<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dan Craigen</style></author><author><style face="normal" font="default" size="100%">Drew Vandeth</style></author><author><style face="normal" font="default" size="100%">D’Arcy Walsh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Cybersecurity Research and Experimental Development: The REVO Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">experimental development</style></keyword><keyword><style  face="normal" font="default" size="100%">performance indicators</style></keyword><keyword><style  face="normal" font="default" size="100%">research</style></keyword><keyword><style  face="normal" font="default" size="100%">research program lifecycle</style></keyword><keyword><style  face="normal" font="default" size="100%">research-activity descriptions</style></keyword><keyword><style  face="normal" font="default" size="100%">research-requirement statements</style></keyword><keyword><style  face="normal" font="default" size="100%">strategic research contexts</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">07/2013</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/705</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">34-41</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the Organisation for Economic Co-operation and Development (OECD) and the Treasury Board of Canada Secretariat (TBS). The key benefits of the approach are the following: i) the breadth of the overall (cybersecurity) space is described; ii) depth statements about specific (cybersecurity) challenges are articulated and mapped to the breadth of the problem; iii) specific (cybersecurity) initiatives that have been resourced through funding or personnel are tracked and linked to specific challenges; and iv) progress is assessed through key performance indicators.

Although we present examples from cybersecurity, the method may be transferred to other domains. We have found the approach to be rigorous yet adaptive to change; it challenges an organization to be explicit about the nature of its research and experimental development in a manner that fosters alignment with evolving business priorities, knowledge transfer, and partner engagement. </style></abstract><issue><style face="normal" font="default" size="100%">7</style></issue><custom1><style face="normal" font="default" size="100%">Communications Security Establishment Canada
Dan Craigen is a Science Advisor at the Communications Security Establishment Canada (CSEC). Previously, he was President of ORA Canada, a company that focused on High Assurance/Formal Methods and distributed its technology to over 60 countries. His research interests include formal methods, the science of cybersecurity, and technology transfer. He was the chair of two NATO research task groups pertaining to validation, verification, and certification of embedded systems and high-assurance technologies. He received his BScH in Math and his MSc in Math from Carleton University in Ottawa, Canada. </style></custom1><custom2><style face="normal" font="default" size="100%">IBM Systems Research
Drew Vandeth is the Senior Research Strategist for the National Security Community and a Senior Researcher at IBM Systems Research. He is the founder of the Tutte Institute for Mathematics and Computing (TIMC) and was its first Deputy Director. His research interests include theoretical and computational number theory, contextual and cognitive computing, high performance computing architectures, autonomic and autonomous analytical systems, and research management. Dr. Vandeth holds a PhD in Number Theory from Macquarie University in Sydney, Australia, an MMath in Number Theory from the University of Waterloo, Canada, and a BMath (Hons) in Pure Mathematics, also from the University of Waterloo.</style></custom2><custom3><style face="normal" font="default" size="100%">Communications Security Establishment Canada
D’Arcy Walsh is a Science Advisor at the Communications Security Establishment Canada (CSEC). His research interests include software-engineering methods and techniques that support the development and deployment of dynamic systems, including dynamic languages, dynamic configuration, context-aware systems, and autonomic and autonomous systems. He received his BAH from Queen’s University in Kingston, Canada, and he received his BCS, his MCS, and his PhD in Computer Science from Carleton University in Ottawa, Canada.</style></custom3></record></records></xml>