This page has moved to the Defense Innovation Unit
You are being redirected to DIU.mil
This page has moved to the Defense Innovation Unit
You are being redirected to DIU.mil
We use cookies for analytics, to see our policy, please read our Privacy Policy.
The National Security Innovation Network (NSIN), in partnership with Department of Defense University Consortium for Cybersecurity (UC2), is executing a prize challenge focused on advancing cybersecurity capabilities through innovative research initiatives. This event aims to identify individuals or teams, capable of developing cutting-edge solutions to address critical cyber threats and challenges faced by the DoD.
A team of subject matter experts (SMEs) will evaluate applicants and select up to the top 15 students/teams (5 from each problem area) as finalists for participation in the virtual Pitch Day in July 2024. A total of $1 million in awards will be distributed among the top performers.
The challenge consists of three separate problem areas, each requiring distinct solutions that include both technical and partner engagement elements. Participants may submit proposals to address one problem statement per submission. Below is a breakdown of the problem areas and associated funding:
1) Modeling and Predictive Analytics (Total funding: $350,000)
Description: Modeling may capture physical, virtual, or behavioral-based observations, and may be rule-based, mathematical, statistical, or physical. Modeling spans both host-based and network-based problems. Modeling can help analysts, operators, planners, and other decision-makers understand the effects of information and cyber activities through technical, social, cultural, and behavioral science. This is about models and the skills to use them.
Methods of ascertaining the intent of the messaging, methods of transmission and amplification, and clustering of messaging to identify priorities and objectives of great power nations, to include considerations of language culture, and ethical implications.
Methods for understanding, modeling, and predicting activities in the information environment, such as malign influence campaigns, both in terms of public sentiment and information consumption (e.g., trending topics), adversarial attempts to steer that sentiment, and their ability to succeed.
2) Persona and Influence (Total funding: $325,000)
Description: Many problems in cyberspace depend on persona and identity intelligence. User authentication and behavior-based attribution falls in this category, as do the counterpart offensive activities of spoofing, credential misuse, and identity fabrication.
Understand how adversaries use masquerading techniques and on-line personas, and how these techniques avoid identification and detection. Recognize and attribute malign use of false personas and messaging, recognizing flaws in development and employment of these entities.
New workforce programs and skills to identify, understand, operate, and assess identify fabrication within networks, including foreign information activity in cyberspace, which emphasizes language, culture, and ethical implications skills.
3) Data and Permeability (Total funding: $325,000)
Description: Proposals should address the tradeoff between protecting classified sources and methods and leveraging external knowledge, data, and situational awareness of uncleared partners. Cross-domain challenge problems cover the agility and speed-to-market of advanced cyber solutions, or the lack thereof, due to classification, shareability, or equity concerns, and the infrastructure and security practices that hinder fluidity across the various boundaries. This is all about data, if you can get it.
Create synthetic threats, users, and network activity in a customizable and re-playable manner, which can measure and record DCO operator performance and skill level, and increase complexity of the simulated threats based on user setting or on the measured operator’s skill level.
Simulate high-fidelity real-world networks to collect and anonymize real-world network and host data for re-use in a simulated environment.
Develop policy and/or strategy for data sharing for cybersecurity research to address the legal challenges and authorities.
Participants are encouraged to submit proposals aligned with their expertise and capabilities, focusing on a single problem area per submission.
May 20, 2024: Solicitation Release - IdeaScale, challenge.gov, NSIN website, sam.gov
May 31, 2024: “Ask Me Anything” Session #1
June 12, 2024: “Ask Me Anything” Session #2
June 21, 2024: Solicitation Closes & Down-selection Begins
July 2, 2024: Down-selection Ends & Finalists Announced
July 12, 2024: Pitch Rehearsal
July 15, 2024: Virtual Pitch Event
July 22, 2024: Winner Announced
Participants must submit solutions for the Cyber Innovators Challenge via the Ideascale link below.
Applications will be judged on four major criteria:
Clarity and Relevance: Clear communication of ideas and alignment with the specified problem statement.
Format and Organization: Well-structured layout, adherence to formatting guidelines, and easy-to-follow organization.
Supporting Evidence: Use of relevant data, references, and examples and justification of proposed solution.
Overall Quality: Effectiveness and impact of the white paper, as well as the strength of the proposed solution and its potential impact.
Pitches will be judged on four major criteria:
Technical: Soundness, technical merit, innovation of proposed approach, and feasibility of the proposed solution.
Team: Qualifications of proposed principals, support staff, and consultants.
Quality of Pitch: Proposer presents a clear and concise overview of its team and technology, demonstrates how its technology solves one or more of the defined problem areas, and effectively answers questions from strategic advisors.
Operational Effectiveness: Proposed solution aligns with listed capabilities.
