Closed Solicitation · DEPARTMENT OF ENERGY

    OPEN SOURCE SOFTWARE: EMV SCORING APPLICATION: TAILORED CYBERSECURITY THREAT EVALUATION

    DEPARTMENT OF ENERGY
    Special NoticeIdaho Falls, ID
    Closed
    STATUS
    Closed
    closed Mar 15, 2026
    POSTED
    Oct 31, 2024
    Publication date
    NAICS CODE
    518210
    Primary industry classification
    PSC CODE
    DJ01
    Product & service classification

    AI Summary

    The Department of Energy is seeking bidders for the development of an Open Source Software application known as the EMV Scoring Application, aimed at providing tailored cybersecurity threat evaluations. This initiative addresses the significant risks posed by cybersecurity threats to critical infrastructures by offering a more precise and customizable threat assessment tool compared to traditional vulnerability scoring systems. The EMV Scoring Application, developed through a collaboration between Idaho National Laboratory and Southern California Edison, allows users to apply their own scoring criteria to various configurations, thereby identifying relevant cyber threats specific to their environments. The application features a user-friendly graphical interface and integrates with STIX objects, enabling users to export scored

    Contract details

    Notice Type
    Special Notice
    Posted Date
    October 31, 2024
    Response Deadline
    March 15, 2026
    NAICS Code
    518210AI guide
    PSC / Class Code
    DJ01
    Contract Code
    8900
    Primary Contact
    Andrew Rankin
    State
    ID
    ZIP Code
    83415
    AI Product/Service
    product

    Description

    Open Source Software: EMV Scoring Application: Tailored Cybersecurity Threat Evaluation

    In the digital age, cybersecurity threats pose significant risks to critical infrastructures. The Exploit, Malware, and Vulnerability (EMV) Scoring Application emerges as a crucial tool for organizations aiming to fortify their defenses by enabling precise, configuration-specific threat assessment.

    Traditional vulnerability scoring systems, like the National Vulnerability Database's CVE scores, often lack the nuance needed to assess threats against specific configurations, leading to inefficient allocation of resources. Recognizing this gap, the collaboration between Idaho National Laboratory (INL) and Southern California Edison under the CES-21 Program birthed the EMV Scoring Application. It was designed to allow users to apply their scoring schema against various configurations, thereby identifying the actual applicability of cyber threats to their unique environments.

    The EMV Scoring Application is a highly customizable and user-friendly graphical interface that simplifies scoring cyber threats according to user-defined criteria. It integrates seamlessly with STIX objects, offering the flexibility to export scored objects for further analysis. By enabling users to create their scoring schema, the application provides a dynamic solution for evaluating the relevance and impact of exploits, malware, and vulnerabilities on specific configurations.

    Advantages

    • Customizable Scoring: Tailor the scoring process to fit specific operational configurations and security needs.
    • Efficient Resource Allocation: Focus security efforts on truly applicable threats, avoiding unnecessary expenditure on low-impact or irrelevant issues.
    • Streamlined Evaluation Process: Simplify the assessment of cyber threats with a user-friendly GUI, making complex scoring accessible to all users.
    • Enhanced Cybersecurity Posture: Identify and prioritize threats based on detailed, configuration-specific evaluations, strengthening defenses against targeted attacks.
    • Agile Response Capabilities: Leverage scored threat data to inform automated response technologies, enabling quick and effective action against cyber attacks.

    Applications

    • Critical Infrastructure Protection: Tailor threat assessments to safeguard essential services like electricity, water, and transportation.
    • Corporate Security: Customize cybersecurity measures for corporate networks, ensuring protection against targeted exploits and malware.
    • Government Defense: Apply specific scoring schemas for national security assets, optimizing defense strategies against sophisticated cyber threats.
    • Healthcare Data Security: Protect sensitive healthcare information by focusing on vulnerabilities relevant to medical infrastructure.

    Secure your organization's cyber defenses with the EMV Scoring Application. Download now and start customizing your cybersecurity threat assessment today.

    INL’s Technology Deployment department focuses exclusively on licensing intellectual property and partnering with industry collaborators capable of commercializing our innovations. Our goal is to commercialize the technologies developed by INL researchers. We do not engage in purchasing, manufacturing, procurement decisions, or providing funding. Additionally, this is not a call for external services to assist in the development of this technology.

    Key dates

    1. October 31, 2024Posted Date
    2. March 15, 2026Proposals / Responses Due

    AI search tags

    Frequently asked questions

    OPEN SOURCE SOFTWARE: EMV SCORING APPLICATION: TAILORED CYBERSECURITY THREAT EVALUATION is a federal acquisition solicitation issued by DEPARTMENT OF ENERGY. Review the full description, attachments, and submission requirements on SamSearch before the response deadline.

    SamSearch Platform

    Stop searching. Start winning.

    AI-powered intelligence for the right opportunities, the right leads, and the right time.