Welcome!

DreamPort is a combination of state-of-the-art facilities, innovative programs, and imaginative people charged with finding that spark that leads to unparalleled capability for USCYBERCOM and the warfighters at large.

Located in Columbia, Maryland, DreamPort was created under a Partnership Intermediary Agreement between MISI and United States Cyber Command (USCYBERCOM).

Notice for all interested parties to DreamPort events: Announcement of DreamPort events that are considered to have high potential for further efforts that may be accomplished via FAR-based contracting instruments, Other Transaction Authority (OTA) for Prototype Projects 10 USC 2371b, Prizes for advanced technology achievements 10 USC 2374a, and/or Prize Competitions 15 USC 3719, may be made at the dreamport.tech website. All announcements made at the dreamport.tech website are considered to satisfy the reasonable effort to obtain competition in accordance with 10 USC 2374a (b), 15 USC 3719 (e) and 10 USC 2371b (b)(2). All FAR based actions will follow announcement procedures per FAR 5.201(b) accordingly.

Why Register for DreamPort?

DreamPort welcomes all, but we'd like to know a little about you. We hold daily, monthly, and quarterly events, some by invitation only. By registering with the DreamPort you will receive our periodic emails about upcoming events, new services and capabilities, and mentoring opportunities. We provide a place where you can upload a resume, abstract or other document that describes who you are, what you are expert at, and how you want to help.

This information can also be about your organization or company. We use the information you provide to learn more about your interests and expertise. For example, are you a cyber subject matter expert that would like to engage in a rapid prototyping event (RPE)? We look forward to having you as a part of the DreamPort Partnership Network.

Register Now

Engage MISI!

As MISI continues to grow in support of our government customer's mission, our staffing needs continue to grow. MISI is currently seeking small businesses' engagement to identify the talents needed to fill multiple job openings on various projects. Please submit your information using this link. Once your information is verified, you will receive an email from MISI's PMO with the current available positions. We look forward to engaging with small businesses within our community!

Engage MISI!
MISI swag is now available!

MISI swag is now available!

MISI is now selling an assortment of merchandise. Explore our clothing options including polos, woven dress shirts, sweaters, cardigans, jackets, and activewear. Shop backpacks and bags, caps and beanies. Stay hydrated with one of our MISI water bottles or other drinkware! Keep accessories charged with a MISI-branded power bank and wireless charger. Find these options and more at the new MISI Swag Store.

ALERT: DHS Issues Shields Up Advisory

Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, non-profits, and other organizations, large and small, across multiple sectors of the economy.

Notably, the Russian government has used cyber as a key component of their force projection over the last decade, including previously in Ukraine in the 2015 timeframe. The Russian government understands that disabling or destroying critical infrastructure—including power and communications—can augment pressure on a country's government, military and population and accelerate their acceding to Russian objectives.

While there are not currently any specific credible threats to the U.S. homeland, we are mindful of the potential for the Russian government to consider escalating its destabilizing actions in ways that may impact others outside of Ukraine.

Based on this situation, CISA has been working closely with our critical infrastructure partners over the past several months to ensure awareness of potential threats—part of a paradigm shift from being reactive to being proactive.

CISA recommends all organizations–regardless of size–adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. Read More

CISA Shields Up

Upcoming Events

Hack the Building 2.0 - Hospital Edition
Hack the Building 2.0 - Hospital Edition

April 18, 2023. Call for speakers, sponsors, technical content and exhibitors! This event will be a unique opportunity to engage with cybersecurity leaders from academia, the National Security Agency (NSA), the Department of Defense, industry and more. If you would like to sponsor, present or get more information, please email dpevent@dreamport.tech

Register for the Event (External)
DISA-TEM: Kinetic Data
DISA-TEM: Kinetic Data

February 7, 2023 | 1100 - 1200 ET. Kinetic Data has built a multi-tenanted, highly available, horizontally scalable, and infinitely flexible workflow automation platform that can provide DISA and its DoD partners with the ability to streamline business processes without the “big bang” of risky, multi-year, expensive consolidation efforts. Our consumption based business model allows for quick wins and proven, iterative success while seamlessly leveraging the existing investments that DISA has already made. Conference ID: 241 226 735#

