Welcome!

DreamPort is a combination of state-of-the-art facilities, innovative programs, and imaginative people charged with finding that spark that leads to unparalleled capability for USCYBERCOM and the warfighters at large.

Located in Columbia, Maryland, DreamPort was created under a Partnership Intermediary Agreement between the Maryland Innovation & Security Institute and United States Cyber Command (USCYBERCOM).

Notice for all interested parties to DreamPort events: Announcement of DreamPort events that are considered to have high potential for further efforts that may be accomplished via FAR-based contracting instruments, Other Transaction Authority (OTA) for Prototype Projects 10 USC 2371b, Prizes for advanced technology achievements 10 USC 2374a, and/or Prize Competitions 15 USC 3719, may be made at the dreamport.tech website. All announcements made at the dreamport.tech website are considered to satisfy the reasonable effort to obtain competition in accordance with 10 USC 2374a (b), 15 USC 3719 (e) and 10 USC 2371b (b)(2). All FAR based actions will follow announcement procedures per FAR 5.201(b) accordingly.

Why Register for DreamPort?

DreamPort welcomes all, but we'd like to know a little about you. We hold daily, monthly, and quarterly events, some by invitation only. By registering with the DreamPort you will receive our periodic emails about upcoming events, new services and capabilities, and mentoring opportunities. We provide a place where you can upload a resume, abstract or other document that describes who you are, what you are expert at, and how you want to help.

This information can also be about your organization or company. We use the information you provide to learn more about your interests and expertise. For example, are you a cyber subject matter expert that would like to engage in a rapid prototyping event (RPE)? We look forward to having you as a part of the DreamPort Partnership Network.

Register Now

Upcoming Events

The Industrial Control Systems Joint Working Group Virtual Meeting
The Industrial Control Systems Joint Working Group Virtual Meeting

September 21-22, 2020. The Industrial Control Systems Joint Working Group (ICSJWG) welcomes the submission of all types of abstracts related to Industrial Control Systems (ICS) security and resilience across critical infrastructure in all sectors. The intent is to build an agenda that provides value to all attendees with limited general or overview information. To this end, the ICSJWG Steering Team (IST) strives to select a limited number of introductory and overview presentations and as many as possible in-depth and technical sessions with useful take-away information.

Learn More (External Site)
Accelerating CMMC Readiness with MISI, AWS & Elastic
Accelerating Compliance Readiness with MISI, AWS & Elastic

September 22, 2020, 1pm. MISI, AWS & Elastic are joining forces to support Defense Industrial Base (DIB) contractors across the country in preparing for the upcoming CMMC standard. AWS will discuss what compliance means for organization's workloads in the cloud and GovCloud resiliency. MISI will discuss how AWS and Elastic are an essential part of our Security Operations Center (SOC) and continuous cyber threat assessment monitoring platform, Jensie. Learn more about how MISI is using AWS along with a variety of solutions in support of businesses all over the US to prepare for compliance readiness.

Learn More (MISI.tech)
Cybersecurity Maturity Model Certification (CMMC) Overview
Cybersecurity Maturity Model Certification (CMMC) Overview

September 24, 2020. Corbin Evans, NDIA's Principal Director of Strategy, will provide NDIA members with an update on the current status of DoD's Cybersecurity Maturity Model Certification "CMMC" program. CMMC defines DoD's new cybersecurity requirements for unclassified systems, and all DoD contractors must gain third party certification for compliance by 2026. Sign-up now because space is limited! This webinar is available to NDIA, NTSA and WID members only.

Learn More (External Site)
Securing your ICS Supply Chain – How to Thwart Attackers and Satisfy Regulators
Securing your ICS Supply Chain – How to Thwart Attackers and Satisfy Regulators

October 8, 2020. Securing ICS software supply chains is becoming increasingly urgent. Attackers, including criminal and state-sponsored groups, are turning their attention to the ICS supply chain as fertile ground for exploitation. And it is not going unnoticed. Not only are critical industries starting to devote serious resources towards the problem, but regulators are stepping in, like in the power industry, where supply chain regulations such as NERC-CIP-013 are taking effect in October.

Learn More (External Site)
Splunk's Boss of the SOC & NOC Competitions
Splunk's Boss of the SOC & NOC Competitions

October 19, 2020. Both events will be hosted globally on Oct 19th (the day prior to .conf). You must be registered for .conf in order to participate.

Learn More (External Site)
Splunk's .conf20
Splunk's .conf20

October 20-21, 2020. Splunk .conf is the premier education event for thousands of IT, security and business professionals looking to bring data to every question, decision and action. Join us for two days of innovation, featuring today's thought leaders, Splunk's top partners, dozens of educational sessions and numerous opportunities to learn new skills. Get empowered to do amazing things with data at .conf20.

Learn More (External Site)
The Turing Test Prize Challenge
The Turing Test Prize Challenge

In the Fall of 2020, this will be a challenge event where participants develop a stand-alone automated process to interact with a Microsoft Windows machine just as a human user may do with the goal being to fool a human judge who is monitoring target computers via Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) into thinking a normal user is interacting with that machine and not an automated program or process.

