A1Sadmin – AIS Home | Assured Information Security https://www.ainfosec.com Thu, 05 Dec 2024 20:06:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://www.ainfosec.com/wp-content/uploads/2022/10/cropped-ais-icon-1-32x32.png A1Sadmin – AIS Home | Assured Information Security https://www.ainfosec.com 32 32 From Participant to Professional: How the CNY Hackathon Shaped My Cybersecurity Journey https://www.ainfosec.com/from-participant-to-professional-how-the-cny-hackathon-shaped-my-cybersecurity-journey?utm_source=rss&utm_medium=rss&utm_campaign=from-participant-to-professional-how-the-cny-hackathon-shaped-my-cybersecurity-journey Thu, 05 Dec 2024 19:32:31 +0000 https://www.ainfosec.com/?p=20570 ...]]>
blogpic-cutting

By Joshua, Software Engineer I
Two-minute read

The CNY Hackathon is an annual, beginner-friendly event hosted at Mohawk Valley Community College (MVCC) for cybersecurity and computer science students.

This event introduces students to diverse challenges designed by industry professionals through Capture the Flag (CTF). Simultaneously, participants must patch and defend a network of services from the notoriously beginner-friendly adversarial red team.

Each college’s students are split into mixed teams, requiring them to collaborate with individuals they’ve never met before. This setup mirrors the real-world experiences of entry-level employees starting their first jobs: working with strangers, encountering new challenges, adapting quickly and meeting demanding deadlines.

That was me three years ago. I participated as a student representing SUNY Polytechnic Institute’s Network and Computer Security (NCS) club. I knew little about configuring networks, defending them from adversaries or maintaining services for end-users (even simulated ones). What I did bring was patience—patience to work with a new and diverse group of individuals, patience to stay calm under the pressure of the competition’s countdown timer and patience to believe in my own potential.

My team placed fifth out of six. Yet, it didn’t feel like a loss. The competition has a unique way of ensuring even those who don’t “win” leave feeling accomplished. I walked away excited about what I had learned and determined to improve for the next time.

“My team placed fifth out of six. Yet, it didn’t feel like a loss.”

Each team also votes to recognize their “Most Improved” teammate—a prestigious award that takes precedence over “Most Valuable Teammate.” This acknowledgment recognizes that the desire for growth outweighs raw talent and encourages students to keep improving their skills. My team voted me their MVT, which was a significant honor at the time. That designation confirmed what I hoped to be true: that by giving my best, I was capable of a career in this field.

I can confidently say that this event propelled my career forward. The Hackathon taught me that any career goal is achievable with a relentless attitude toward learning and collaboration. Inspired by the experience, I devoted more time to my college’s NCS club, developed my skills and secured an internship with one of the event’s sponsors: Assured Information Security (AIS).

Over time, I had the chance to give back to the event that started it all. I’ve supported the CNY Hackathon as a member of the infrastructure “black team,” as a guest speaker and most recently, as a sponsorship representative of AIS.

This year’s Hackathon was particularly special. For the first time in recent history, the event featured a career lunch with its sponsors—a full-circle moment for me. Returning to the same event that launched my career, I was able to help students in the same way the Hackathon helped me.

The CNY Hackathon is a fully volunteer-operated event, relying on sponsorships from local companies to fund its infrastructure, shirts, food and badges. AIS, one of its long-time sponsors, helps ensure this impactful experience continues.

These sponsors also have the unique opportunity to scout local talent, while students showcase their skills in front of potential employers. Beyond technical growth, participants gain real-world experience and build connections that can enhance their résumés and open career doors.

If you’re seeking a chance to learn, demonstrate your skills and compete in an environment designed for beginners, this is it. Join the hundreds of students who have benefited from this incredible event!

Special thanks to AIS for its continued support of the CNY Hackathon. It had such a profound impact on the start of my career!

