TechNet Cyber Supporting Partner Opportunities


Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2023 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!

Deadline to purchase a Supporting Partnership is April 13th.

SIGNAL Innovation Showcase


The SIGNAL Innovation Showcase provides the opportunity to demonstrate cutting-edge solutions in response to problem statements:

Located in the 3400 aisle of the exhibit floor, the showcase provides a platform for the broad exposure to government, military, and industry attendees. Solutions will be presented in the Innovation Showcase on all three days of TechNet Cyber. Presenters will have 20 minutes to brief and field Q&A.

Presentation Schedule:

Tuesday: May 2, 2023

10:10 AM - 10:30 AM

"A One Year Study of Enterprise/Government IoT"

Craig Labovitz, Ph.D.
Chief Technology Officer, Network Intelligence, Analytics and DDoS Security
Nokia Deepfield

Read Abstract

10:40 AM - 11:00 AM

"Add Predictability to Long-Term Cybersecurity with the Right Solutions"

Kynan Carver
Cybersecurity Lead, Defense Market
Maximus

Read Abstract

11:10 AM - 11:30 AM

"XDR: Cutting Through the Noise"

Jean-Paul Bergeaux
Federal CTO
GuidePoint Security

Justin Lee
Business Development Representative
GuidePoint Security

Read Abstract

11:40 AM - 12:00 PM

"Using ChatGPT to Validate and Modify Code for Inexperienced Linux Users"

Rashad Ashley
Senior Network Design Engineer
MSM Technology

Read Abstract

1:40 PM - 2:00 PM

"Revolutionizing Defense Information Systems with Generative AI Technologies and ChatGPT-4-Like Capabilities"

Jon Stresing
Senior Account Manager
NVIDIA

Read Abstract

2:10 PM - 2:30 PM

"Control the Who, What, When, Why & Where of Mission Partner Environment Access"

James Ebeler
Chief Technology Officer
Three Wire Systems

Andy Shook
Senior Solutions Engineer
BeyondTrust

Read Abstract

2:40 PM - 3:00 PM

"IOT Security: Peraton’s PCAR – An Automated Cyber Resilience Platform PCAR"

Jeff Berlet
Senior Technology Director, Cyber Mission Sector
Peraton

Read Abstract

3:10 PM - 3:30 PM

"Harness the Cyber Power of Identity and Ready the Joint Cyber Mission"

Andrew Whelchel
Senior Solution Engineer
Saviynt

Read Abstract

3:40 PM - 4:00 PM

"Data Enrichment Using LLM Text Analytics"

Pragyansmita Nayak, Ph.D.
Chief Data Scientist
Hitachi Vantara Federal

Read Abstract

4:10 PM - 4:30 PM

"Secure IoT and All Non-Person Entity Credentials"

Gram Slingbaum
Solutions Engineer
CyberArk

Read Abstract

4:40 PM - 5:00 PM

"Combatting Insiders and Novel, Unknown Attacks with AI: A Real U.S. Government Case Study"

Giuseppe “J.R.” Crisafulli
Systems Architect
GDIT

Zachary Vaughn
Director, Federal Security Engineering
Vectra AI

Read Abstract

5:10 PM - 5:30 PM

"Tactical Data Operations"

Ron Nixon
CTO & CISO, Federal Organization
Cohesity

Read Abstract

Wednesday: May 3, 2023

10:00 AM - 10:20 AM

"Stop Hackers from Deconstructing Your Defense and Build Cyber Resilience"

Joe Kattner
Senior Manager, Systems Engineering
Fidelis Security

Read Abstract

10:30 AM - 10:50 AM

"Making Zero Trust Work for You"

James Stanger, Ph.D.
Chief Technology Evangelist
CompTIA

Read Abstract

11:00 AM - 11:20 AM

"See No ®Evil: The New Approach to Ransomware Prevention"

Doug Lingenfelter
Federal Sales, Account Manager
SpyCloud

Read Abstract

11:30 AM - 11:50 AM

"Quantum-Resistant Security"

