DreamPort is a combination of state-of-the-art facilities, innovative programs, and imaginative people charged with finding that spark that leads to unparalleled capability for USCYBERCOM and the warfighters at large.
Located in Columbia, Maryland, DreamPort was created under a Partnership Intermediary Agreement between MISI and United States Cyber Command (USCYBERCOM).
Notice for all interested parties to DreamPort events: Announcement of DreamPort events that are considered to have high potential for further efforts that may be accomplished via FAR-based contracting instruments, Other Transaction Authority (OTA) for Prototype Projects 10 USC 2371b, Prizes for advanced technology achievements 10 USC 2374a, and/or Prize Competitions 15 USC 3719, may be made at the dreamport.tech website. All announcements made at the dreamport.tech website are considered to satisfy the reasonable effort to obtain competition in accordance with 10 USC 2374a (b), 15 USC 3719 (e) and 10 USC 2371b (b)(2). All FAR based actions will follow announcement procedures per FAR 5.201(b) accordingly.
Why Register for DreamPort?
DreamPort welcomes all, but we'd like to know a little about you. We hold daily, monthly, and quarterly events, some by invitation only. By registering with the DreamPort you will receive our periodic emails about upcoming events, new services and capabilities, and mentoring opportunities. We provide a place where you can upload a resume, abstract or other document that describes who you are, what you are expert at, and how you want to help.
This information can also be about your organization or company. We use the information you provide to learn more about your interests and expertise. For example, are you a cyber subject matter expert that would like to engage in a rapid prototyping event (RPE)? We look forward to having you as a part of the DreamPort Partnership Network.Register Now
ALERT: DHS Issues Shields Up Advisory
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, non-profits, and other organizations, large and small, across multiple sectors of the economy.
Notably, the Russian government has used cyber as a key component of their force projection over the last decade, including previously in Ukraine in the 2015 timeframe. The Russian government understands that disabling or destroying critical infrastructure—including power and communications—can augment pressure on a country's government, military and population and accelerate their acceding to Russian objectives.
While there are not currently any specific credible threats to the U.S. homeland, we are mindful of the potential for the Russian government to consider escalating its destabilizing actions in ways that may impact others outside of Ukraine.
Based on this situation, CISA has been working closely with our critical infrastructure partners over the past several months to ensure awareness of potential threats—part of a paradigm shift from being reactive to being proactive.
CISA recommends all organizations–regardless of size–adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. Read More
Just Announced: USCYBERCOM Cyber Procurement Forum 2022
July 27, 2022 | 0800 – 1700 ET. This event is acquisitions-focused and a follow-on to USCYBERCOM's Industry Day 2022. Cyber Procurement Forum 2022 focuses on the Command's business and acquisitions-related functions. Presentations from Command leadership provide an overview of Cyber PEO programs, Innovation through Acquisitions, and a preview of the Command's newly updated Technical Challenge Problems.Learn More
Call for Speakers at Hack the Railroad!