AIS is a proud sponsor of this event. Learn more about our community impact:

]]>
AIS Receives Two New Patents from U.S. Patent Office Expanding its Portfolio to 24 Issued Patents https://www.ainfosec.com/ais-receives-two-new-patents-from-us-patent-office-expanding-its-portfolio-to-24-issued-patents?utm_source=rss&utm_medium=rss&utm_campaign=ais-receives-new-patent-from-u-s-patent-office-expanding-its-portfolio-to-23-issued-patents Tue, 05 Nov 2024 17:16:34 +0000 https://www.ainfosec.com/?p=20517 ...]]>

Assured Information Security (AIS) is pleased to announce that the U.S. Patent and Trademark Office has issued the company two new patents in October 2024, expanding AIS’s intellectual property (IP) and raising its portfolio to 24 issued patents with multiple currently pending.

“Expanding our patent portfolio is central to our mission of advancing cybersecurity solutions that can adapt to evolving threats,” said Michael Sieffert, Chief Engineer at AIS. “These new patents introduce breakthrough methods in malware prevention and data modeling. One patent enhances proactive malware defense by tracking process behavior, selectively presenting ‘canary files’ to suspicious processes and terminating them based on a malice scoring system. The second patent focuses on a novel approach to data modeling, enabling more precise feature selection through an iterative process that optimizes resource allocation. Together, these patents exemplify AIS’s commitment to building technologies that address complex cybersecurity challenges with efficiency and precision.”

Patent Details:

U.S. Patent Number: 12,124,568: PREVENTION AND REMEDIATION OF MALWARE BASED ON SELECTIVE PRESENTATION OF FILES TO PROCESSES
Malware prevention and remediation is provided by monitoring actions performed by processes and maintaining indications of which processes are trusted; selectively presenting canary files to these processes, which includes presenting the canary files to processes not indicated as being trusted and hiding the canary files from processes indicated as being trusted, and where the monitoring includes monitoring for access of canary files with change privileges; scoring each of the processes based on the actions performed, including any access of canary files with change privileges, which scoring produces a malice score for each process; and automatically terminating any process for which its malice score indicates at least a threshold level of malice in the execution of the process.

Invention is credited to AIS employees Sean LaPlante and Patrick McHarris.

Patent Details:

U.S. Patent Number: 12,131,230: FEATURE EQUIVALENCE AND DOCUMENT ABNORMALITY THRESHOLD DETERMINATION
A method includes, as part of establishing a feature merging threshold (α) for determining equivalence between two features, selecting a set of candidate α values, partitioning training data into a plurality of groups, establishing a model Wα for each α value of the set of candidate α values, iteratively performing: selecting a next group of training data of the plurality of groups of training data; adding the selected next group of training data to a training set; and for each α value in the set of candidate α values: training the Wα for the α value using the training set, and evaluating a size of Wα, the size comprising a number of features included in the model, and choosing the feature merging threshold α based on the iteratively performing.

Invention is credited to former AIS employees Daniel Scofield and Craig Miles.

To view the complete list of AIS patents, click here.

]]>
AIS Receives 2024 HIRE Vets Medallion Award from the U.S. Department of Labor https://www.ainfosec.com/ais-receives-2024-hire-vets-medallion-award?utm_source=rss&utm_medium=rss&utm_campaign=ais-received-2024-hire-vets-medallion-award-from-the-u-s-department-of-labor Thu, 31 Oct 2024 16:16:24 +0000 https://www.ainfosec.com/?p=20489 ...]]>
U.S. Acting Secretary of Labor Julie A. Su recognized Assured Information Security (AIS) as one of the 839 recipients of the 2024 HIRE Vets Medallion Award during a virtual award ceremony presented by U.S. Department of Labor.

AIS earned the gold award after applying earlier this year. The Honoring Investments in Recruiting and Employing American Military Veterans Act (HIRE Vets Act) Medallion Program is the only federal award program that recognizes employers who successfully recruit, hire and retain veterans.

“Receiving this award for the fourth consecutive year reaffirms our steadfast commitment to our nation’s veterans,” said Elizabeth Bowers, Chief Human Resources Officer and Senior Vice President at AIS. “As a company built on a foundation of service, we’re dedicated to fostering an environment where veteran employees can harness their unique skills. We continually strive to provide the resources, training and support they need, while offering them a fulfilling career path.”