Join Teams
DISA-TEM: RunSafe Sonatype
DISA-TEM: Sonatype

February 8, 2023 | 1100 - 1200 ET. Sonatype’s software supply chain platform allows engineering teams to manage software quality and governance using a single control plane. Sonatype solves the problem of how to balance speed, quality, intelligence, and security at scale, equipping engineering teams with the tools they need to continually code smarter, fix faster, and be secure. Conference ID: 890 642 738#

Join Teams
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: Cyber National Mission Force- (CNMF)

February 8, 2023. This tech talk will cover the impact of proactive Cyber Operations, and "Defend Forward" to national security, the impact of Hunt Forward Operation on partnerships across the globe, and the necessity of a methodology to deal with increasingly sophisticated and agile foreign Cyber threat actors.

Register for the Event
DISA-TEM: ServiceNow
DISA-TEM: ServiceNow

February 9, 2023 | 1100 - 1200 ET. Automation Engine empowers ServiceNow platform owners to make work flow seamlessly across siloes by quickly and easily connecting to any system and automating routine, UI-centric work, all on a single platform. Automation Engine combines the value of Integration Hub with RPA Hub (Robotic Process Automation) and Document Intelligence for a complete automation solution. Conference ID: 386 164 912#

Join Teams
DISA-TEM: Asimily
DISA-TEM: Asimily

February 14, 2023 | 1100 - 1200 ET. Asimily provides network visibility, inventory identification with classification, actionable insights for threat detection and forensic analysis to identify and prevent attacks including ransomware, and robust vulnerability management actions that will allow you to proactively reduce risk across all connected devices. Conference ID: 61 286 912#

Join Teams
DISA-TEM: Flexera
DISA-TEM: Flexera

February 15, 2023 | 1100 - 1200 ET. Flexera enables visibility into the data needed for the digital transformation journey, from understanding current on-premises costs and software license entitlement positions to handling cost-to-cloud and ongoing optimization of IaaS, PaaS and SaaS services. Flexera helps customers optimize both on-premises and cloud spend as they navigate the shifting technology landscape, regardless of the vendors they choose. Conference ID: 307 863 039#

Join Teams
DISA-TEM: Digital Guardian
DISA-TEM: Digital Guardian

February 16, 2023 | 1100 - 1200 ET. Digital Guardian Endpoint Data Loss Prevention (DLP) gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data loss protection coverage – to stop sensitive data from getting out of your organization at the greatest point of risk – the endpoint. Conference ID: 3677 379 342#

Join Teams
DISA-TEM: Quantum Defense
DISA-TEM: Quantum Defense

February 22, 2023 | 1100 - 1200 ET. QD provides a provably unbreakable solution based on quantum secure technologies. With its foundational roots in SIGSALY, QD has architected a scalable one-time-pad infrastructure, unbreakable, even against quantum threats. The company’s solution addresses short comings known to exist in post-quantum technologies, against which PQC vendors are already planning crypto-agile designs. Conference ID: 100 230 908#

Join Teams
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: USCC J9

February 22, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
DISA-TEM: Leaning Technologies
DISA-TEM: Leaning Technologies

February 23, 2023 | 1100 - 1200 ET. As part of Government Departments & Agencies digital transformation efforts, significant issues arise with the replacement or modernization of client-side applications. To help with this, Leaning Technologies has developed CheerpJ, an automated tool that simplifies the migration and modernization of any legacy Java client applications (Java Applet, Oracle Forms, Java Swing) running on end user's machines into modern HTML5 (cloud-friendly) web standards. Conference ID: 849 558 452#

Join Teams
DISA-TEM: Blinkly
DISA-TEM: Blinkly

February 28, 2023 | 1100 - 1200 ET. Blinkly is a technology company focused on privatizing the basic utilities of the internet. The company's flagship product is a quantum-resistant, end-to-end encrypted, email service that allows users to communicate securely in vulnerable environments without the risk of Microsoft or Google reading your email, creating psychometric profiles, and selling your data to third parties. Conference ID: 252 702 265#

Join Teams
Frontier AI Research and Implications for Leadership and Strategy
Frontier AI Research and Implications for Leadership and Strategy

February 28, 2023. Mark Beall will introduce attendees to the world of frontier AI research and offer a point of view on its implications for leadership and strategy. We will level set on a common working understanding of AI and its development and why a breakthrough in May 2020 ushered in a new era of AI with profound implications for military organizations and the future of warfighting.

