate Authority, alongside a highly optimized digital signature, ensures confidentiality, integrity, and availability of networks and devices in the IoT infrastructure. SylLab solutions are compatible with systems with constrained processing power that require trusted verification, and we can achieve that without digital certificates.

Location:
Manassas, Virginia

Cohort Sponsors

Corporate Sponsors

Navigators

Demo Day Sponsors

Explore Colorado Springs

Keep Up to Date with
Catalyst Accelerator News and Events!