Learn More
HACK THE BUILDING
HACK THE BUILDING

November 16-19, 2020. This Maryland Innovation & Security Institute and DreamPort event is inspired by a DoD request for an offensive and defenseive exercise that demonstrates the impact of IT, IoT and OT cyber attacks against critical building automation and mission operations.

Learn More (External Site)
AvengerCon V
AvengerCon V

AvengerCon is a free security event held every fall to benefit the hackers of the U.S. Cyber Command community and is supported by the U.S. Army 780th Military Intelligence Brigade and the Maryland Innovation and Security Institute. The event is open to all service members and employees of U.S. Cyber Command and Department of Defense personnel supporting cyberspace missions. AvengerCon features presentations, hacker villages, training workshops, and much more.

Read more here (External Site)

Notices & Opportunities

Technical Exchange Meetings (TEMs)

The Technical Exchange Meeting (TEM) is a weekly event established and hosted by the Defense Information Systems Agency (DISA) Emerging Technology (EM) Directorate and DOD Office of the Chief Information Officer (DOD CIO) as a means to collaborate with commercial entities, non-profit organizations, and academia.

TEMs offer a platform for organizations to present technological advancements and innovations.

The primary interest areas for TEMs include: Browser Isolation, Mobile/Desktop Convergence, Automation, Distributed Ledgers, Machine Learning and Artificial Intelligence (ML & AI), Development, Security and Operations (DevSecOps), Zero Trust, Security, Orchestration, Automation and Response (SOAR), Wireless Transport, Assured Identity and 5th Generation Wireless (5G).

Learn More
Tech Collision Event

The Air Force Research Laboratory/Space Vehicles Directorate (AFRL/RV)-sponsored Catalyst Accelerator will host a 3-day pitch event where 32 – 40 startups and small businesses will have the opportunity to present innovative, dual-use, space technologies, ideally with a Technology Readiness Level (TRL) of 4 or higher. Companies will pitch twice—once to a room of Government tech scouts and once to a room of Industry tech scouts. The final day will include technology demonstrations facilitated by Tech Warrior Ops (https://twenterprise.org/tech-warrior-ops) and a poster board session open to the public, where companies of varying TRL capabilities may display their technologies along with the pitching companies.

Learn More
Download the latest version of the Cybersecurity Maturity Model Certification!

You can now request the initial implementation of the Cybersecurity Maturity Model Certification (CMMC) v1.02, which includes several changes to the standard. Also available are the appendices, errata, and the public briefing documents!

Submit your Request at MISI.tech
Our Current Challenge Problems

DreamPort is excited to announce three challenge problems we will focus on over the next several months. The challenge problems can be divided into functional capability (e.g., vulnerability research) and enabling technologies (e.g., machine learning). We are ultimately looking for functional capability, but the underlying solution should integrate one or more of the enabling technologies. The three capability areas include: vulnerability research, signature diversity, and global awareness of malware.

Review them Here

What have we learned from our events?

RPE-001: The Chameleon & The Snake
RPE-001: The Chameleon & The Snake

This RPE specifically targeted malware signature diversity and signature measurement for Microsoft Windows (x86 and amd64) in a simulated operational environment at a realistic pace.

Read what we learned.
RPE-003: The Wolf in Sheep's Clothing
RPE-003: The Wolf in Sheep's Clothing

The Fables of Aesop by Joseph Jacobs published in 1894 includes the tale of the wolf in sheep's clothing. Just as in this tale, DreamPort played the Shepherd trying to spot the wolf in the flock. DreamPort executed an RPE competition where participants designed, implemented or enhanced user activity monitoring (UAM) solutions for detecting live and recent insider threat attacks or unauthorized activities.

Read what we learned.
RPE: The Broken Gear in the Watch 2 Winner: CompSec Direct
Congratulations to CompSec Direct for winning RPE: The Broken Gear in the Watch 2!

We tested participant's abilities to find and mitigate vulnerabilities in open source embedded device firmware such as switches, routers and firewalls and other devices. During the actual event, participants also had to analyze firmware images.

Get to Know Us

Meet the Team

Put a face to a name. Get to know the team so next time you see them, you can say hello.

Say Hello
Request a Meeting

Want to demo your technology, or want to get a demo of some of ours? Let's meet.

Send Request

Our Facility

DreamPort Columbia Location
7000 Columbia Gateway, Suite 150
Columbia, MD 21046
p: + 1 443 626 4450

Columbia Gateway is very close to so many restaurants, hotels and other amenities that it was an easy choice to establish our DreamPort location. Destinations such as Columbia Gateway Retail, Columbia Restaurant Park, Columbia Crossing, Gateway Overlook, Dobbin Road Retail, Snowden Square, Stanford Boulevard Retail and Route 1 Retail are all within a 1.5 mile radius!

Why Columbia Gateway?

Columbia Gateway is near the BWI Airport and has 71 restaurants and 7 hotels in a 1.5 mile radius. You can walk, jog and bike on the nearby bike paths or visit excellent gyms in our building or down the road.