Register for the Event
DISA-TEM: Intelligent Waves
DISA-TEM: Intelligent Waves

March 1, 2023 | 1100 - 1200 ET. GRAYPATH is an award-winning Quantum Resistant Next Generation Virtual Private Network that currently provides the Department of Defense (DoD) Special Operations and Intelligence Communities with a secure, agile, user-friendly, obfuscated communications solution. GRAYPATH delivers the critical operational ability of managed attribution and redundant networks for multiple groups of users to use the same non-attributable SD-WAN. Conference ID: 740 084 747#

Join Teams
DISA-TEM: REDCOM Laboratories
DISA-TEM: REDCOM Laboratories

March 2, 2023 | 1100 - 1200 ET. REDCOM ZKX is a multi-factor identification and authentication system for vetting access to confidential resources — such as sensitive data and secure communication channels — without the need to store user secrets on the client or server side. Compared to the two-factor authentication protocol, ZKX offers users of the system flexibility in whether, how, and to what extent to prioritize usability vs. security in particular scenarios. Conference ID: 263 204 654#

Join Teams
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: USCC J3: Dr. Emily Goldman

March 8, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: USCC J1

March 23, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: ARCYBER

April 5, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: MARFORCYBER

May 3, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: CGCYBER

May 17, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series
USCYBERCOM Academic Engagement Network (AEN) Tech Talk Series: USCC J2

May 31, 2023. Join us for a series of virtual events as we discuss capabilities of the Cyber Mission Force, and to discover ways we engage with military services, industry, research community, academia, to enable U.S. Cyber Command's operational mission.

Register for the Event

Notices & Opportunities

Technical Exchange Meetings (TEMs)

The Technical Exchange Meeting (TEM) is a weekly event established and hosted by the Defense Information Systems Agency (DISA) Emerging Technology (EM) Directorate and DOD Office of the Chief Information Officer (DOD CIO) as a means to collaborate with commercial entities, non-profit organizations, and academia. TEMs offer a platform for organizations to present technological advancements and innovations.

Learn More
Our Current Challenge Problems

DreamPort is excited to announce three challenge problems we will focus on over the next several months. The challenge problems can be divided into functional capability (e.g., vulnerability research) and enabling technologies (e.g., machine learning). We are ultimately looking for functional capability, but the underlying solution should integrate one or more of the enabling technologies. The three capability areas include: vulnerability research, signature diversity, and global awareness of malware.

Review them Here
Download the latest version of the Cybersecurity Maturity Model Certification!

You can now request the initial implementation of the Cybersecurity Maturity Model Certification (CMMC) v1.02, which includes several changes to the standard. Also available are the appendices, errata, and the public briefing documents!

Submit your Request at MISI.tech

What is a Rapid Prototyping Event (RPE)

Similar to a hackathon, a rapid prototyping event is a gathering of subject matter experts committed to looking for new ways to solve a particular challenge. The subject matter experts can work alone, in teams, or as one collective group and are encouraged to now allow previous failures, standards, processes, and other impediment get in the way of breakthrough solutions and ideas. They are encouraged to identify and take risks that yield unexpected success. Unlike a hackathon, RPEs aren't limited to software challenges. The goal of an RPE is to create a useable prototype. These prototypes can be software code snippets, modified Internet of Things devices, plastics created in a 3D printer, or interesting robotic solutions to solve a problem to name a few. Read more and view all current and past RPEs here.

Lessons Learned and Winners

RPE-001: The Chameleon & The Snake
RPE-001: The Chameleon & The Snake

This RPE specifically targeted malware signature diversity and signature measurement for Microsoft Windows (x86 and amd64) in a simulated operational environment at a realistic pace.

