Technology Transfer to Practice in Cyber Security Workshop€¦ · IN CYBER SECURITY WORKSHOP. SRI...
Transcript of Technology Transfer to Practice in Cyber Security Workshop€¦ · IN CYBER SECURITY WORKSHOP. SRI...
Tom Benthin Graphic Facilitator
tombenthin.com
TECHNOLOGY TRANSFER TO PRACTICEIN CYBER SECURITY WORKSHOP
SRI International OfficesMenlo Park, CaliforniaFebruary 25 & 26, 2015
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 20152
WELCOME & INTRODUCTION
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 3
IF I KNEW THEN WHAT I KNOW NOW
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 20154
IF I KNEW THEN WHAT I KNOW NOW, cont.
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 5
WHY IS TECH TRANSFER CRITICAL?
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 20156
OPPORTUNITY IDENTIFICATION
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 7
OPPORTUNITY IDENTIFICATION, cont.
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 20158
FUNDING ORGANIZATION FRONT END
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 9
TRANSFERRING IDEAS VS PRODUCTS
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 201510
TRANSFERRING IDEAS VS PRODUCTS, cont.
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 11
RESOURCES AVAILABLE TO HELP
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 201512
RESOURCES AVAILABLE TO HELP & POST-AWARD TTP
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 13
LOW-HANGING FRUIT
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 201514
OPEN DISCUSSION
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 15
OPEN DISCUSSION, cont.
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 201516
TAKE-AWAYS
Technology Transfer to Practice in Cyber Security Workshop • February 25 & 26, 2015 17
TAKE-AWAYS