Initiatives

I3P initiatives include a range of activities designed to engage I3P researchers with leaders from industry and government in rich dialogue toward the development of solutions to protect critical information infrastructure.

Research

The I3P is a cornerstone of cyber security Research and Development in the United States. We support multiple research projects in areas that are considered critical to national security and lend themselves to a collaborative approach.

ACM Joint Task Force on Cybersecurity Education

The ACM JTF on Cybersecurity Education launched last year with the stated purpose “to develop comprehensive curricular guidance in cybersecurity education that will support future program development and associated educational efforts.” Co-chaired by The I3P’s Executive Director Diana Burley and Executive Committee Member Matt Bishop, the ACM JTF aims to publish their curricular volume, CSEC 2017, in December 2017.
Official Site

Additional Project Summaries

Our Approach: Science as a Service (SCaaS)

The I3P Science as a Service (SCaaS) model supports a spectrum of research processes to include traditional research to support in-depth, long-term analysis and agile research processes to support on-demand quick looks, incremental analysis, knowledge generation, technology transition and actionable advice.

Our established research infrastructure supports an operational and management structure that provides a single point of contact for stakeholder engagement, accountable management of research operations, and systematic operational processes that are invariant across the research spectrum for positive resource control.

Our researchers engage with each other on a regular basis, in person at team meetings and workshops and via regularly scheduled conference calls. The ability to exchange ideas and support imaginative thinking in a trusted environment is one of the I3P’s unique strengths. In addition, each project focuses on real-world issues and emphasizes outcomes, such as new security tools, best practices, and an improved understanding of the vulnerability landscape. These outcomes are made possible by engaging stakeholders and end-users in the research process and by integrating technology transfer into the project plan.

How Our Projects are Chosen

Before committing to new research initiatives, the I3P undertakes an assessment of the need, level of vulnerability and perceived threat to national security. In addition, the I3P asks three key questions of each prospective research project:

  1. Is the issue a pressing security need that will benefit from a multi-disciplinary and multi-institutional approach?
  2. Does the I3P have the collective expertise to address the identified vulnerabilities and develop effective mitigation strategies?
  3. Will the outcome be of general use to either an economic sector or a specific group of end users?

Please check back soon to see a full overview of the I3P’s current and past research projects or contact us to learn more.

Programs

Workshops and Symposia

The I3P holds frequent meetings to share research findings and to discuss new research directions with stakeholders and the broader community. I3P workshops showcase research results and demonstrate new tools and technologies generated by the I3P’s research initiatives. The events also provide a venue for leading experts from the industry, government and research communities to share perspectives, discuss pressing challenges, inform policy and support collaborative movement toward solutions. The I3P jointly sponsor workshops and conferences.

Postdoctoral Fellowship Program

From 2004 to 2011, the I3P sponsored a postdoctoral research fellowship program, with annual awards granted according to the merit of the proposed work, the extent to which the proposed work explores creative and original concepts, and the potential impact of the topic on the U.S. information infrastructure. The program offered an unparalleled opportunity to conduct research at an I3P member institution, while helping build a nationwide cadre of cyber security experts. More information on the research projects undertaken can be found on the Postdoctoral Fellows page.

Executive Briefings

I3P researchers conduct executive briefings with senior government officials, private sector leaders, legislators and their staff. These high-level overviews of synthesized research results provide stakeholders with actionable intelligence to support the immediate application of research to policy and practice.