{"title":"Cybersecurity Technology Transition: A Practical Approach","authors":"Salvatore C. Paladino, Jason E. Fingerman","doi":"10.1109/CATCH.2009.32","DOIUrl":null,"url":null,"abstract":"ITT’s CyberScience Laboratory (CSL) has become an effective technology transition agent for the Department of Homeland Security’s Science & Technology (DHS S&T) Directorate as well as other government agencies. By acquiring, evaluating, and transferring cybersecurity technologies to those tasked with protecting critical infrastructure, the CSL has been able to provide operational feedback to technology developers, expose end-users to cutting edge tools, and better match future investments from technology sponsors with cybersecurity requirements. Discussed in this paper are best practices for technology transition as well as considerations for future activity in the field.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"169 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CATCH.2009.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
ITT’s CyberScience Laboratory (CSL) has become an effective technology transition agent for the Department of Homeland Security’s Science & Technology (DHS S&T) Directorate as well as other government agencies. By acquiring, evaluating, and transferring cybersecurity technologies to those tasked with protecting critical infrastructure, the CSL has been able to provide operational feedback to technology developers, expose end-users to cutting edge tools, and better match future investments from technology sponsors with cybersecurity requirements. Discussed in this paper are best practices for technology transition as well as considerations for future activity in the field.