October 18, 2022. Hack The Railroad is a hybrid cybersecurity event powered by Cylus & MISI, featuring talks from cybersecurity industry leaders and railroad cybersecurity trainings. We want to empower cyber warriors to protect our nation's most critical infrastructure which plays a primary role in the daily lives of people. Proposals for presentations and speakers closes July 18!Learn More
Just Announced: MindScape Tech Tuesdays: Splunk Log Analysis Training
July 26, 2022 | 1100 – 1200 ET. Looking to learn more about Log Analysis? Join this advanced level log analysis training hosted by one of industry's leaders. This training is designed specifically for individuals who have a foundation in log analysis.Learn More (MISI)
DISA TEM: Alset Technologies
July 6, 2022 | 11am-12pm ET. Alset's new tool, Dash, provides near-real time data visualization by parsing and ingesting individual checklist data, ACAS XCCDF and SCAP XCCDF results into a structured query language database where computations and correlations will occur instantly. With one click, multiple checklists can be populated to the Dash backend database, generating an updated and current data summarization. Conference ID: 162 838 996#Join Teams
DISA TEM: Aigo.AI
July 7, 2022 | 11am-12pm ET. Aigo uses Evidence Based Hypothesis modeling and Natural Language Processing to create Hyper-Personalized Conversations for each user. These are developed through an advanced Cognitive Architecture to create an environment of Perceiving, Learning, and Reasoning, along with the ability to generalize to make data-set inquiry possible through natural human language conversations. Conference ID: 564 713 613#Join Teams
DISA TEM: Imperva
July 12, 2022 | 11am-12pm ET. Many organizations don’t actually know where all of their sensitive data is and whether it’s exposed. Imperva Database Security helps organizations reduce noncompliance and breach risk by locating sensitive data and identifying the vulnerabilities that could lead to data compromise. Conference ID: 126 136 884#Join Teams
DISA TEM: WalkMe
July 13, 2022 | 11am-12pm ET. WalkMe’s Digital Adoption Platform (DAP) is a no-code software platform that enables organizations to measure, drive, and act to ultimately maximize the impact of their digital transformation and accelerate the return on their software investment. Conference ID: 114 200 973#Join Teams
MISI DreamPort Speaker Series with author Sounil Yu
July 13, 2022 | 1300-1500. The MISI DreamPort Speaker Series is hosting Sounil Yu, security innovation and author of the Cyber Defense Matrix. Sounil will present his new book that focuses on understanding the complex cybersecurity landscape. The Cyber Defense Matrix discusses the range of capabilities necessary for building, managing ad operating an effective security program. Sounil will be available to sign copies of the book after his speaking session. All sttendees will be provided a copy of the Cyber Defense Matrix. Come enjoy a good book, coffee and do some networking while your at it!Learn More
DISA TEM: Aronetics
July 14, 2022 | 11am-12pm ET. Aronetics LLC is a technology-enabled service provider. We name our technology Thor, which provides a single autonomous and adaptive plural machine learning (ML) meta-network which operates as an analogous and cooperative system that is a segment of a distinct and different dedicated data layer intended for sole analytics of the entered architecture(s) across a various network of nodes. Conference ID: 102 257 388#Join Teams
DISA TEM: LMC Data Corporation/Druva
July 19, 2022 | 1100 - 1200 ET. LMC Data Corporation invites you to consider our FedRamp approved solution for endpoint data protection and resiliency, Druva. Druva is the leader in cloud backup, data protection, and information management. Druva leverages the AWS GovCloud to offer a single pane of glass to protect, preserve and discover information thereby dramatically increasing the availability and visibility of business-critical information, while reducing the risk, cost and complexity of managing and protecting it. Conference ID: 392 107 512#Join Teams
DISA TEM: Swish Data
July 20, 2022 | 1100 - 1200 ET. As part of our Performance Engineering practice, Swish Data provides innovative and cost effective observability solutions in the Federal space for over 14 years. This includes Artificial Intelligence for IT Operations (AIOps), Network Performance Management (NPM), Information Technology Infrastructure Management (ITIM) Application Performance Management (APM), UC Monitoring, Flow Analysis, and Packet Analysis solutions deployed on-premise, private cloud, and public cloud solutions in the Civil Federal and Military segments. Conference ID: 730 658 303#Join Teams
DISA TEM: Edge Technologies
July 21, 2022 | 1100 - 1200 ET. Edge Technologies (Edge) is a software provider that provides a secure COTS solution, edgeCore, that will enable DISA to move at a velocity greater than that required to win in order to accelerate the achievement of its five lines of effort ahead of schedule and dramatically under budget. By using Edge's unique data integration and visualization platform, edgeCore, DISA can securely leverage its data assets and mission systems across domains to provide purpose-built solutions for warfighters and leaders in a fraction of the time of traditional integration efforts, typically within weeks. Conference ID: 633 780 709#Join Teams
Intro to Attacking ICS
July 26, 2022 | 0900 – 1600 ET. Registration is closed. This 1-day course will impart foundational knowledge of common ICS attack methodologies. Topics covered will include basic ICS architecture, ICS protocols (including Modbus), vulnerable architectures and devices, and using python to automatically attack vulnerable situations.Learn More and Register