AIS joins 838 other companies from 49 states, plus the District of Columbia, who have shown a commitment to hiring veterans, but also ensuring that they have a long-term career and growth plan that uses the diverse skills they acquired through their military service.

Recipients of the 2024 HIRE Vets Medallion Award meet rigorous employment and veteran integration assistance criteria, including:

  • Veteran hiring and retention percentages
  • Availability of veteran-specific resources
  • Leadership programming for veterans
  • Dedicated human resource efforts
  • Pay compensation and tuition assistance programs for veterans

More than 1,600 employers have earned a HIRE Vets Medallion Award since 2019.

Thank you to our veterans at AIS, two of which are pictured above!

]]>
5 Seminal Papers to Kickstart Your Journey Into Large Language Models https://www.ainfosec.com/5-seminal-papers-to-kickstart-your-journey-into-large-language-models?utm_source=rss&utm_medium=rss&utm_campaign=5-seminal-papers-to-kickstart-your-journey-into-large-language-models Tue, 22 Oct 2024 19:38:53 +0000 https://www.ainfosec.com/?p=20449 ...]]>
blogpic-bowman

Author: Dylan, Research Scientist II
Five minute read

Large language models (LLMs) have introduced an exciting new paradigm to the machine learning world in the past few years.

Research groups like AIS’s Advanced Research Concepts (ARC) team have been quick in exploring the range of possibilities with this new technology. However, aspiring AI developers and scientists often have no idea where to start learning about the science of large language models. In this blog post, we’ll review five seminal papers from the field and provide a brief reading guide so that you know which details to look for when you read them yourself.

1

Attention Is All You Need

“Attention Is All You Need” (Vaswani et al., 2017) presented the transformer architecture for neural networks which underlies all modern LLM designs. Transformers differed from previous neural networks in their use of self-attention, a mechanism that computes the ways elements in the input sequence affect each other’s semantic value. While the architecture was initially presented for use in language translation, it was adapted and scaled up by OpenAI into their first GPT model as well as Google’s T5 and BERT.

What Will This Paper Teach You?

  • The self-attention mechanism.
  • How the transformer architecture is organized into layers that update a residual stream.
  • Autoregressive language generation and how it fits into the sequence-to-sequence paradigm.

2

BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding

Another paper to come out of the early transformer literature, “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding” (Devlin et al., 2019), set the paradigm for transformer embedding models, which seek to embed sequences of text into vectors. The BERT model uses the encoder part of the transformer architecture and is trained on unsupervised masked language modeling on a large set of unstructured text data. AIS used MiniLM, a successor to BERT, as part of an explanatory reinforcement learning technique in our paper “CODEX: A Cluster-Based Method for Explainable Reinforcement Learning”.

What Will This Paper Teach You?

  • How the encoder part of the transformer architecture can be isolated for embedding models.
  • The paradigm of pre-training and fine-tuning with language models.

3

Language Models are Few-Shot Learners

While all of OpenAI’s GPT papers have been influential, the paper covering GPT-3, “Language Models are Few-Shot Learners” (Brown et al., 2020) marked the entry into the modern era of LLMs. The paper reviews the training process and architecture of GPT-3, but mostly focuses on the efficacy of few-shot learning, a technique where a pre-trained LLM is fed examples into its context window instead of being fine-tuned for a task.

What Will This Paper Teach You?

  • How the decoder part of the transformer architecture can be isolated for pure autoregressive generation.
  • The advantages of few-shot learning over fine-tuning.
  • The test sets used to evaluate capabilities of large language models, like HellaSwag, Winograd schemas and TriviaQA.

4

ReAct: Synergizing Reasoning and Acting in Language Models

One area of focus within LLM research is using prompt scaffolding and reasoning schemes to elicit more powerful capabilities from LLMs. A core paper in this subfield is “ReAct: Synergizing Reasoning and Acting in Language Models” (Yao et al., 2023), which builds on top of prior chain-of-thought prompting to get the model to think clearly and also use resources like a Wikipedia API to inform its actions. The ReAct framework is deployed in direct QA tasks as well as text-based adventure environments and shows improvements over base model performance in both.

