SlideShare a Scribd company logo
Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com
TechMATCH solves submission, screening and selection issues
Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com
Background
The American Security Challenge is a program that…
- Pulses the market for innovative technology that addresses the requirements of its
customers
- Collects and evaluates data collected from potential problem solving technology
providers (sellers)
- Reviews the higher scoring submissions and identifies those that most closely
match the requirements of the customer (buyers)
- Coordinates evaluations by the customers of the most viable candidates
- Facilitates new relationships between entrepreneurs, investors, customers, channel
partners, advisors, service providers and other valuable stakeholders
What is ASC?
ASC’s mission is to accelerate the deployment of valuable innovative technology into the
public and private sector to better safeguard the nation’s citizens, assets and economy.
“It’s the intersection of the
entrepreneur, the investment
community and the ultimate user, and
at the end of the day it is the American
Security Challenge helping America
with this program so I thank you.”
Governor Tom Ridge, first Secretary of the
Department of Homeland Security
Background- DHS S&T
Innovation is critical to national security including economic stability and
prosperity…..
….. a major challenge has been wading through the avalanche of
innovations that all proclaim value to separate the pretenders
from the contenders.
Current and past ASC Stakeholders
Stakeholders include members of the Defense and Intelligence Community as well as Private Sector
Critical Infrastructure owners
• Management, analysis & visualization of large data sets collecting terabytes per hour
• Protection of consumer credentials and sensitive account information on contaminated devices
• Wireless security including handheld devices, unmanned vehicles, satellite, towers, and other
• Large scale data management, fusion and analysis of multi-lingual, multi-source, multi-format,
structured and unstructured data
What is a Security Technology?
Samples of customer requirements in Cyber, C4ISR, Physical and
Energy technologies. For full list see website
http://www.americansecuritychallenge.com/challenge/technologies.php
• Scavenging energy technologies
• Security authentication for IP networks
• Offensive and defensive network security
• Network detection and obfuscation techniques
• In-band interference cancellation techniques
• Water purification
• Building energy conservation technologies
• Stationary and mobile power supplies and
storage
• High volume data analysis and visualization
tools
• Access controls
• Asset tracking
• Biometric technologies that accurately
determine identity at a distance
• Batteries and power sources of long duration
• Vehicle and vehicle fuel efficiency
technologies
Tech scouting cycle
Shopping List
•Cloud Security
•Malware Detection
•Identity Mngmt
•Renewable Energy
•Hi-Speed Comp
•Data Leakage
•Network Security 2- ASC Outreach
3- ASC Screening w
100+ experts
4-Customer
Testing and/or
Due Diligence
1- Customer
Requirements
5-Customer
Transaction
Media
Embassies
Incubators
VC’s University Labs
Fed Labs
ESQ’s
Angels
CPA’s
CVC’s
Federal Labs
Tech Buyer (Customer)
Solve problems faster
ASC can broadcast requirements to a large
community quickly
Extend reach
Requirements gain exposure in technology
communities not previously reached
Choices screened
ASC screens through and provides feedback and
short list of most viable qualified options
More confident decisions
Comfort in knowledge that extensive scouting
produced broad base of alternatives which were
screened against requirements
Broader alternatives
Buyers enjoy a greater number of choices as well as
alternatives from different sectors (ie a gaming tech
applied to simulations/training or a social networking
algorithm applied to intelligent pattern recognition,
etc)
Tech Seller (Innovator)
Expand customer base
Expand sales pipeline and participate in sales
opportunities with new prospects
Qualified opportunities
Customers have current need with approved budget
and contract vehicle
Increase revenue
Expand sales pipeline and participate in sales
