TechNet Cyber Sponsorship Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2019 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a sponsorship? Let us know! We are happy to discuss possibilities with you. Contact us today!
Focused Networking
Wednesday, May 15, 2019 – 4:00 PM - 5:00 PM
Avoid the afternoon rush and gather with industry and government peers for unstructured discussion and networking. Focused Networking, now in its third year, was added in response to requests from attendees for increased opportunities to engage both industry colleagues and government peers to discuss shared challenges and collaborative solutions in more depth. For this iteration, we have chosen four key subject areas to align with topics of key interest to the Department of Defense.
We hope to attract experts from both industry and government for a productive exchange of innovative ideas. The sessions are designed to be interactive and conversational. This is a PowerPoint free zone with only a podium, minimal seating and high-top tables to facilitate networking flow.
Discussion facilitators will assist in getting things started by introducing the discussion topics with a few framing remarks but limited to 5-7 minutes to allow the balance of the time for discussion.
Members of the DISA's Corporate Connections team will also be present to engage with industry.
No prior sign-up necessary; open to all registered symposium attendees.
Discussion Topics:
Block Chain
(Room 323)
Facilitator:
Sherri Sokol
Chief Cyber Engineer
Defense Information Systems Agency (DISA)
Topic Description:
With the hype around blockchain subsiding, the focus finally shifts to what the technology can actually enable (especially when combined with other emerging tech). Government, academia, and industry are moving out. Let’s also discuss DISA’s current effort with Blockchain as a Service and our effort with potential applications for blockchain to advance agency goals and meet mission partner requirements. Tell me about the blockchain systems you are already implementing that can provide value to the department.
Problem Statement #1
How can we leverage our blockchain efforts to meet specific requirements of our mission partners? (For example, are you developing a proof of concept with a mission partner that could benefit from a DISA BaaS managed infrastructure to reach production capability?)
Problem Statement #2
Do you have other solutions (focus on enterprise permissioned blockchain) that support DISA in meeting specific mission partner requirements or are you looking for a partner to develop those solutions with (e.g. CRADA potential)?
Machine Learning and AI
(Room 324)
Facilitator:
Bob Landreth
Chief Cyber Engineer
Defense Information Systems Agency (DISA)
Topic Description:
DoD must develop and integrate AI/ML in to its daily operations to increase both the effectiveness and efficiency of its cyber security mission. Bad actors are continuously using more sophisticated techniques, to include AI/ML against DOD systems, so DoD needs to ensure it continues to be effective and ahead of the advanced attacks by keeping pace with the latest approaches in AI/ML and other technologies.
DISA has petabytes of cyber data, and is generating more every year from the multiple network and host based sensors which creates challenges in efficiency. DISA currently has too few cyber analysts to analyze all data types from all sources in perpetuity and it cannot continue to rely solely on human resources to continue with manual analysis. For this reason, DISA needs to focus on the automated identification and removal of malicious activity utilizing AI/ML.
Problem Statement #1
DISA has deployed multiple cyber sensors across the DoDIN to monitor for malicious activity. Many of the alerts received from these sensors are identified as "false positives" or benign activity. How can we utilize artificial intelligence (AI) and machine learning in our cybersecurity mission to automatically prioritize alerts so that events with the greatest probability of malicious activity are identified for our analysts?
Problem Statement #2
Supervised machine learning relies on training data that contains known bad activities and known good activities. How can we automatically update our production cyber data repositories with analysis results from operators to produce this learning data on an on-going basis with minimal manual effort?
Zero Trust Architecture
(Room 325)
Facilitator:
Angelo Curcio
Zero Trust Architecture Lead
Defense Information Systems Agency (DISA)
Topic Description:
The paradigm of a Zero Trust Architecture (ZTA) involves verification of devices, verification of users and enforcing least privilege access to data and resources, to prevent lateral movement of an adversary across a network and to minimize the ability and impact of malicious insiders.
Problem Statement #1
The inherent problem of the traditional security approach is that we place inherent trust in the network as a whole like that of a castle. We believe the walls, moat, guards, etc. will protect us inside the castle because the true threat is outside. Zero trust flips this paradigm and posits that we trust nothing and verify everything on the network. From an Industry Partner perspective, what is your opinion on how DISA can get to a zero trust model?
Browser Isolation
(Room 326)
Facilitator:
Bill Grenzer
CBII Chief Engineer
Defense Information Systems Agency (DISA)
Topic Description:
DISA is currently executing OTA prototype with 100k users across the DoD to prove the viability of the of utilizing a commercial cloud based internet isolation system for all general purpose browsing to sites that are external to NIPRNET. This approach removes all potentially malicious internet-born code from the DOD’s network and removes the need to conduct the same level of traffic inspection at the DoD perimeter.
Problem Statement #1
DoD boundary and endpoint defenses are constantly stressed from increasingly sophisticated browser-based attacks.
Problem Statement #2
DoD Internet traffic growth through DISA-managed Internet Access Points is unsustainable.