What Will This Paper Teach You?

  • Prompt scaffolding frameworks and the degree to which they augment LLM abilities.
  • The evaluation environments for LLM agents like ALFWorld and WebShop.

5

The Llama 3 Herd of Models

To get a better idea of how modern LLMs are trained, we recommend “The Llama 3 Herd of Models” (Dubey et al., 2024). The Llama models are among the best open-source models today alongside the Qwen series and Mistral series, and the AIS team uses Llama models for several of our internal projects. This paper goes into depth on the more technical engineering details that went into the training process, especially post-training where they apply several techniques like SFT and DPO to coerce the base model into being more coherent and user-interactive.

What Will This Paper Teach You?

  • The post-training process for modern LLMs, including alignment, multilinguality and coding specialization.
  • How scaling laws are used during training to optimize energy expenditure (specifically, the data size/model size tradeoff in the compute budget).
  • The hardware and software used to support the platforms for training LLMs.
While these papers should provide a solid foundation to any novice LLM enthusiast, reading will only get you so far.

It’s important to engage with these papers and others in a more hands-on way: re-implementing architectures, reproducing results and performing experiments on top of the prior work are all great ways to learn more about LLMs, and in machine learning more generally. In particular, papers that use frontier model APIs like the ReAct paper above don’t require massive GPU servers and can run on a consumer-grade laptop. We hope that the resources we’ve provided will give a nice jumpstart!

]]>
AIS at Naval Surface Technology and Innovation Consortium (NSTIC) https://www.ainfosec.com/ais-at-naval-surface-technology-and-innovation-consortium-nstic?utm_source=rss&utm_medium=rss&utm_campaign=ais-at-naval-surface-technology-and-innovation-consortium-nstic Wed, 16 Oct 2024 19:58:16 +0000 https://www.ainfosec.com/?p=20422 ...]]>
blogpic-akers

Author: Travis Akers, Business Development Director
Two-minute read

Earlier this month, I had the privilege of representing Assured Information Security (AIS) at a three-day Naval Surface Technology and Innovation Consortium (NSTIC) collaboration event in Fredericksburg, Virginia.

All three days were packed with opportunities to engage with Naval Surface Warfare leaders, subject matter experts, program managers, technical directors and industry partners. The event included a full day tour of Naval Surface Warfare Center Dahlgren Division (NSWCDD) with stops in the Human Systems Integration Lab, Hypersonic Integration and Test Facility, Vertical Launching System Lab and an LCS/Future Modular Capability demonstration. During the tours, we had the rare opportunity to speak directly with government researchers and engineers to better understand the challenges being faced within the Navy’s surface fleet and integrating rapidly evolving technologies and capabilities to maintain the competitive edge against adversaries in the maritime domain.

The highlight of the event was being one of 10 companies to present, allowing me to share the AIS story with more than 200 attendees, including an audience with senior Naval flag officers, large and small defense industry businesses and warfighters: the end users of our products and services contributing to the national security apparatus. Participants heard from numerous program managers who provided an overview of NSWCDD and the command’s technical approach. The published pre-event statement of needs provided industry partners an opportunity to explore new business with the U.S. Navy, where I was able to meet with government representatives and discuss the advanced research and development capabilities of AIS and how our teams of technical experts, engineers and scientists can meet the 21st century challenges facing the Navy. NSTIC 2024 contained a few light moments as well, with multiple networking events held throughout the three days and a social hour mixer with industry partners to establish new relationships and identify potential leads for new business opportunities in the coming months and years.

Attending the NSTIC collaboration event was a great experience and demonstration of how vital public-private partnerships are in national security. AIS continues moving forward in establishing a strong presence in the U.S. Navy and becoming the small business of choice for cyber operations, mission solutions and advanced research and development.

