The I3P is a cornerstone of cyber security Research and Development in the United States. We support multiple research projects in areas that are considered critical to national security and lend themselves to a collaborative approach.

ACM Joint Task Force on Cybersecurity Education
The ACM JTF on Cybersecurity Education launched last year with the stated purpose “to develop comprehensive curricular guidance in cybersecurity education that will support future program development and associated educational efforts.” Co-chaired by The I3P’s Executive Director Diana Burley and Executive Committee Member Matt Bishop, the ACM JTF aims to publish their curricular volume, CSEC 2017, in December 2017.

Official Site

Additional Project Summaries
Improving CSIRTS (Computer Security Incident Response Team)
Information Sharing
Usable Security

Our Approach: Science as a Service (SCaaS)
The I3P Science as a Service (SCaaS) model supports a spectrum of research processes to include traditional research to support in-depth, long-term analysis and agile research processes to support on-demand quick looks, incremental analysis, knowledge generation, technology transition and actionable advice.

Our established research infrastructure supports an operational and management structure that provides a single point of contact for stakeholder engagement, accountable management of research operations, and systematic operational processes that are invariant across the research spectrum for positive resource control.

Our researchers engage with each other on a regular basis, in person at team meetings and workshops and via regularly scheduled conference calls. The ability to exchange ideas and support imaginative thinking in a trusted environment is one of the I3P’s unique strengths. In addition, each project focuses on real-world issues and emphasizes outcomes, such as new security tools, best practices, and an improved understanding of the vulnerability landscape. These outcomes are made possible by engaging stakeholders and end-users in the research process and by integrating technology transfer into the project plan.

How Our Projects are Chosen
Before committing to new research initiatives, the I3P undertakes an assessment of the need, level of vulnerability and perceived threat to national security. In addition, the I3P asks three key questions of each prospective research project:

  1. Is the issue a pressing security need that will benefit from a multi-disciplinary and multi-institutional approach?
  2. Does the I3P have the collective expertise to address the identified vulnerabilities and develop effective mitigation strategies?
  3. Will the outcome be of general use to either an economic sector or a specific group of end users?

Please check back soon to see a full overview of the I3P’s current and past research projects or contact us to learn more.