The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2013 vol.11)
pp: 14-23
Douglas Maughan , US Department of Homeland Security
David Balenson , SRI International
Ulf Lindqvist , SRI International
Zachary Tudor , SRI International
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cybersecurity research community's biggest ongoing challenges is transitioning technology into commercial or open source products available in the marketplace. This article presents an R&D execution model to increase the success rate of technology transition along with several examples of successful technology transition from the US Department of Homeland Security Science and Technology Directorate's cybersecurity R&D program.
Computer crime, Technological innovation, Technology transfer, Commercialization, Marketing and sales, Computer security, small business, technology transition, cybersecurity, research and development, open source
Douglas Maughan, David Balenson, Ulf Lindqvist, Zachary Tudor, "Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice", IEEE Security & Privacy, vol.11, no. 2, pp. 14-23, March-April 2013, doi:10.1109/MSP.2013.31
1. W.D. Maughan, "Crossing the 'Valley of Death': Transitioning Research into Commercial Products: A Personal Perspective," 2010 IEEE Symp. Security and Privacy, IEEE CS, 2010, pp. 21–26;
2. "Unlocking Our Future: Toward a New National Science Policy," Committee Print 105–B, Committee on Science, US House of Representatives, 105th Congress, Sept. 1998; content-detail.html.
3. L.M. Branscomb and P.E. Auerswald, "Between Invention and Innovation an Analysis of Funding for Early-Stage Technology Development," Nat'l Inst. Standards and Technology, NIST GCR 02–841, Nov. 2002;
4. Committee on Accelerating Technology Transition, Nat'l Research Council, Accelerating Technology Transition: Bridging the Valley of Death for Materials and Processes in Defense Systems, Nat'l Academy of Sciences, 2004;
5. Department of Defense Report to Congress on Technology Transition, Deputy Under Secretary of Defense (Advanced Systems and Concepts), Dept. Defense, July 2007;
6. Clearer Priorities and Greater Use of Innovative Approaches Could Increase the Effectiveness of Technology Transfer at Department of Energy Laboratories, GAO Report to Congressional Committees, GAO-09-548, June 2009;
7. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, Executive Office of the President, Nat'l Science and Technology Council, Dec. 2011; ostpfed_cybersecurity_rd_strategic_plan_2011.pdf.
8. A Roadmap for Cybersecurity Research, Dept. Homeland Security, Nov. 2009;
9. Research Agenda for the Banking and Finance Sector, Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security, Research and Development Committee, Sept. 2008;
10. Roadmap to Achieve Energy Delivery Systems Cybersecurity, Energy Sector Control Systems Working Group, Sept. 2011;
11. C.R. Carlson and W.W. Wilmot, Innovation: The Five Disciplines for Creating What Customers Want, Crown Business, 2006.
12. Cyber Security Research and Development Broad Agency Agreement (BAA), BAA 11-02, Amendment 014, US Dept. Homeland Security, 30 June 2011;
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool