SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com
TechMATCH solves submission, screening and selection issues
Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com
Background
The American Security Challenge is a program that…
- Pulses the market for innovative technology that addresses the requirements of its
customers
- Collects and evaluates data collected from potential problem solving technology
providers (sellers)
- Reviews the higher scoring submissions and identifies those that most closely
match the requirements of the customer (buyers)
- Coordinates evaluations by the customers of the most viable candidates
- Facilitates new relationships between entrepreneurs, investors, customers, channel
partners, advisors, service providers and other valuable stakeholders
What is ASC?
ASC’s mission is to accelerate the deployment of valuable innovative technology into the
public and private sector to better safeguard the nation’s citizens, assets and economy.
“It’s the intersection of the
entrepreneur, the investment
community and the ultimate user, and
at the end of the day it is the American
Security Challenge helping America
with this program so I thank you.”
Governor Tom Ridge, first Secretary of the
Department of Homeland Security
Background- DHS S&T
Innovation is critical to national security including economic stability and
prosperity…..
….. a major challenge has been wading through the avalanche of
innovations that all proclaim value to separate the pretenders
from the contenders.
Current and past ASC Stakeholders
Stakeholders include members of the Defense and Intelligence Community as well as Private Sector
Critical Infrastructure owners
• Management, analysis & visualization of large data sets collecting terabytes per hour
• Protection of consumer credentials and sensitive account information on contaminated devices
• Wireless security including handheld devices, unmanned vehicles, satellite, towers, and other
• Large scale data management, fusion and analysis of multi-lingual, multi-source, multi-format,
structured and unstructured data
What is a Security Technology?
Samples of customer requirements in Cyber, C4ISR, Physical and
Energy technologies. For full list see website
http://www.americansecuritychallenge.com/challenge/technologies.php
• Scavenging energy technologies
• Security authentication for IP networks
• Offensive and defensive network security
• Network detection and obfuscation techniques
• In-band interference cancellation techniques
• Water purification
• Building energy conservation technologies
• Stationary and mobile power supplies and
storage
• High volume data analysis and visualization
tools
• Access controls
• Asset tracking
• Biometric technologies that accurately
determine identity at a distance
• Batteries and power sources of long duration
• Vehicle and vehicle fuel efficiency
technologies
Tech scouting cycle
Shopping List
•Cloud Security
•Malware Detection
•Identity Mngmt
•Renewable Energy
•Hi-Speed Comp
•Data Leakage
•Network Security 2- ASC Outreach
3- ASC Screening w
100+ experts
4-Customer
Testing and/or
Due Diligence
1- Customer
Requirements
5-Customer
Transaction
Media
Embassies
Incubators
VC’s University Labs
Fed Labs
ESQ’s
Angels
CPA’s
CVC’s
Federal Labs
Tech Buyer (Customer)
Solve problems faster
ASC can broadcast requirements to a large
community quickly
Extend reach
Requirements gain exposure in technology
communities not previously reached
Choices screened
ASC screens through and provides feedback and
short list of most viable qualified options
More confident decisions
Comfort in knowledge that extensive scouting
produced broad base of alternatives which were
screened against requirements
Broader alternatives
Buyers enjoy a greater number of choices as well as
alternatives from different sectors (ie a gaming tech
applied to simulations/training or a social networking
algorithm applied to intelligent pattern recognition,
etc)
Tech Seller (Innovator)
Expand customer base
Expand sales pipeline and participate in sales
opportunities with new prospects
Qualified opportunities
Customers have current need with approved budget
and contract vehicle
Increase revenue
Expand sales pipeline and participate in sales
opportunities with new prospects
