Welcome!

DreamPort is a combination of state-of-the-art facilities, innovative programs, and imaginative people charged with finding that spark that leads to unparalleled capability for USCYBERCOM and the warfighters at large.

Located in Columbia, Maryland, DreamPort was created under a Partnership Intermediary Agreement between the Maryland Innovation & Security Institute and United States Cyber Command (USCYBERCOM).

Notice for all interested parties to DreamPort events: Announcement of DreamPort events that are considered to have high potential for further efforts that may be accomplished via FAR-based contracting instruments, Other Transaction Authority (OTA) for Prototype Projects 10 USC 2371b, Prizes for advanced technology achievements 10 USC 2374a, and/or Prize Competitions 15 USC 3719, may be made at the dreamport.tech website. All announcements made at the dreamport.tech website are considered to satisfy the reasonable effort to obtain competition in accordance with 10 USC 2374a (b), 15 USC 3719 (e) and 10 USC 2371b (b)(2). All FAR based actions will follow announcement procedures per FAR 5.201(b) accordingly.

Why Register for DreamPort?

DreamPort welcomes all, but we'd like to know a little about you. We hold daily, monthly, and quarterly events, some by invitation only. By registering with the DreamPort you will receive our periodic emails about upcoming events, new services and capabilities, and mentoring opportunities. We provide a place where you can upload a resume, abstract or other document that describes who you are, what you are expert at, and how you want to help.

This information can also be about your organization or company. We use the information you provide to learn more about your interests and expertise. For example, are you a cyber subject matter expert that would like to engage in a rapid prototyping event (RPE)? We look forward to having you as a part of the DreamPort Partnership Network.

Register Now

Upcoming Events

COPT Logo
RPE-012: The Finches Across the Islands July - September, 2020

This competition pits two sides of the 'room' against each other on offense versus defense. We are looking for both attackers and defenders to answer a series of questions.

Learn More
CIS Mobile Logo
Tech Talk Series: From Threat to Mission Enabler: Designing Secure Smartphones for Government Use July 9, 2020

This talk will look at some of the disregarded security issues with common smartphones today, and present an alternative approach that replaces the OEM-controlled OS with a government-controlled version of Android on off-the-shelf phones.

Learn More
Splunk Logo
Investigating with Splunk Workshop July 14, 2020

This workshop provides users a way to gain experience searching in Splunk to answer specific questions related to an investigation. Users will leave with a better understanding of how Splunk can be used to investigate in their enterprise.

Learn More
MISI Logo
A National Listening Session July 14, 2020

The National Conversation Series provided information for organizations to prepare for the upcoming Cybersecurity Maturity Model Certification (CMMC) standard directly from CMMC leaders. The National Listening Session is a town hall that will provide you the ability to advocate your experiences, challenges and provide your input into the process. This is an opportunity for small to medium size organizations and manufacturers to lead and engage with CMMC leaders.

Learn More at MISI.tech
CyberTech Logo
Cybersecurity for the Healthcare Sector July 16, 2020

This session will be an all-encompassing event for healthcare, highlighting hospitals, pharma, R&D and insurance and will feature presentations on the new cyber challenges. We’ll explore local and international perspectives and discuss opportunities that the cyber era brings to the healthcare industry.

Learn More (External Site)
Verizon logo
Tech Talk Series: 2020 Verizon Data Breach Investigations Report and the Public Sector July 21, 2020

The Verizon Data Breach Investigations Report (DBIR), now in its thirteenth year, takes a forensic look at all of this breach data, extrapolating trends and breach insights relevant to enterprise across industries. This benchmark report is used by organizations all over the world to understand the breach landscape and to make intelligent security program decisions. Join us as we discuss some of the key findings of the 2020 report and those relevant to the public sector.

Learn More
Piliero Mazza logo
How to Accelerate Your CMMC Compliance Efforts July 22, 2020

Join Mid-Tier Advocacy on July 22 at noon EST for a FREE webinar on "Rapid Business Transformation - Becoming Agile and Secure Now." This webinar will focus on CMMC compliance efforts and how to be ready sooner rather than later!

Learn More (External Site)
MISI logo
Navigating Cybersecurity Compliance for the Manufacturing Sector July 23, 2020

The Maryland Innovation & Security Institute (MISI) joins The Maryland Manufacturing Extension Partnership (MD MEP) to tackle questions as they pertain to the manufacturing sector and cybersecurity compliance. The MD MEP is a non-profit organization funded by industry and the State of Maryland that is focused on growing and strengthening Maryland manufacturers.

Learn More at MISI.tech
MISI logo
The Israel Critical Infrastructure Panel July 30, 2020

This panel discussion brings together representatives from Israel's leading critical infrastructure organizations, USCYBERCOM and members from the CMMC AB to share their insights on cyber innovation, trends and standards.

Learn More at MISI.tech
C3 Icon
Cyber Conversation & Coffee (C3) August 6, 2020

Join us for our virtual Cyber Conversation & Coffee (C3) featuring Tom VanNorman from Dragos. Asset management and network visibility are a critical part of everyone’s security plan. What can happen when rogue devices appear on your network? What happens if one of these rogue devices starts sending out malicious traffic? Bring your coffee and join in on the conversation!

