TechNet Cyber Sponsorship Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2019 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a sponsorship? Let us know! We are happy to discuss possibilities with you. Contact us today!
Meet the Program Managers (as of May 3, 2019)
Tuesday, May 14, 2019
1:30 - 2:30 pm
Room: Hall G
Join DISA and JFHQ-DODIN Program and Portfolio Managers for an informal outreach opportunity during the exhibit hall grand opening. This is your chance to begin conversations and connect with government program and portfolio representatives. The full list of scheduled participants is listed below:
Confirmed DISA Program/ Portfolio Manager Participants
Capability/Organization |
Participant |
Computing Systems Management |
Thomas (Tom) Hines |
Cyber Analytics |
Amanda Villwock |
Cyber Infrastructure |
Raheem (Ray) McCormick |
Contracting (Encore III) |
Charles Boone |
Contracting (Encore III) |
Tara Horstmann |
Contracting (Encore III) |
Christina Stukenberg |
Endpoint Security |
Diane Phan |
Endpoint Security |
Todd Gillis |
GEMSIS |
Alan Rosner |
Global Command And Control System - Joint |
Joy Gabriana |
Global Command And Control System – Joint Enterprise |
LTC Paul Bushey |
Global Combat Support System – Joint |
Dedra Robertson |
JFHQ-DODIN |
Marcus Benjamin |
JFHQ-DODIN |
Michael Hoskelis |
JFHQ-DODIN |
Leo Gentile |
Joint Service Provider |
Connie Glaze |
Joint Operation Planning And Execution System / Joint Planning And Execution Services |
Al Monch |
Joint Planning And Execution Services |
Al Monch |
Joint Regional Security Stacks |
Col Veronica Smith |
Mobility |
Jake Marcellus |
Mobility |
Frank Cabral |
National Background Investigation System |
Sheldon Soltis |
National Background Investigation System |
James (Jim) Fowler |
Network Operations |
James (Jim) Cairns |
Security Technical Implementation Guides |
Sue Kreigline |