How might the United States Space Force leverage commercial capabilities to identify and automate cyber terrain mapping of complex systems, in order to support existing cyber operations tool suites?
Defensive Cyberspace Operations (DCO) provide defensive cyber capabilities that protect USSF mission system networks, to include their associated computer systems, software applications and sensitive operational information against unauthorized intrusion, corruption, and/or exploitation.
Resilient cyberspace architecture is a key to USSF system security. USSF cyber operators must provide mission assurance of the critical networks and systems they protect, in an increasingly contested, congested, and degraded environment.
Topics of Interest
January 12, 2023 at 1 pm MT | ‘Ask Me Anything’ Virtual Session |
January 24, 2023 at 5 pm MT | Extended Application Deadline |
January 31 - February 2, 2023 | Applicant Pitch Days |
February 6, 2023 | Final Cohort Company Selection |
March 7-10, 2023 | On-Week |
March 13-16, 2023 | On-Week |
April 4-7, 2023 | On-Week |
April 10-13, 2023 | On-Week |
May 2-5, 2023 | On-Week |
May 8-11, 2023 | On-Week |
May 30- June 2, 2023 | Final Week |
June 1, 2023 | Demo Day |
January 12, 2023 at 1 pm MT | ‘Ask Me Anything’ Virtual Session | Watch Recording HERE |
January 24, 2023 at 5 pm MT | Extended Application Deadline | |
January 31 - February 2, 2023 | Applicant Pitch Days | |
February 6, 2023 | Final Cohort Company Selection | |
March 7-10, 2023 | On-Week | |
March 13-16, 2023 | On-Week | |
April 4-7, 2023 | On-Week | |
April 10-13, 2023 | On-Week | |
May 2-5, 2023 | On-Week | |
May 8-11, 2023 | On-Week | |
May 30- June 2, 2023 | Final Week | |
June 1, 2023 | Demo Day |
Aronetics is advancing cybersecurity solutions that support and defend national efforts and global security enterprises.
Our digital hammer THOR, defends any network device and mission system, whether a satellite, a laptop or a mobile device.
Deterrence, protection, and recognition of normal versus abnormal computer behaviors are our top priority.
Location:
Westlake, Ohio
Axellio advances network intelligence for cyber security analysis and forensics for the defense and intelligence community.
Our mission is to provide expertise and technology that secures our customers’ critical infrastructure closing visibility
gaps, accelerating decision making, and reducing analysis complexity.
Axellio provides an extreme high-performance, scalable, compact, and open network packet storage, analysis, and distribution platform for unprecedented detail and insight into any network activity through behavioral analytics and access to days or months of detailed network traffic. This solution enhances the performance, efficiency, and accuracy of existing security analysis applications in the DoD today.
Location:
Colorado Springs, Colorado
CTCI is a company that aims to protect organizations from cyber threats through its cutting-edge vulnerability and threat detection solutions. It offers a SaaS solution called CEWL (CVE Early Warning list) that identifies and prioritizes vulnerabilities by identifying vulnerabilities being exploited by threat actors. This technology significantly reduces the likelihood of being compromised as 60% of all breaches are from unpatched vulnerabilities.
Location:
Beaverton, Oregon
Cyberspatial is developing a next-generation cyber reconnaissance and security platform which provides a digital twin of our network and a shared operating picture for Cyber operations and intelligence management. Our goal is to make Cyber
operators and leaders powerful, by making the most advanced analytic environment on the planet accessible to everyone.
Location:
Arlington, Virginia
Diode’s Zero Trust software secures teams and assets operating in fluid IT environments. Diode is a leader in Smart
Network solutions that are higher security than a VPN, are as
easy to deploy and use as a SaaS app, and enable enterprises to rapidly extend their security perimeters. Diode is deploying these capabilities to industries with teams responsible for IT, OT, or IoT assets – we offer these teams a disruptive, offthe- shelf alternative to complicated SSE and VPN solutions.
Location:
Portland, Oregon
At Ironwood Cyber, we have built a SaaS suite of full spectrum cybersecurity services and products focused on automation to reduce cost and complexity, while enabling customers to have continuous cybersecurity testing without the costs of employing full time cybersecurity resources. Our Firethorn™ technology represents a revolutionary approach to threat detection using side channel analysis vs. signature based and direct observations of malicious behaviors, as these are easily evaded by threat actors.
This AI/ML based technology has proven to be highly effective in standard computing environments with a small footprint and low utilization of resources. We are developing this technology for use on embedded platforms including but not limited to vehicles such as satellites that have the most extreme challenges with size, weight and power (SWaP).
Location:
Fort Worth, Texas
At Rebel Space, we advance the security of in-space communications and space systems for safer, more reliable
commercial operations in low-earth orbit and beyond. Our vision is a space ecosystem where commercial, research and national security interests can cooperate securely and effectively without the risk of cyber threats disrupting critical space systems. Rebel Space is developing essential cybersecurity software that leverages artificial intelligence to secure space systems and wireless communication links across dynamic and contested space environments. With Rebel Space, commercial space operators receive autonomous authentication, risk mitigation, and secure interoperability services to ensure their systems are resilient against environmental disruptions and wireless security threats.
Location:
Long Beach, California
Post Quantum Security for Networks and IoT. We deliver cryptographic schemes that speed up computation and lower the computation cost. PQC Certificate Authority, alongside a highly optimized digital signature, ensures confidentiality, integrity, and availability of networks and devices in the IoT infrastructure. SylLab solutions are compatible with systems with constrained processing power that require trusted verification, and we can achieve that without digital certificates.
Location:
Manassas, Virginia