]]>
Robert Westerman has been named Business Director, Mission Solutions at AIS https://www.ainfosec.com/robert-westerman-has-been-named-business-director-mission-solutions-at-ais?utm_source=rss&utm_medium=rss&utm_campaign=robert-westerman-has-been-named-business-director-mission-solutions-at-ais Mon, 09 Sep 2024 17:43:03 +0000 https://www.ainfosec.com/?p=20348 ...]]>

In this position, Westerman leads the direction, growth and operational effectiveness of AIS in the National Capital Region (NCR). Westerman’s expertise will play a crucial role in expanding our portfolio of specialized services and engineering projects, strengthening relationships with key customers.

Prior to joining AIS, Westerman most recently served as Senior Manager, LT Gen Vince Stewart Innovation Center at KBR in Columbia, Maryland. While there, he spearheaded strategic initiatives and drove innovative solutions in Cybersecurity, Artificial Intelligence/Machine Learning, 5G, Edge and Multi-Domain Operations.

Westerman holds a bachelor’s degree in Business Administration from the University of Baltimore and is currently pursuing a master’s degree in Analytics from Georgia Institute of Technology. His certifications include Project Management Professional, PMI-Agile Certified Practitioner, Executive Data Science Certificate and ANSI/EIA-649 CM Professional.

]]>
UAS Hack – A Resounding Success in Shaping the Future of Cybersecurity and UAS Technology https://www.ainfosec.com/uas-hack-a-resounding-success-in-shaping-the-future-of-cybersecurity-and-uas-technology?utm_source=rss&utm_medium=rss&utm_campaign=uas-hack-a-resounding-success-in-shaping-the-future-of-cybersecurity-and-uas-technology Tue, 27 Aug 2024 16:06:05 +0000 https://www.ainfosec.com/?p=20273 ...]]>
The UAS Hack, a hands-on event dedicated to exploring the intersection of cybersecurity and drone technology was held from August 19 to 23, 2024, at the ORION NTROPEE hangar and concluded with resounding success.

This weeklong challenge brought together 15 talented university-aged participants to tackle real-world cybersecurity challenges in the realm of unmanned aerial systems (UAS) and provided a unique platform for these emerging tech enthusiasts to learn, demonstrate their skills and push the boundaries of innovation.

Assured Information Security (AIS) subject matter experts providing instruction and curriculum for the event. Topics explored included the legalities of UAS and cyber, cybersecurity basics, drone 101 & 201, wireless communications and much more. UAS Hack was sponsored and driven by the Open-Architecture Resilient IoT for Operational Networks (ORION) ecosystem, which is spearheaded by the Air Force Research Laboratory Information Directorate (AFRL).

“UAS Hack has truly exceeded our expectations,” said Eric Thayer, Chief Engineer at AIS and UAS Hack instructor. “The 15 students demonstrated remarkable ingenuity and technical expertise, tackling complex UAS cybersecurity challenges head-on. Their ability to produce innovative solutions showcases the promising future of our industry. We are already looking forward to planning next year’s challenge.”

The event provided a unique opportunity for participants to immerse themselves in the practical application of cybersecurity principles within the rapidly evolving UAS landscape. By leveraging ORION’s hangar space and New York’s 50-mile UAS corridor as well as expert mentors and instructors, UAS Hack offered participants a collaborative and challenging environment to learn, innovate and develop crucial technical skills.

“UAS Hack was an incredible learning opportunity,” said Zack Kornreich, UAS Hack participant and current master’s student at Binghamton University. “The hands-on experience with UAS cybersecurity gave me practical skills that will undoubtedly add value to my career. The event pushed me to think critically and creatively, and I’m excited to apply what I’ve learned in my future endeavors.”

The success of UAS Hack underscores the commitment of ORION and its partners to nurturing the next generation of STEM leaders. By providing a platform that bridges industry, academia and government, the event not only enhanced participants’ cybersecurity proficiency but also fostered an innovative mindset essential for driving future advancements in UAS technology.

As the industry continues to evolve, events like UAS Hack play a critical role in ensuring that emerging talent is well-equipped to meet the cybersecurity challenges of tomorrow. The collaborative efforts between the 15 students, industry experts and sponsors have laid the groundwork for continued innovation and progress in the field of UAS cybersecurity.