Investor exposure
Qualified investors are seeking companies with
customer traction. Pilots generate revenue as well as
increase investor interest
Added to invitation list
Sept 23 event is invitation only but top 100
Challengers are automatically added to invite list.
event will be high level relationship development
between C-level tech owners and vendor facing
CIO/CTO/CSO customers
Benefits to Buyers and Sellers
What kinds of companies does ASC find?
What does this mean? This profile tells us the following:
 That ASC enjoys a broad reach into many technology communities across the country and around the world.
 That most of the Challengers are small but growing companies seeking new contracting and investment
opportunities for their deployable and near-term deployable technologies.
 That startup and more mature innovative tech companies benefit as a Challenger.
• 21 different U.S. States, 5
countries
• Average 2.2M sales
• (startup to $62M)
• 56% received grant funding
• $200,000 to $45,000,000
• median of $2,000,000
• Employee range from 1 to 130
with median of 10
• Technologies
• 34% Cyber
• 25% C4ISR
• 26% Physical
• 14% Energy
• 79% had no security
clearances
• Two-thirds raised equity
capital
• $150,000 to
$62,000,000
• Median of
$5,200,000
• 89% had no previous Dept.
of Defense or IC sales
• 56% received grant funding
with $2M average
• ($200K to $45M)
• Technology Readiness
Levels
• 56% TRL 9
• 16% TRL 8
• 13% TRL 7
Profile of top 60 companies from recent search
What they say about ASC
“The INSA American Security Challenge is an incredibly efficient and effective way to connect the technology innovators with the
public and private sector organizations who leverage the new technology while performing their respective missions of the most
crucial work in intelligence and national security.”
Ellen McCarthy, President of INSA, an ASC Licensee
“We are very pleased with Raytheon’s outcomes. We ended up actively pursuing relationships with seven companies. That’s a
phenomenal win for us…and really pays tribute to the veracity of the American Security Challenge.”
Mentor Protégé Award Partner- Terry Downing, Raytheon Manager of Special Projects
“This is useful for ArcSight to explore all these new technologies. We picked up a large number of pilots…and will have our product
folks get involved to talk about the value to our customers. We are very excited; it is a valuable experience for the whole company.”
Pilot Award Partner- Prescott Winter, Public Sector Chief Technology Officer (CTO), formerly CTO of
the National Security Agency until recently moving to ArcSight
“The ASC infrastructure to ingest company data, accept expertise information from the reviewers, manage the scoring process as
well as the database to manage the aggregated scored company information is outstanding. I’ve been involved in evaluating
technologies for decades and the ASC program has mastered the art of efficiently scoring technology and managing the resulting
database as well, perhaps better than any evaluation management system I’ve been a party to.”
Reviewer- Bob Flores, former CTO of CIA
President of Applicology, an advisory firm in the National Security sector
“The process was streamlines and we are thrilled with the qualified sales and investor prospects that resulted from the Challenge.
We have a great product and this (ASC) exponentially increases our exposure to valuable transaction candidates.”
Challenge Award Winner- Jeffrey Chapman, CEO of AginCourt
“It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the
American Security Challenge helping America with this program so I thank you.”
Governor Tom Ridge former Department of Homeland Security
Secretary
• Brand affiliation with America’s fastest
growing program accelerating the visibility
and adoption of valuable technology within
public and private security infrastructure
• Identify emerging technologies and
potential relationships with current and past
Innovators
Benefits to Clients
• Exclusive access to the database of Innovators
• Establish/improve relationships with the public
and private national security community
• Identify technologies for possible licensing or
investment
Target Rich Community
ASC separates pretenders from contenders

Contenu connexe

En vedette

Government Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National SecurityGovernment Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National SecurityAmerican Security Challenge
 
Martins Thoughts And Insights On Simplicity Complexity And Control
Martins Thoughts And Insights On Simplicity   Complexity And ControlMartins Thoughts And Insights On Simplicity   Complexity And Control
Martins Thoughts And Insights On Simplicity Complexity And ControlMartin van Vuure
 
Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15American Security Challenge
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

En vedette (6)

Government Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National SecurityGovernment Venture Capitalist? The Neglected Component Of National Security
Government Venture Capitalist? The Neglected Component Of National Security
 
Seeking angel capital dos and donts
Seeking angel capital  dos and dontsSeeking angel capital  dos and donts
Seeking angel capital dos and donts
 
Martins Thoughts And Insights On Simplicity Complexity And Control
Martins Thoughts And Insights On Simplicity   Complexity And ControlMartins Thoughts And Insights On Simplicity   Complexity And Control
Martins Thoughts And Insights On Simplicity Complexity And Control
 
Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15Seeking Angel Investors dos and don'ts - 12-045-15
Seeking Angel Investors dos and don'ts - 12-045-15
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à ASC connects buyers and sellers of national security technology

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)Muneesh Batra
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)Muneesh Batra
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...DheerajPawar4
 
Secure web gateway market report by marketsand markets
Secure web gateway market report by marketsand marketsSecure web gateway market report by marketsand markets
Secure web gateway market report by marketsand marketsDheerajPawar4
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryKen Fuller
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...DheerajPawar4
 
Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center Keith Krach
 
Sharpening risktechs cutting edge
Sharpening risktechs cutting edge Sharpening risktechs cutting edge
Sharpening risktechs cutting edge Leandro Vitor
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementDr Mark Lovatt
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Amazon Web Services Korea
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024DheerajPawar4
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 

Similaire à ASC connects buyers and sellers of national security technology (20)

SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...
 
Secure web gateway market report by marketsand markets
Secure web gateway market report by marketsand marketsSecure web gateway market report by marketsand markets
Secure web gateway market report by marketsand markets
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...Deep packet inspection and processing market vendors by size, share & gro...
Deep packet inspection and processing market vendors by size, share & gro...
 
Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center Purdue Tech Diplomacy Center
Purdue Tech Diplomacy Center
 
Sharpening risktechs cutting edge
Sharpening risktechs cutting edge Sharpening risktechs cutting edge
Sharpening risktechs cutting edge
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
 
Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024Endpoint security market is expected to grow $18.4 billion by 2024
Endpoint security market is expected to grow $18.4 billion by 2024
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

Dernier

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

ASC connects buyers and sellers of national security technology

  • 1. Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com TechMATCH solves submission, screening and selection issues
  • 2. Roger London 410-340-5335or Roger@AmericanSecurityChallenge.com Background
  • 3. The American Security Challenge is a program that… - Pulses the market for innovative technology that addresses the requirements of its customers - Collects and evaluates data collected from potential problem solving technology providers (sellers) - Reviews the higher scoring submissions and identifies those that most closely match the requirements of the customer (buyers) - Coordinates evaluations by the customers of the most viable candidates - Facilitates new relationships between entrepreneurs, investors, customers, channel partners, advisors, service providers and other valuable stakeholders What is ASC? ASC’s mission is to accelerate the deployment of valuable innovative technology into the public and private sector to better safeguard the nation’s citizens, assets and economy.
  • 4. “It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the American Security Challenge helping America with this program so I thank you.” Governor Tom Ridge, first Secretary of the Department of Homeland Security Background- DHS S&T Innovation is critical to national security including economic stability and prosperity….. ….. a major challenge has been wading through the avalanche of innovations that all proclaim value to separate the pretenders from the contenders.
  • 5. Current and past ASC Stakeholders Stakeholders include members of the Defense and Intelligence Community as well as Private Sector Critical Infrastructure owners
  • 6. • Management, analysis & visualization of large data sets collecting terabytes per hour • Protection of consumer credentials and sensitive account information on contaminated devices • Wireless security including handheld devices, unmanned vehicles, satellite, towers, and other • Large scale data management, fusion and analysis of multi-lingual, multi-source, multi-format, structured and unstructured data What is a Security Technology? Samples of customer requirements in Cyber, C4ISR, Physical and Energy technologies. For full list see website http://www.americansecuritychallenge.com/challenge/technologies.php • Scavenging energy technologies • Security authentication for IP networks • Offensive and defensive network security • Network detection and obfuscation techniques • In-band interference cancellation techniques • Water purification • Building energy conservation technologies • Stationary and mobile power supplies and storage • High volume data analysis and visualization tools • Access controls • Asset tracking • Biometric technologies that accurately determine identity at a distance • Batteries and power sources of long duration • Vehicle and vehicle fuel efficiency technologies
  • 7. Tech scouting cycle Shopping List •Cloud Security •Malware Detection •Identity Mngmt •Renewable Energy •Hi-Speed Comp •Data Leakage •Network Security 2- ASC Outreach 3- ASC Screening w 100+ experts 4-Customer Testing and/or Due Diligence 1- Customer Requirements 5-Customer Transaction Media Embassies Incubators VC’s University Labs Fed Labs ESQ’s Angels CPA’s CVC’s Federal Labs
  • 8. Tech Buyer (Customer) Solve problems faster ASC can broadcast requirements to a large community quickly Extend reach Requirements gain exposure in technology communities not previously reached Choices screened ASC screens through and provides feedback and short list of most viable qualified options More confident decisions Comfort in knowledge that extensive scouting produced broad base of alternatives which were screened against requirements Broader alternatives Buyers enjoy a greater number of choices as well as alternatives from different sectors (ie a gaming tech applied to simulations/training or a social networking algorithm applied to intelligent pattern recognition, etc) Tech Seller (Innovator) Expand customer base Expand sales pipeline and participate in sales opportunities with new prospects Qualified opportunities Customers have current need with approved budget and contract vehicle Increase revenue Expand sales pipeline and participate in sales opportunities with new prospects Investor exposure Qualified investors are seeking companies with customer traction. Pilots generate revenue as well as increase investor interest Added to invitation list Sept 23 event is invitation only but top 100 Challengers are automatically added to invite list. event will be high level relationship development between C-level tech owners and vendor facing CIO/CTO/CSO customers Benefits to Buyers and Sellers
  • 9. What kinds of companies does ASC find? What does this mean? This profile tells us the following:  That ASC enjoys a broad reach into many technology communities across the country and around the world.  That most of the Challengers are small but growing companies seeking new contracting and investment opportunities for their deployable and near-term deployable technologies.  That startup and more mature innovative tech companies benefit as a Challenger. • 21 different U.S. States, 5 countries • Average 2.2M sales • (startup to $62M) • 56% received grant funding • $200,000 to $45,000,000 • median of $2,000,000 • Employee range from 1 to 130 with median of 10 • Technologies • 34% Cyber • 25% C4ISR • 26% Physical • 14% Energy • 79% had no security clearances • Two-thirds raised equity capital • $150,000 to $62,000,000 • Median of $5,200,000 • 89% had no previous Dept. of Defense or IC sales • 56% received grant funding with $2M average • ($200K to $45M) • Technology Readiness Levels • 56% TRL 9 • 16% TRL 8 • 13% TRL 7 Profile of top 60 companies from recent search
  • 10. What they say about ASC “The INSA American Security Challenge is an incredibly efficient and effective way to connect the technology innovators with the public and private sector organizations who leverage the new technology while performing their respective missions of the most crucial work in intelligence and national security.” Ellen McCarthy, President of INSA, an ASC Licensee “We are very pleased with Raytheon’s outcomes. We ended up actively pursuing relationships with seven companies. That’s a phenomenal win for us…and really pays tribute to the veracity of the American Security Challenge.” Mentor Protégé Award Partner- Terry Downing, Raytheon Manager of Special Projects “This is useful for ArcSight to explore all these new technologies. We picked up a large number of pilots…and will have our product folks get involved to talk about the value to our customers. We are very excited; it is a valuable experience for the whole company.” Pilot Award Partner- Prescott Winter, Public Sector Chief Technology Officer (CTO), formerly CTO of the National Security Agency until recently moving to ArcSight “The ASC infrastructure to ingest company data, accept expertise information from the reviewers, manage the scoring process as well as the database to manage the aggregated scored company information is outstanding. I’ve been involved in evaluating technologies for decades and the ASC program has mastered the art of efficiently scoring technology and managing the resulting database as well, perhaps better than any evaluation management system I’ve been a party to.” Reviewer- Bob Flores, former CTO of CIA President of Applicology, an advisory firm in the National Security sector “The process was streamlines and we are thrilled with the qualified sales and investor prospects that resulted from the Challenge. We have a great product and this (ASC) exponentially increases our exposure to valuable transaction candidates.” Challenge Award Winner- Jeffrey Chapman, CEO of AginCourt “It’s the intersection of the entrepreneur, the investment community and the ultimate user, and at the end of the day it is the American Security Challenge helping America with this program so I thank you.” Governor Tom Ridge former Department of Homeland Security Secretary
  • 11. • Brand affiliation with America’s fastest growing program accelerating the visibility and adoption of valuable technology within public and private security infrastructure • Identify emerging technologies and potential relationships with current and past Innovators Benefits to Clients • Exclusive access to the database of Innovators • Establish/improve relationships with the public and private national security community • Identify technologies for possible licensing or investment
  • 13. ASC separates pretenders from contenders