Gina Scinta
Deputy Chief Technology Officer
Thales Trusted Cyber Technologies

Read Abstract

1:40 PM - 2:00 PM

"Delivering DoD’s Cyber Security Workforce of the Future"

Stephanie Hammond
Solution Sales Executive – Department of Defense and Intelligence Community
ServiceNow

Emily Kourey
Solutions Consultant – Employee Workflow
ServiceNow

Read Abstract

2:10 PM - 2:30 PM

"Using Generative AI to Enhance Decisioning"

Viral Chawda
Principal, Innovation & Enterprise Solutions
KPMG

Joseph Klimavicz
Managing Director
KPMG

Read Abstract

2:40 PM - 3:00 PM

"Securing a Heterogeneous Distributed Data Mesh in DDIL Environments"

Darren Pulsipher
Chief Solution Architect for Public Sector
Intel

Read Abstract

3:10 PM - 3:30 PM

"Experience-Driven NetOps – How Government Agencies Gain Network Visibility and Control"

Jeremy Rossbach
Chief Technical Evangelist, NetOps Network Monitoring Solution
Broadcom

Read Abstract

3:40 PM - 4:00 PM

"Explain It to Me Like I’m an Engineer! Using ChatGPT to Describe Security Controls to Everyone Who Isn’t an ISSO"

Greg Elin
Principal OSCAL Engineer
RegScale, Inc.

Read Abstract

4:10 PM - 4:30 PM

"Composable Security Architecture/Extended Detection and Reponse"

Chandra Pandey
Founder & CEO
Seceon

Read Abstract

4:40 PM - 5:00 PM

"Lifting and Shifting Yesterday’s Cybersecurity into the Cloud is Tomorrow’s Adversary Attack Vector"

Russ Smith
Technical Director, Strategic Response Group
ZScaler

Read Abstract

Thursday: May 4, 2023

10:10 AM - 10:30 AM

"Generative AI"

Tim Gillaspie
Solutions Architect
Empower AI

Read Abstract

10:40 AM - 11:00 AM

"Managing the Risks of Generative AI to Create Trusted Outcomes"

Peter Barrett
Account Executive
Moveworks, Inc.

Read Abstract

11:10 AM - 11:30 AM

"XDR and the Correlation to Zero Trust Principles"

Patrick Greer
Senior Solutions Architect
Trellix

Read Abstract

Problem Statements:

Problem Statement #1

Generative AI

Problem Statement: Recent improvements in generative AI models have very quickly resulted in an explosion of use cases for apps like ChatGPT and Dall-E. It is becoming clear that the ability to create original content using AI is going to change the way business is conducted in every industry. DISA is investigating how we can train a model like GPT-3 using DoD data to deploy a number of uses such as creating and validating code, identifying threats and vulnerabilities, and improving user and customer experiences in getting answers to everyday questions and basic troubleshooting queries.

Problem Statement #2

IoT Security

Problem Statement: On DoD networks, and on the Internet at large, there are an increasing number of non-traditional endpoints that require the ability to phone home for purposes like cloud storage of data and centralized management. DISA is investigating how to improve security of these IoT devices by better classifying IoT network traffic so that new security policies can be developed, and how to secure these devices against attack, both at the network level and on the device itself.

Problem Statement #3

Composable Security Architecture/Extended Detection and Response

Problem Statement: The goal of both Composable Security Architecture and Extended Detection and Response technologies is to better integrate with and offer native support for digital security approaches that involve a higher degree of integration and aid in enabling automation, orchestration to improve detection and remediation capabilities. This technology space will be driven by security vendors, product leaders and product managers looking to integrate security functionalities into their products in a more modular and open approach. This will allow centralized security policy to be deployed across a diverse set of vendor products via APIs. DISA is looking to determine the state of vendor maturity in these areas.

Problem Statement #4

Cybersecurity Compliance

Problem Statement: The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. DoD is looking for inputs on tools and techniques that support industry in implementing and complying with NIST 800-171 standards in addition to feedback on barriers to adoption.

Why this is important: Answers to this problem inform DoD's prioritization of cybersecurity efforts.