]]>
A Recap of My DEF CON 2024 Presentation on FISSURE Updates https://www.ainfosec.com/a-recap-of-my-def-con-2024-presentation-on-fissure-updates?utm_source=rss&utm_medium=rss&utm_campaign=a-recap-of-my-def-con-2024-presentation-on-fissure-updates Thu, 15 Aug 2024 17:23:41 +0000 https://www.ainfosec.com/?p=20249 ...]]>

By Chris Poore,
Senior Reverse Engineer
Two minute read

It was an honor to present the latest updates to FISSURE at the DEF CON Radio Frequency Village in Las Vegas this past Saturday, August 10.

FISSURE UPDATES

One of the key updates I showcased was the introduction of deployable remote sensor nodes. These nodes are run on general-purpose computers (single-board computers, mini-PCs, laptops, desktops, etc.) and control many types of radio peripherals. They can also receive input from just about any type of sensory device that can be controlled by a computer.

To seize the opportunity presented by this new deployment scheme, we added a variety of example triggers (acoustic, environmental, filesystem, networking, RF, time and visual) that can be used to kick off many types of electromagnetic effects/actions supported by FISSURE. Additionally, we added a new type of playlist that can run scripts simultaneously across multiple radio peripherals to increase productivity on a sensor node. This new playlist type can be controlled over a network through the FISSURE Dashboard GUI or operate independently upon startup of the sensor node to execute any number of automated tasks.

Another topic that was covered were changes to the Target Signal Identification tab – the beginning component of FISSURE that will detect, isolate and classify signals using machine learning. The new signal conditioner, feature extractor and signal classifier elements provide a testbed for maturing algorithms across a range of topics and comparing machine learning models for classifying RF protocols and emitters.

These updates to FISSURE significantly enhance its versatility and compatibility across various environments, empowering users to tackle a broader range of geospatial scenarios. The improvements not only provide access to additional platforms but also enable greater situational awareness by triggering responses based on environmental conditions. With the integration of remote access capabilities and room for increased automation, FISSURE becomes an even more powerful tool, allowing users to efficiently manage operations and respond to dynamic situations with agility and precision.

We’ve also made it easier to conduct remote and cost-effective testing. Now, cybersecurity professionals can access specialized RF environments globally, whether they’re working from home or a remote location, without the need for physical presence at a specific site.

If you missed my presentation at DEF CON, don’t worry! A pre-recorded version will be available soon through the RF Village and linked to in the GitHub page.

Next up, I’ll be taking my blackjack winnings and attending the Binghamton University STEM Job and Internship Fair and then GRCon in mid-September. I’m looking forward to connecting with more of you there and discussing how FISSURE can continue to meet the evolving challenges in RF and reverse engineering. See you soon!

Be sure to star FISSURE on Github:
https://github.com/ainfosec/FISSURE

]]>
AIS Awarded $54.7 Million IDIQ Task Order to Advance Cyber Resilience https://www.ainfosec.com/ais-awarded-54.7-million-idiq-task-order-to-advance-cyber-resilience?utm_source=rss&utm_medium=rss&utm_campaign=ais-awarded-54-7-million-idiq-task-order-to-advance-cyber-resilience Thu, 25 Jul 2024 21:03:37 +0000 https://www.ainfosec.com/?p=20190 ...]]>

Assured Information Security (AIS) has been awarded “Stalwart”, a $54.7 million task order intended to perform the research, selection, application and delivery of anti-fragility measures in areas critical to helping the United States Air Force and its partnering combatant commands achieve cyber superiority. Stalwart will focus on capabilities that provide assurance in cyber embedded systems or integrated software/hardware systems.

Stalwart is a task order that is part of the larger AWARE effort, a $150 million, Indefinite Delivery/Indefinite Quantity (IDIQ) contract focused on researching novel and innovative anti-fragility concepts and integrating proven anti-fragility tools, techniques and processes into operational and emerging cyber platforms. AWARE is focused on delivering systems characterized by greater cyber resiliency and fewer vulnerabilities throughout the development life cycle, thereby reducing risk to mission systems and ensuring mission demands are met under an array of conditions.