Read what we learned.
RPE-003: The Wolf in Sheep's Clothing
RPE-003: The Wolf in Sheep's Clothing

The Fables of Aesop by Joseph Jacobs published in 1894 includes the tale of the wolf in sheep's clothing. Just as in this tale, DreamPort played the Shepherd trying to spot the wolf in the flock. DreamPort executed an RPE competition where participants designed, implemented or enhanced user activity monitoring (UAM) solutions for detecting live and recent insider threat attacks or unauthorized activities.

Read what we learned.
RPE: The Broken Gear in the Watch 2 Winner: CompSec Direct
Congratulations to CompSec Direct for winning RPE: The Broken Gear in the Watch 2!

We tested participant's abilities to find and mitigate vulnerabilities in open source embedded device firmware such as switches, routers and firewalls and other devices. During the actual event, participants also had to analyze firmware images.

RPE Winner
Congratulations to Technica Corp for winning RPE-014: Rossum's Universal Robots!

This event was open to all colleges, universities, individuals and non-traditional participants who have experience in machine learning applications to network packet capture (PCAP) for automated anomalous behavior identification.

RPE Winner
Congratulations to Seth Sites for winning RPE-015: Sage and Sentry!

In this event we defined a fictitious threat actor named DreadRiver (adversary) who has been reportedly attacking other cities, and our DreamValley would prefer to refine its defenses. In this event we are studying solutions (software and techniques) for performing analytics against cyber threat information.

RPE Winner
Congratulations to Panther Labs for winning RPE-016: The Gremlins in the Cloud!

We hunted gremlins in the cloud. BCR Industries survived 4 days of coordinated hacking in November of 2020, and they are back in business.

RPE Winner
Technica Corporation completed RPE-017 as a top finisher utilizing their Graph Hunt Solution!

This event is open to students at all colleges, universities, professionals, and non-traditional participants who have experience in machine learning applications to network packet capture (PCAP) for automated anomalous behavior identification on a network that includes control systems.

BigBear AI LogoHeilig Defense Logo
RPE-018: Congratulations to BigBear AI as the winning Blue Team and to Heilig Defense as the winning Red Team

This event focuses on tools and techniques for signature diversity and signature measurement across Microsoft Windows (x86 and amd64), Linux (x86 and amd64), OS X (amd64), and Android (x86 and ARM) platforms. Samples can include both binaries and scripts (e.g., JavaScript). Participants will play either offense or defense.

Booz Allen Logo
RPE-019: Congratulations to Top Performer Booz Allen!

In this rapid prototyping event, we are challenging participants to develop techniques for rapid, automated penetration testing. Developments in artificial intelligence (AI) algorithms, particularly in reinforcement learning, can enable exploitation decision-making at computer, rather than human, speed.

Graphistry Logo
Congratulations to Graphistry for winning RPE-020: Seeing the Forest for the Trees!

In this rapid prototyping event, we are seeking techniques and solutions that can aid network defenders (e.g., SOC analysts) in making sense of a flood of alerts. While this challenge is not strictly limited to AI / ML approaches, there are certainly some promising signs that advances in unsupervised machine learning algorithms can be applied to this problem. Such approaches will be viewed favorably.

Our Facility

DreamPort Columbia Location
7000 Columbia Gateway, Suite 150
Columbia, MD 21046
p: + 1 443 626 4450

Hours:
Mon – Thurs: 0700 – 1800
Friday: 0700 – 1700

Columbia Gateway is very close to so many restaurants, hotels and other amenities that it was an easy choice to establish our DreamPort location. Destinations such as Columbia Gateway Retail, Columbia Restaurant Park, Columbia Crossing, Gateway Overlook, Dobbin Road Retail, Snowden Square, Stanford Boulevard Retail and Route 1 Retail are all within a 1.5 mile radius!

Why Columbia Gateway?

Columbia Gateway is near the BWI Airport and has 71 restaurants and 7 hotels in a 1.5 mile radius. You can walk, jog and bike on the nearby bike paths or visit excellent gyms in our building or down the road.