Presentation is loading. Please wait.

Presentation is loading. Please wait.

Breakout Session: Cybersecurity. Cybersecurity Participants (24) 18 Attendees.

Similar presentations


Presentation on theme: "Breakout Session: Cybersecurity. Cybersecurity Participants (24) 18 Attendees."— Presentation transcript:

1 Breakout Session: Cybersecurity

2 Cybersecurity Participants (24) 18 Attendees

3 1. List strengths and unique capabilities we have in the network Teaching Environment/Lab probe different scenarios Opportunity to look at other laboratories for manufacturing cyber research MPREF Cyber Defense Lab – TAMU CC - Offensive and defensive techniques DoD work storage - May not have the vehicle to understand what the requirements are for Cyber Gain visibility in the Cybersecurity research area Note people that are working with Cyber in other locations Relationships that are desired: - Cyber wing at Cyber hill in San Antonio - ARL open campus program Utilize IT capabilities to assist

4 2. List the actions to be taken in the next 9-12 months to pursue funding Check with Homeland Security and DoE for funding opportunities. - Searching for funding through different departments IDIQ (Hunting License) Collaboration among all participants ( like Center Director’s Portal) Ragsdale (a leader) – not only leader WebEx Develop a collaboration database of expertise More face to face meetings - Every 2 months by WebEx See each other as a resource and have more engagement

5 3. What help is needed to accomplish action plan? Action Plan: - Engagement/Resources/Ideas Barriers: - Resources - Academic Load What do you need: - Students (Ph.D./Masters) - Proposal writing assistance - Breaking down individual barriers then need to come together (professors/students/researchers) Incentives - Need mutual capability knowledge between Larger schools (TAMU) and the smaller Regional Division School (PVAMU/Lamar etc)

6 4. What would the group like for this conference to become in 2017 and beyond? Network! Mechanisms for Networking! More Networking!

7 5. List potential funding agencies and programs to target Not hard to make a list of organizations funding technology areas Key Questions: - Who/what are they funding (now/future)? - Do they have funding? - How do I get it? Full spectrum consideration (e.g., Workforce Development and Continuing Education)


Download ppt "Breakout Session: Cybersecurity. Cybersecurity Participants (24) 18 Attendees."

Similar presentations


Ads by Google