Defensive Cyber Operations Symposium Frequently Asked Questions


WEST image Cyber operations are a challenging mission for the U.S. Defense Department and government community that builds, operates and defends networks. Cyber leaders and warriors must continually evolve to adapt to future innovations and develop and leverage cutting-edge tools and technologies. Participants will discuss requirements and solutions to ensure that the networks within DoD are adaptive, resilient and effective across a range of uses and against diverse threats. Leveraging innovative technology, advancing cybersecurity and building new relationships are topics experts will examine in depth May 15-17 at the Baltimore Convention Center in Maryland.

Speakers will include leaders in the Defense Information Systems Agency, Joint Force Headquarters-DoD Information Network and DoD Chief Information Office. In addition, through a mix of plenary addresses, panel sessions and training tracks, service cyber components, agencies, industry, academia and the military services will add their own insights to the discussions.

About Defensive Cyber Operations Symposium

  Who attends DCOS?

Cyber operations are a challenging mission for the U.S. Defense Department and government community that builds, operates and defends networks. Attendees include members of the Defense Information Systems Agency, Joint Force Headquarters-DoD Information Network and DoD Chief Information Office as well as a mix of service cyber components, agencies, industry, academia and the military services.

Discussions will focus on leveraging innovative technology, advancing cybersecurity and building new relationships between the military and industry sectors.

  When/where does the symposium take place?

The event takes place May 15-17, 2018, at the Baltimore Convention Center in Maryland. More information is available online.

  When is the exhibit hall open?

The exhibit hall opens at 1:15 p.m. on May 15 and closes at 1:30 p.m. on May 17. A current list of exhibitors and the exhibit hall floor plan are available online.

Registration and Program Questions

  How much does it cost to attend?

Rates vary depending on military/government and AFCEA membership status. Check the registration fees page for specific information.

  How do I register?

Register online or at the convention center. For more information, contact the DCOS Registration Center at (703) 631-6200 cyberopsregistration@jspargo.com

Know Before You Go

  Where do I pick up my badge?

All badges must be picked up on site at the registration desk. All registrants will receive a confirmation notice via email. If you do not receive a confirmation, please contact the DCOS Registration Center at (703) 631-6200 cyberopsregistration@jspargo.com.

  Where can I park?

Information about parking garages located near the convention center is available online.

  What is the dress code?

All Defensive Cyber Operations Symposium events are business attire. Military personnel are encouraged to wear the appropriate uniform of the day.

  DISA HQ Bus Schedule

View the DISA HQ 2018 DCOS Bus Schedule.

Baltimore Conference Center Bus Stop: 200 W. Pratt Street

DISA HQ's Bus Stop: In front of Command Building

  Who should I contact for assistance?

AFCEA supports the Americans with Disabilities Act of 1990. Attendees with special needs should call (703) 631-6238 or email events@afcea.org.

  Photography/Videography/Audio Recording Policy

Attendees are not permitted to photograph, record or videotape any portion of the Defensive Cyber Operations Symposium proceedings. Working members of the press are required to check in at the press desk at registration to photograph and/or videotape at the show.

Exhibit personnel may photograph and/or videotape only their personnel and equipment within the confines of their booth.

Failure to comply with this policy will result in confiscation of devices or material and administrative action under applicable government guidelines.

Attendees understand that AFCEA and their authorized representatives (show management) may conduct interviews and may take photographs and/or videotape in any part of the conference and exhibit hall. These photographs, videos and recordings are for use by show management in publications or other media material produced for the purposes of conference promotion, including but not limited to: brochures, invitations, books, newspapers, magazines, television and websites. Attendee and exhibitor registration grants show management permission and consent for use of this photography and video.

Exhibit & Sponsor Information

  How can I exhibit at and/or sponsor?

For information about how to exhibit, sponsorships and patron levels, and cost of exhibit space and sponsorships or to reserve exhibit space or sponsorship opportunity, change exhibit space, change the company contact information or cancel exhibit space, contact

DCOS 2018 Exposition Management
SPARGO, Inc.
(703) 995-2567
cyberexhibits@spargoinc.com

Exhibit and sponsorship information, current list of exhibitors and the exhibit hall floor plan are available online.

  What additional resources are available?

Check out the Exhibitor and Sponsor FAQs where you’ll find the Exhibitor Service Manual, exhibitor housing information, a deadline checklist and numerous additional tools to get the most out of your ensure your exhibiting experience.

Prepare to be Aware

Conferences present opportunities for America's adversaries to target U.S. government employees, academia, defense industry and other personnel to collect our critical information. Be a hard target! Use good OPSEC practices to protect yourself and your organization's mission.

Recommendations:

  • Be aware of your surroundings when discussing sensitive unclassified critical information during the conference and after hours, in common/public areas (e.g. social gatherings, networking mixers, etc.).
  • Be suspicious of strangers. Even though they sound like they belong at the conference, don't assume they are there for the same purpose as you.
  • Use caution when sharing information with someone you don't know. Ask others to confirm a person's identity before sharing critical information about your organization's past, ongoing or future operations/activities/events. Protect your personal information, such as your room number and daily schedule. Don't give out your business cards freely, particularly when outside the United States. Remember, phishing is still the #1 adversary threat vector into your personal and government computers/devices/networks.
  • If you use a laptop or other portable electronic device (personal or government-owned), use it cautiously. Disable the Bluetooth and WLAN/Wi-Fi connections when not in use, and if you use this type of connectivity, understand that you may expose personal and work-related critical information to an adversary. Be especially cautious when using unencrypted/unsecure WLAN/Wi-Fi hotspots.

BE SMART! BE SAFE! PRACTICE GOOD OPSEC!