“Stalwart is an exciting effort because it provides AIS the opportunity to continue its anti-fragility research, but now with a focus on cyber embedded systems,” said Salvatore Paladino, Director of Cyber Operations Research and Development at AIS. “Embedded systems are those that comprise the Internet of Things (IoT) and include devices from routers, to drones, to wearable sensors. There are profound opportunities to leverage these complex, interconnected systems to achieve military objectives, improve communications and operations and better connect military and civilian systems with the physical environment to improve quality of life, automation and safety on military facilities both at home and abroad.”

Stalwart is a Small Business Innovative Research (SBIR) Phase III award. The SBIR program is highly competitive and encourages domestic small businesses to engage in federal research and development aimed at commercializing solutions.

Work will be performed in Rome, New York, and is expected to be completed by July 19, 2029. The Air Force Research Laboratory Information Directorate in Rome, New York, is the contracting activity.

]]>
Paterson Aerospace Systems and AIS Form Mentor-Protégé Agreement Through SBA Program https://www.ainfosec.com/pas-and-ais-form-mentor-protege-agreement?utm_source=rss&utm_medium=rss&utm_campaign=paterson-aerospace-systems-and-ais-form-mentor-protege-agreement-through-sba-program Tue, 09 Jul 2024 16:52:33 +0000 https://www.ainfosec.com/?p=20127 ...]]>

Paterson Aerospace Systems (PAS) is pleased to announce the formation of a Mentor-Protégé Agreement with AIS under the U.S. Small Business Administration’s (SBA) Mentor-Protégé Program. This strategic partnership aims to leverage AIS’s extensive experience and expertise to foster the growth and development of PAS, enhancing its capabilities and competitive edge in the aerospace industry. The Mentor-Protégé Agreement will be officially signed at an upcoming Coffee & Concepts event hosted by the Griffiss Institute, taking place on Thursday, July 18, at 10am at the MVCC thINCubator, located at 326 Broad Street, Utica, NY.

AIS Logo
pas-logo-stack

The SBA Mentor-Protégé Program is designed to encourage large businesses to provide various forms of assistance to eligible small businesses, promoting economic growth and ensuring a more dynamic and inclusive marketplace. Through this partnership, PAS will benefit from AIS’s guidance in areas such as business development, technical knowledge and contracting.

“AIS’s proven track record and deep expertise will be invaluable in helping us achieve our strategic goals and expand our footprint in the aerospace sector,” said Kaylon Paterson, CEO at PAS. “We are excited about the opportunities this agreement with AIS will bring to our company.”

Kaylon Paterson, CEO of Paterson Aerospace Systems (left) and Charles Green, CEO of Assured Information Security (AIS) (right) will sign a Mentor-Protégé Agreement at an upcoming Coffee & Concepts event hosted by the Griffiss Institute, taking place on Thursday, July 18, at 10am at the MVCC thINCubator, located at 326 Broad Street, Utica, New York.

AIS, a recognized, local leader in the field of cyber and information security, will provide PAS with mentoring that encompasses a wide range of business and technical disciplines. This collaboration is expected to improve PAS’s operational processes and open new avenues for growth and innovation.

“We are committed to helping the PAS team reach new heights by sharing our industry knowledge and invaluable lessons learned,” said Charles Green, CEO at AIS. “Together, we aim to drive significant advancements in aerospace technology and security, a research area I’m truly passionate about.”

Paterson and Green will be presenting an in-depth discussion about the Mentor-Protégé Agreement at an upcoming Coffee & Concepts event, taking place on Thursday, July 18, at 10am at the MVCC thINCubator, located at 326 Broad Street, Utica, New York. Attendees will have the opportunity to learn more about both organizations and the significance of this partnership. Don’t miss this chance to connect with industry experts and peers. Learn more: www.griffissinstitute.org/event/coffee-and-concepts-to-go-2/.

About Paterson Aerospace Systems

Founded in 2019, PAS was developed to reduce the negative impact the Aerospace Industry has on the resources of the Earth and other operational environments. The team is comprised of professional engineers and scientists with a passion for protecting environmental assets for safer and cleaner space exploration. Learn more: www.patersonaerospace.com.

]]>