Topic Area 1: Modeling and Predictive Analytics
1) Modeling Capabilities:
2) Analysis and Interpretation:
3) Application and Integration:
Topic Area 2: Persona and Influence
1) Identity Intelligence:
2) Behavioral Analysis:
Topic Area 3: Data and Permeability
1) Data Management:
2) Integration and Interoperability:
3) Security and Compliance:
End-User: U.S. Department of Defense
Deliverables:
1. Partner Engagement Submission Requirement: All proposals submitted for consideration must complete a dedicated section addressing the Partner Engagement within the submission form. This section should focus on measuring research partnerships for cybersecurity research, in accordance with the National Defense Authorization Act 2020. Specifically, proposals should address communication, collaboration, and access between the Department of Defense (DoD) and academic institutions.
a. Evaluation Process: Proposals will be evaluated based on their ability to address partnership engagement plans aimed at resolving communication, collaboration, and access challenges faced by academic institutions and DoD partners. Key interests include research findings applicable to day-to-day operations, knowledge transfer for future research, partner engagement plans to ensure the DoD workforce remains updated, and anticipation of adversary advances. Also, feasibility for knowledge sharing within busy schedules, across disciplines, clearance restrictions and other barriers. Engagement can be as much of a challenge as invention. Creativity about communication with the end-user to ensure your ideas translate.
b. Creativity and Innovation: Proposals should demonstrate creativity in overcoming challenges related to communication, collaboration, and access. The evaluation will assess how well proposals address these integral elements of innovation to ensure effective knowledge sharing between innovators and end-users.
2. Technical White Paper Proposal: Required for problem areas 1-3. Participants will submit a detailed technical proposal outlining their approach to addressing the problem statement and partner engagement plan. This proposal should include:
a. Overview of the proposed solution, including key concepts and methodologies.
b. Description of the technical architecture and components of the proposed solution.
c. Explanation of how the proposed solution addresses the specific challenges outlined in the problem statement.
d. Technical diagrams, models, or prototypes to illustrate the proposed solution.
e. Discussion of potential challenges and risks, along with mitigation strategies.
f. Timeline for implementation and milestones for project completion.
g. Partner engagement plan, describing their communication, collaboration, and access ideas to share their research with a DoD partner.
3. Pitch Deck: In addition to the technical proposal, participants are required to prepare and submit a pitch deck for presentation during the pitch event. The pitch deck should provide a concise overview of the proposed solution, focusing on key highlights and benefits. It should include:
a. Introduction to the team and their expertise.
b. Problem statement and solution overview.
c. Key features and functionalities of the proposed solution.
d. Unique selling points and competitive advantages.
e. Potential applications and impact of the solution.
f. Any relevant demonstrations or proof of concept.
g. Partner engagement plan, describing their communication, collaboration, and access ideas to share their research with a DoD partner.
While the overall structure of the deliverables may be similar across all problem areas, participants should tailor their submissions to address the specific requirements and objectives outlined in each problem statement. Additionally, participants should ensure that their submissions align with the evaluation criteria and judging criteria specified in the solicitation document.
Participants are required to submit a 5-page white paper detailing their technology capabilities and addressing the specified features:
Teams will submit a pitch deck outlining their technology capabilities that addresses the required and desired features above. Pitch decks should meet the following format requirements:
About National Security Innovation Network
NSIN is a program office in the U.S. Department of Defense (DoD), nested within the Defense Innovation Unit (DIU). We are set up to collaborate with a wide variety of innovators to include universities, researchers, students, entrepreneurs and start-ups. We create opportunities for collaboration across communities and connect those that might not traditionally work in national security. Together, we help drive national security innovation and develop technologies that directly support the individuals responsible for protecting our country.
For more information or interview requests with Team NSIN, please contact us at media@nsin.mil.
About University Consortium for Cybersecurity
UC2 The Department of Defense University Consortium for Cybersecurity provides the Secretary of Defense a formal channel of communication with academic institutions regarding the DoD’s cybersecurity strategic plans, requirements, and priorities for research. UC2 facilitates access for academic institutions to respond with their ideas to DoD stakeholders, promoting collaboration, and research through partnership. We believe scientific innovation must be integrated with workforce development through education. This approach equally ensures that we are ready and learning, set to benefit immediately from new advances across disciplines, and better prepared for change on the horizon. We are committed to stewarding work on ethical research implications between DoD stakeholders and academic institutions to inform and enable innovation. Our work aligns with the National Cybersecurity Strategy Pillar Four, the DoD Responsible Artificial Intelligence Strategy and Implementation Pathway, and consistently promotes the goals of equity and inclusion for research and education expressed in the White House STEMM initiative.
Your browser is old and unsupported. You may still use the site, but functionality will be limited and you may see errors. Please consider updating your browser.
-->