opportunities with new prospects
Investor exposure
Qualified investors are seeking companies with
customer traction. Pilots generate revenue as well as
increase investor interest
Added to invitation list
Sept 23 event is invitation only but top 100
Challengers are automatically added to invite list.
event will be high level relationship development
between C-level tech owners and vendor facing
CIO/CTO/CSO customers
Benefits to Buyers and Sellers
What kinds of companies does ASC find?
What does this mean? This profile tells us the following:
 That ASC enjoys a broad reach into many technology communities across the country and around the world.
 That most of the Challengers are small but growing companies seeking new contracting and investment
opportunities for their deployable and near-term deployable technologies.
 That startup and more mature innovative tech companies benefit as a Challenger.
• 21 different U.S. States, 5
countries
• Average 2.2M sales
• (startup to $62M)
• 56% received grant funding
• $200,000 to $45,000,000
• median of $2,000,000
• Employee range from 1 to 130
with median of 10
• Technologies
• 34% Cyber
• 25% C4ISR
• 26% Physical
• 14% Energy
• 79% had no security
clearances
• Two-thirds raised equity
capital
• $150,000 to
$62,000,000
• Median of
$5,200,000
• 89% had no previous Dept.
of Defense or IC sales
• 56% received grant funding
with $2M average
• ($200K to $45M)
• Technology Readiness
Levels
• 56% TRL 9
• 16% TRL 8
• 13% TRL 7
Profile of top 60 companies from recent search
What they say about ASC
“The INSA American Security Challenge is an incredibly efficient and effective way to connect the technology innovators with the
public and private sector organizations who leverage the new technology while performing their respective missions of the most
crucial work in intelligence and national security.”
Ellen McCarthy, President of INSA, an ASC Licensee
“We are very pleased with Raytheon’s outcomes. We ended up actively pursuing relationships with seven companies. That’s a
phenomenal win for us…and really pays tribute to the veracity of the American Security Challenge.”
Mentor Protégé Award Partner- Terry Downing, Raytheon Manager of Special Projects
“This is useful for ArcSight to explore all these new technologies. We picked up a large number of pilots…and will have our product
folks get involved to talk about the value to our customers. We are very excited; it is a valuable experience for the whole company.”
Pilot Award Partner- Prescott Winter, Public Sector Chief Technology Officer (CTO), formerly CTO of
the National Security Agency until recently moving to ArcSight
“The ASC infrastructure to ingest company data, accept expertise information from the reviewers, manage the scoring process as
well as the database to manage the aggregated scored company information is outstanding. I’ve been involved in evaluating
technologies for decades and the ASC program has mastered the art of efficiently scoring technology and managing the resulting
database as well, perhaps better than any evaluation management system I’ve been a party to.”
Reviewer- Bob Flores, former CTO of CIA
President of Applicology, an advisory firm in the National Security sector
“The process was streamlines and we are thrilled with the qualified sales and investor prospects that resulted from the Challenge.
We have a great product and this (ASC) exponentially increases our exposure to valuable transaction candidates.”
Challenge Award Winner- Jeffrey Chapman, CEO of AginCourt
“It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the
American Security Challenge helping America with this program so I thank you.”
Governor Tom Ridge former Department of Homeland Security
Secretary
• Brand affiliation with America’s fastest
growing program accelerating the visibility
and adoption of valuable technology within
public and private security infrastructure
• Identify emerging technologies and
potential relationships with current and past
Innovators
Benefits to Clients
• Exclusive access to the database of Innovators
• Establish/improve relationships with the public
and private national security community
• Identify technologies for possible licensing or
investment
Target Rich Community
ASC separates pretenders from contenders

More Related Content

Viewers also liked

Government Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National SecurityGovernment Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National Security
American Security Challenge
 
Seeking angel capital dos and donts
Seeking angel capital  dos and dontsSeeking angel capital  dos and donts
Seeking angel capital dos and donts
American Security Challenge
 
Martins Thoughts And Insights On Simplicity Complexity And Control
Martins Thoughts And Insights On Simplicity   Complexity And ControlMartins Thoughts And Insights On Simplicity   Complexity And Control
Martins Thoughts And Insights On Simplicity Complexity And Control
Martin van Vuure
 
Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15American Security Challenge
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
LinkedIn
 

Viewers also liked (6)

Government Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National SecurityGovernment Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National Security
 
Seeking angel capital dos and donts
Seeking angel capital  dos and dontsSeeking angel capital  dos and donts
Seeking angel capital dos and donts
 
Martins Thoughts And Insights On Simplicity Complexity And Control
Martins Thoughts And Insights On Simplicity   Complexity And ControlMartins Thoughts And Insights On Simplicity   Complexity And Control
Martins Thoughts And Insights On Simplicity Complexity And Control
 
Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Asc overview 7 8-13

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
Prasanna Hegde
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
Redington Value Distribution
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
Muneesh Batra
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
Muneesh Batra
 
Secure web gateway market report by marketsand markets
Secure web gateway market report by marketsand marketsSecure web gateway market report by marketsand markets
Secure web gateway market report by marketsand markets
DheerajPawar4
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...
DheerajPawar4
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
Ken Fuller
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
Ignyte Assurance Platform
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...
DheerajPawar4
 
Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center
Keith Krach
 
Sharpening risktechs cutting edge
Sharpening risktechs cutting edge Sharpening risktechs cutting edge
Sharpening risktechs cutting edge
Leandro Vitor
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
Dr Mark Lovatt
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Amazon Web Services Korea
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024
DheerajPawar4
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 

Similar to Asc overview 7 8-13 (20)

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Secure web gateway market report by marketsand markets
Secure web gateway market report by marketsand marketsSecure web gateway market report by marketsand markets
Secure web gateway market report by marketsand markets
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...
 
Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center
 
Sharpening risktechs cutting edge
Sharpening risktechs cutting edge Sharpening risktechs cutting edge
Sharpening risktechs cutting edge
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Asc overview 7 8-13