DISA TEM: RAD
July 26, 2022 | 1100 - 1200 ET. EA Virtualization Operating System is an operating system residing in the vCPE, designed with the requirements of the virtualized environment in mind. The primary functions include hosting VNFs (Virtual Network Functions), managing/monitoring local resources and management functions. RAD’s vCPE-OS provides these functions in an optimized lightweight package. Conference ID: 911 257 873#Join Teams
DISA TEM: PixelWorks
July 27, 2022 | 1100 - 1200 ET. PixelWorks creates visual media that delivers engaging communication, cutting-edge branding, and effective messaging for our customers. PixelWorks also develops web applications that are designed to improve process efficiencies, standardize workflows, and aid in decision-making based on real-time data/information. Conference ID: 808 486 57#Join Teams
DISA TEM: Nucleus Security
July 28, 2022 | 1100 - 1200 ET. Nucleus is a provider of unified vulnerability management tools. Nucleus' multi-tenant tool allows for integration from nearly unlimited asset/inventory tools (think Tenable Qualys, R7, Crowdstrike spotlight, DevSecOps tools, etc.), additionally your various threat/vuln intelligence tools (Mandiant, recorded future etc.) as well as your ticketing system tools (ServiceNow, Jira, etc.). Conference ID: 997 637 720#Join Teams
AWS re:Inforce 2022
July 26-27, 2022. Join us in summer 2022 for two days to reinforce your AWS security posture. Discover how AWS is innovating in the world of cloud security, and then hone your technical skills in expert-led interactive sessions. You'll hear the latest from industry-leading speakers in security, compliance, identity, and privacy and meet fellow security professionals at our fun events.Learn More (External)
Industrial Control Systems Cyber Saturday
August 6, 2022. We invite any and all students in 6th – 12th grade interested in learning about industrial control systems cybersecurity for a fun filled day of hands on exercises and activities on August 6th 2022 at DreamPort in Columbia Maryland! We will introduce students to the critical infrastructure concepts and cybersecurity basics. These combined skills will be used for executing offensive physical scenarios that will result in visible damage or disruption. Students and their parents are invited to participate in the fun! All participants will need to bring a laptop. Breakfast & lunch will be provided! Physical participation only.Learn More (External)
Center of Academic Excellence in Cybersecurity Internship Fall 2022
The National Security Agency (NSA) in partnership with the Maryland Innovation & Security Institute (MISI) and the GBC MISI Academy seek applicants for an 8-week paid internship program designed for college seniors about to enter the technical workforce currently enrolled in an institution designated as a CAE-CD or CAE-CO by the National Security Agency Center of Academic Excellence in Cybersecurity. Dates for the Fall Internship are Sept 19, 2022 – Nov 11, 2022 (Applications Close Aug 12).Learn more and Apply (External)
OT-ISAC Summit 2022
September 7 - 8, 2022 | Singapore | Hybrid Event. Join DreamPort at This global conference on Operational Technology. MISI DreamPort Co-Founder and member of the Board Armando Seay will be part of this year's conference in Singapore. OT-ISAC Annual Summit will be in Hybrid event offering participants to attend in Virtual (online) and Live In person in Singapore. Bringing together OT/IT Experts and Practitioners in a Two-Day focused environment to share best practices and lessons learned that foster stakeholders to adapt and achieve mutual defence in protecting critical assets.Learn More (External)
2022 GRF Summit on Security & Third-Party Risk
October 27-28, 2022. Networking and Education on Critical Third-Party and Supply Chain Security Issues, for Mutual Resilience Against Cyber and Geopolitical Threats. Sessions will cover risk and vendor management, cybersecurity, intelligence sharing, geopolitical threat mitigation, and emerging compliance/regulation.Learn More (External)
Cyber Security for Manufacturing Summit
November 2-3, 2022. This event will bring together 100's of IT & OT security leaders from across the American manufacturing industry, for 2-days of strategy planning, insight building and expert knowledge exchange.Learn More (External)
Notices & Opportunities
Technical Exchange Meetings (TEMs)
The Technical Exchange Meeting (TEM) is a weekly event established and hosted by the Defense Information Systems Agency (DISA) Emerging Technology (EM) Directorate and DOD Office of the Chief Information Officer (DOD CIO) as a means to collaborate with commercial entities, non-profit organizations, and academia. TEMs offer a platform for organizations to present technological advancements and innovations.Learn More
Our Current Challenge Problems
DreamPort is excited to announce three challenge problems we will focus on over the next several months. The challenge problems can be divided into functional capability (e.g., vulnerability research) and enabling technologies (e.g., machine learning). We are ultimately looking for functional capability, but the underlying solution should integrate one or more of the enabling technologies. The three capability areas include: vulnerability research, signature diversity, and global awareness of malware.Review them Here
Download the latest version of the Cybersecurity Maturity Model Certification!