Learn More
Axellio Logo
Tech Talk Series: Network Packet Capture & Security Analytics August 11, 2020

Axellio will discuss their technology for capturing and retaining network packets at line rate with zero packet loss at aggregate speeds up to 100Gbps. This solution is combination of specialized hardware utilizing COTS components and software developed to store the PCAP files for use by on-board or external sensors (i.e., Security Onion).

Learn More
JAIC logo
2020 Department of Defense Artificial Intelligence Symposium and Exposition September 9 & 10, 2020

The two-day DoD AI Symposium and Exposition will bring together DoD, industry, academia, and across government AI experts and professionals to discuss the Department's current activities, future direction, challenges, and areas of collaboration with industry and academia that surround the operationalization of AI.

Learn More (External Site)
The Turing Test Prize Challenge
The Turing Test Prize Challenge

In the Summer of 2020, this will be a challenge event where participants develop a stand-alone automated process to interact with a Microsoft Windows machine just as a human user may do with the goal being to fool a human judge who is monitoring target computers via Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) into thinking a normal user is interacting with that machine and not an automated program or process.

Learn More

Notices & Opportunities

Technical Exchange Meetings (TEMs)

The Technical Exchange Meeting (TEM) is a bi-weekly event established and hosted by the Defense Information Systems Agency (DISA) Emerging Technology (EM) Directorate and DOD Office of the Chief Information Officer (DOD CIO) as a means to collaborate with commercial entities, non-profit organizations, and academia.

TEMs offer a platform for organizations to present technological advancements and innovations.

The primary interest areas for TEMs include: Browser Isolation, Mobile/Desktop Convergence, Automation, Distributed Ledgers, Machine Learning and Artificial Intelligence (ML & AI), Development, Security and Operations (DevSecOps), Zero Trust, Security, Orchestration, Automation and Response (SOAR), Wireless Transport, Assured Identity and 5th Generation Wireless (5G).

Learn More
Tech Collision Event

The Air Force Research Laboratory/Space Vehicles Directorate (AFRL/RV)-sponsored Catalyst Accelerator will host a 3-day pitch event where 32 – 40 startups and small businesses will have the opportunity to present innovative, dual-use, space technologies, ideally with a Technology Readiness Level (TRL) of 4 or higher. Companies will pitch twice—once to a room of Government tech scouts and once to a room of Industry tech scouts. The final day will include technology demonstrations facilitated by Tech Warrior Ops (https://twenterprise.org/tech-warrior-ops) and a poster board session open to the public, where companies of varying TRL capabilities may display their technologies along with the pitching companies.

Learn More
Download the latest version of the Cybersecurity Maturity Model Certification!

You can now request the initial implementation of the Cybersecurity Maturity Model Certification (CMMC) v1.02, which includes several changes to the standard. Also available are the appendices, errata, and the public briefing documents!

Submit your Request at MISI.tech
Our Current Challenge Problems

DreamPort is excited to announce three challenge problems we will focus on over the next several months. The challenge problems can be divided into functional capability (e.g., vulnerability research) and enabling technologies (e.g., machine learning). We are ultimately looking for functional capability, but the underlying solution should integrate one or more of the enabling technologies. The three capability areas include: vulnerability research, signature diversity, and global awareness of malware.

Review them Here

What have we learned from our events?

RPE-001: The Chameleon & The Snake
RPE-001: The Chameleon & The Snake

This RPE specifically targeted malware signature diversity and signature measurement for Microsoft Windows (x86 and amd64) in a simulated operational environment at a realistic pace.

Read what we learned.
RPE-003: The Wolf in Sheep's Clothing
RPE-003: The Wolf in Sheep's Clothing

The Fables of Aesop by Joseph Jacobs published in 1894 includes the tale of the wolf in sheep's clothing. Just as in this tale, DreamPort played the Shepherd trying to spot the wolf in the flock. DreamPort executed an RPE competition where participants designed, implemented or enhanced user activity monitoring (UAM) solutions for detecting live and recent insider threat attacks or unauthorized activities.

Read what we learned.
RPE: The Broken Gear in the Watch 2 Winner: CompSec Direct
Congratulations to CompSec Direct for winning RPE: The Broken Gear in the Watch 2!

We tested participant's abilities to find and mitigate vulnerabilities in open source embedded device firmware such as switches, routers and firewalls and other devices. During the actual event, participants also had to analyze firmware images.

Get to Know Us

Meet the Team

Put a face to a name. Get to know the team so next time you see them, you can say hello.

Say Hello
Request a Meeting

Want to demo your technology, or want to get a demo of some of ours? Let's meet.

Send Request

Our Facility

DreamPort Columbia Location
7000 Columbia Gateway, Suite 150
Columbia, MD 21046
p: + 1 443 626 4450

Columbia Gateway is very close to so many restaurants, hotels and other amenities that it was an easy choice to establish our DreamPort location. Destinations such as Columbia Gateway Retail, Columbia Restaurant Park, Columbia Crossing, Gateway Overlook, Dobbin Road Retail, Snowden Square, Stanford Boulevard Retail and Route 1 Retail are all within a 1.5 mile radius!

Why Columbia Gateway?

Columbia Gateway is near the BWI Airport and has 71 restaurants and 7 hotels in a 1.5 mile radius. You can walk, jog and bike on the nearby bike paths or visit excellent gyms in our building or down the road.