  • 1. Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com TechMATCH solves submission, screening and selection issues
  • 2. Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com Background
  • 3. The American Security Challenge is a program that… - Pulses the market for innovative technology that addresses the requirements of its customers - Collects and evaluates data collected from potential problem solving technology providers (sellers) - Reviews the higher scoring submissions and identifies those that most closely match the requirements of the customer (buyers) - Coordinates evaluations by the customers of the most viable candidates - Facilitates new relationships between entrepreneurs, investors, customers, channel partners, advisors, service providers and other valuable stakeholders What is ASC? ASC’s mission is to accelerate the deployment of valuable innovative technology into the public and private sector to better safeguard the nation’s citizens, assets and economy.
  • 4. “It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the American Security Challenge helping America with this program so I thank you.” Governor Tom Ridge, first Secretary of the Department of Homeland Security Background- DHS S&T Innovation is critical to national security including economic stability and prosperity….. ….. a major challenge has been wading through the avalanche of innovations that all proclaim value to separate the pretenders from the contenders.
  • 5. Current and past ASC Stakeholders Stakeholders include members of the Defense and Intelligence Community as well as Private Sector Critical Infrastructure owners
  • 6. • Management, analysis & visualization of large data sets collecting terabytes per hour • Protection of consumer credentials and sensitive account information on contaminated devices • Wireless security including handheld devices, unmanned vehicles, satellite, towers, and other • Large scale data management, fusion and analysis of multi-lingual, multi-source, multi-format, structured and unstructured data What is a Security Technology? Samples of customer requirements in Cyber, C4ISR, Physical and Energy technologies. For full list see website http://www.americansecuritychallenge.com/challenge/technologies.php • Scavenging energy technologies • Security authentication for IP networks • Offensive and defensive network security • Network detection and obfuscation techniques • In-band interference cancellation techniques • Water purification • Building energy conservation technologies • Stationary and mobile power supplies and storage • High volume data analysis and visualization tools • Access controls • Asset tracking • Biometric technologies that accurately determine identity at a distance • Batteries and power sources of long duration • Vehicle and vehicle fuel efficiency technologies
  • 7. Tech scouting cycle Shopping List •Cloud Security •Malware Detection •Identity Mngmt •Renewable Energy •Hi-Speed Comp •Data Leakage •Network Security 2- ASC Outreach 3- ASC Screening w 100+ experts 4-Customer Testing and/or Due Diligence 1- Customer Requirements 5-Customer Transaction Media Embassies Incubators VC’s University Labs Fed Labs ESQ’s Angels CPA’s CVC’s Federal Labs
  • 8. Tech Buyer (Customer) Solve problems faster ASC can broadcast requirements to a large community quickly Extend reach Requirements gain exposure in technology communities not previously reached Choices screened ASC screens through and provides feedback and short list of most viable qualified options More confident decisions Comfort in knowledge that extensive scouting produced broad base of alternatives which were screened against requirements Broader alternatives Buyers enjoy a greater number of choices as well as alternatives from different sectors (ie a gaming tech applied to simulations/training or a social networking algorithm applied to intelligent pattern recognition, etc) Tech Seller (Innovator) Expand customer base Expand sales pipeline and participate in sales opportunities with new prospects Qualified opportunities Customers have current need with approved budget and contract vehicle Increase revenue Expand sales pipeline and participate in sales opportunities with new prospects Investor exposure Qualified investors are seeking companies with customer traction. Pilots generate revenue as well as increase investor interest Added to invitation list Sept 23 event is invitation only but top 100 Challengers are automatically added to invite list. event will be high level relationship development between C-level tech owners and vendor facing CIO/CTO/CSO customers Benefits to Buyers and Sellers
  • 9. What kinds of companies does ASC find? What does this mean? This profile tells us the following:  That ASC enjoys a broad reach into many technology communities across the country and around the world.  That most of the Challengers are small but growing companies seeking new contracting and investment opportunities for their deployable and near-term deployable technologies.  That startup and more mature innovative tech companies benefit as a Challenger. • 21 different U.S. States, 5 countries • Average 2.2M sales • (startup to $62M) • 56% received grant funding • $200,000 to $45,000,000 • median of $2,000,000 • Employee range from 1 to 130 with median of 10 • Technologies • 34% Cyber • 25% C4ISR • 26% Physical • 14% Energy • 79% had no security clearances • Two-thirds raised equity capital • $150,000 to $62,000,000 • Median of $5,200,000 • 89% had no previous Dept. of Defense or IC sales • 56% received grant funding with $2M average • ($200K to $45M) • Technology Readiness Levels • 56% TRL 9 • 16% TRL 8 • 13% TRL 7 Profile of top 60 companies from recent search
  • 10. What they say about ASC “The INSA American Security Challenge is an incredibly efficient and effective way to connect the technology innovators with the public and private sector organizations who leverage the new technology while performing their respective missions of the most crucial work in intelligence and national security.” Ellen McCarthy, President of INSA, an ASC Licensee “We are very pleased with Raytheon’s outcomes. We ended up actively pursuing relationships with seven companies. That’s a phenomenal win for us…and really pays tribute to the veracity of the American Security Challenge.” Mentor Protégé Award Partner- Terry Downing, Raytheon Manager of Special Projects “This is useful for ArcSight to explore all these new technologies. We picked up a large number of pilots…and will have our product folks get involved to talk about the value to our customers. We are very excited; it is a valuable experience for the whole company.” Pilot Award Partner- Prescott Winter, Public Sector Chief Technology Officer (CTO), formerly CTO of the National Security Agency until recently moving to ArcSight “The ASC infrastructure to ingest company data, accept expertise information from the reviewers, manage the scoring process as well as the database to manage the aggregated scored company information is outstanding. I’ve been involved in evaluating technologies for decades and the ASC program has mastered the art of efficiently scoring technology and managing the resulting database as well, perhaps better than any evaluation management system I’ve been a party to.” Reviewer- Bob Flores, former CTO of CIA President of Applicology, an advisory firm in the National Security sector “The process was streamlines and we are thrilled with the qualified sales and investor prospects that resulted from the Challenge. We have a great product and this (ASC) exponentially increases our exposure to valuable transaction candidates.” Challenge Award Winner- Jeffrey Chapman, CEO of AginCourt “It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the American Security Challenge helping America with this program so I thank you.” Governor Tom Ridge former Department of Homeland Security Secretary
  • 11. • Brand affiliation with America’s fastest growing program accelerating the visibility and adoption of valuable technology within public and private security infrastructure • Identify emerging technologies and potential relationships with current and past Innovators Benefits to Clients • Exclusive access to the database of Innovators • Establish/improve relationships with the public and private national security community • Identify technologies for possible licensing or investment
  • 13. ASC separates pretenders from contenders