You can now request the initial implementation of the Cybersecurity Maturity Model Certification (CMMC) v1.02, which includes several changes to the standard. Also available are the appendices, errata, and the public briefing documents!Submit your Request at MISI.tech
What is a Rapid Prototyping Event (RPE)
Similar to a hackathon, a rapid prototyping event is a gathering of subject matter experts committed to looking for new ways to solve a particular challenge. The subject matter experts can work alone, in teams, or as one collective group and are encouraged to now allow previous failures, standards, processes, and other impediment get in the way of breakthrough solutions and ideas. They are encouraged to identify and take risks that yield unexpected success. Unlike a hackathon, RPEs aren't limited to software challenges. The goal of an RPE is to create a useable prototype. These prototypes can be software code snippets, modified Internet of Things devices, plastics created in a 3D printer, or interesting robotic solutions to solve a problem to name a few. Read more and view all current and past RPEs here.
What have we learned from our RPE events?
RPE-001: The Chameleon & The Snake
This RPE specifically targeted malware signature diversity and signature measurement for Microsoft Windows (x86 and amd64) in a simulated operational environment at a realistic pace.Read what we learned.
RPE-003: The Wolf in Sheep's Clothing
The Fables of Aesop by Joseph Jacobs published in 1894 includes the tale of the wolf in sheep's clothing. Just as in this tale, DreamPort played the Shepherd trying to spot the wolf in the flock. DreamPort executed an RPE competition where participants designed, implemented or enhanced user activity monitoring (UAM) solutions for detecting live and recent insider threat attacks or unauthorized activities.Read what we learned.
Congratulations to CompSec Direct for winning RPE: The Broken Gear in the Watch 2!
We tested participant's abilities to find and mitigate vulnerabilities in open source embedded device firmware such as switches, routers and firewalls and other devices. During the actual event, participants also had to analyze firmware images.
Congratulations to Technica Corp for winning RPE-014: Rossum's Universal Robots!
This event was open to all colleges, universities, individuals and non-traditional participants who have experience in machine learning applications to network packet capture (PCAP) for automated anomalous behavior identification.
Congratulations to Seth Sites for winning RPE-015: Sage and Sentry!
In this event we defined a fictitious threat actor named DreadRiver (adversary) who has been reportedly attacking other cities, and our DreamValley would prefer to refine its defenses. In this event we are studying solutions (software and techniques) for performing analytics against cyber threat information.
Congratulations to Panther Labs for winning RPE-016: The Gremlins in the Cloud!
We hunted gremlins in the cloud. BCR Industries survived 4 days of coordinated hacking in November of 2020, and they are back in business.
Technica Corporation completed RPE-017 as a top finisher utilizing their Graph Hunt Solution!
This event is open to students at all colleges, universities, professionals, and non-traditional participants who have experience in machine learning applications to network packet capture (PCAP) for automated anomalous behavior identification on a network that includes control systems.
DreamPort Columbia Location
7000 Columbia Gateway, Suite 150
Columbia, MD 21046
p: + 1 443 626 4450
Columbia Gateway is very close to so many restaurants, hotels and other amenities that it was an easy choice to establish our DreamPort location. Destinations such as Columbia Gateway Retail, Columbia Restaurant Park, Columbia Crossing, Gateway Overlook, Dobbin Road Retail, Snowden Square, Stanford Boulevard Retail and Route 1 Retail are all within a 1.5 mile radius!
Why Columbia Gateway?
Columbia Gateway is near the BWI Airport and has 71 restaurants and 7 hotels in a 1.5 mile radius. You can walk, jog and bike on the nearby bike paths or visit excellent gyms in our building or down the road.