TechNet Augusta 2022 Sponsorship and Branding Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
The deadline to be included in sponsor signage is Wednesday, July 20th.
Select keynote and panel sessions will be streamed over YouTube Live. Click here to access.
Wednesday, July 13, 1:00 PM - 2:00 PM
Register to attend - The webinar will run live on July 13 and will remain available on demand through TechNet.
The Army Unified Network Plan (AUNP) addresses Army information technology and the network in a comprehensive approach to enable Multi-Domain Operations (MDO). The AUNP establishes five lines of effort (LOE), number three specifically being Security and Survivability—Commander’s Freedom of Action in Cyberspace. To support LOE 3, it was imperative to reform and operationalize cybersecurity processes and the way the Army manages risk. Operationalizing cybersecurity is being implemented through the Army’s Risk Management Framework (RMF) 2.0.
Presenters will explain how RMF 2.0 shifts from a...
...read more...
Speaker(s)
Tracks:
Wednesday, July 20, 1:00 PM - 2:00 PM
Register to attend - The webinar will run live on July 20 and will remain available on demand through TechNet.
During this webinar, learn about the various paths and efforts toward recruiting America's most talented and innovative citizens and developing them into the world's most lethal, professional, ethical and technically competent cyber and electromagnetic warfare workforces. ...
Speaker(s)
Tracks:
Wednesday, July 27, 1:00 PM - 2:00 PM
Register to attend - The webinar will run live on July 27 and will remain available on demand through TechNet.
The U.S. Army’s Unified Network Plan sets the course for a Multi-Domain Operations (MDO) capable force—in essence linking its enterprise and tactical tools, systems, applications and networks. The plan will enable Army formations, as part of the joint force, to operate in highly contested, congested operational environments with speed and global range to achieve decision dominance and maintain overmatch. The plan shapes, synchronizes, integrates and governs Unified Network modernization efforts and aligns the personnel, organizational structure and capabilities required to enable MDO at all echelons.
During...
...read more...
Speaker(s)
Tracks:
Wednesday, August 03, 1:00 PM - 2:00 PM
Register to attend - The webinar will run live on August 3 and will remain available on demand through TechNet.
The Army's transition to a Unified Network will enable Multi Domain Operations while increasing the requirement for signal soldiers to have a wider understanding of how to build and protect networks while managing the large movement of data.
The U.S. Army Signal School is constantly adjusting its curriculum to align with evolving policies, doctrine and operating procedures. During this webinar you will learn how courses in the institutional school are being updated to provide education and training to facilitate operational data engineering and architecture to...
...read more...
Speaker(s)
Tracks:
Monday, August 15, 8:00 AM - 12:00 PM
Monday, August 15, 8:00 AM - 5:00 PM
- Room: Olmstead Street Level Foyer
Monday, August 15, 9:30 AM - 10:30 AM
Driven by the Biden Administrations executive order (EO) on Improving the Nation's Cybersecurity as well as agency data strategies and department-level modernization efforts, programs across the Federal Government have recognized the tremendous potential of data and the application of analytics to improve decision-making. At the same time, organizations are facing significant threats, ranging from ransomware attacks to state-sponsored espionage, that are only exacerbated with the shift to the cloud and remote work. An architecture informed by Zero Trust principles is necessary to ensure that data and systems can be protected from malicious actors, and a centralized data access control plane...
...read more...
Speaker(s)
Tracks:
Monday, August 15, 10:30 AM - 5:00 PM
- Room: Gordon Lakes Golf Course
Monday, August 15, 11:00 AM - 12:00 PM
Today it's no longer sufficient to have a good cybersecurity program in place. You need to adapt to the new norm of today's threat landscape. Organizations must assume that they will be breached and impacted by cybers attacks, but they need to support their mission and business continuity. Cyber resilience is a shift to enable organizations to put "shock absorbers" in place to withstand this volatility. In this session, Mr. Wisseman will share how cybersecurity needs to evolve in organizations so that they be better equipped to "pivot" at scale and adapt to adverse cyber events such as hacking, ransomware,...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 15, 1:00 PM - 2:00 PM
Government guidance on Zero Trust Security Architecture is gaining momentum, but changes in how we work (remote teleworking) and evolving cyber threats HEATing up will continue to impact Zero Trust guidance. Today’s threat landscape means that private and public
sector organizations can no longer rely on their users or on detection-based security tools to protect their users, critical data, and systems from attacks.
Browser Isolation gives security teams the visibility and control they need to enable a Zero Trust approach to protecting against web-borne threats.
To capitalize on the growing threat landscape, threat actors are targeting web browsers with Highly...
...read more...
Speaker(s)
Tracks:
Monday, August 15, 1:00 PM - 4:30 PM
Monday, August 15, 2:30 PM - 3:30 PM
The modern mobile smartphone revolutionizes the way life and business is conducted around the world. Smartphones are the largest source of compute minutes in the world, outpacing desktops and laptops.
The DoD will only benefit if smartphone use can be embraced. Any delay in the speed of decision making is a risk to National Security. Not being able to see and respond to information in seconds puts key leaders and operators at risk every day. Soldiers, Sailors, Airmen and Marines suffer degraded mission effectiveness and morale as smartphones continued to be banned and as DoD continues to invest in legacy desktop...
...read more...
Speaker(s)
Tracks:
A comprehensive security risk analysis is a vital component of any sound business plan. Too often, business leaders underestimate its importance and security practitioners undersell the business implications of a thorough security risk analysis. Falling into either of these traps places your risk analysis, and ultimately your business operations, at risk of failing to realize their full potential.
This session will review best practices for defining and measuring key risk variables such as Threats, Vulnerabilities, Impact, and Likelihood, how to combine them, and how to effectively communicate the analysis to stakeholders.
Aided by the perspective of an experienced security and business professional,...
...read more...
Speaker(s)
Tracks:
Monday, August 15, 4:00 PM - 5:00 PM
Before you can explore the many ways in which Artificial Intelligence (AI) can be transformative within cybersecurity, you need to grasp what AI is and is not. In this session, we will define AI, the types of AI, and the various approaches - providing a framework for understanding the practical implications of AI within cybersecurity. At the end of the session, you will be able to identify the concepts that are foundational to AI and major high-level approaches to machine learning and deep learning and how it is being used to transform the technology we are using in our lines...
...read more...
Speaker(s)
Tracks:
Handout(s)
CNN, Fox News and Greta Thunberg; they all know.
If you are paying any attention, you see what's happening. Organizations and governments are relying more and more on online services. As a result, sensitive data such as Authorization codes, Usernames, passwords and API keys are being stored in environment variables.
In this talk we will look at the security around Linux Environment Variables. I'll show you how attackers steal this data and use it against you. You will learn how certain environment variables are used by attackers to exploit your system. I'll explain different options for securing this data and the risk...
...read more...
Speaker(s)
Tracks:
Monday, August 15, 7:00 PM - 9:00 PM
Tuesday, August 16, 6:30 AM - 6:00 PM
- Room: Olmstead Street Level Foyer
Tuesday, August 16, 7:00 AM - 8:00 AM
- Room: Oglethorpe Ballroom Lobby
Tracks:
Tuesday, August 16, 8:00 AM - 8:30 AM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Tuesday, August 16, 8:30 AM - 9:15 AM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Tuesday, August 16, 9:15 AM - 10:00 AM
- Room: Oglethorpe Ballroom ABCDE
Challenges and successes that will enhance the Signal and Cyber design of a Unified Network to support command and control....
Speaker(s)
Tracks:
Tuesday, August 16, 9:30 AM - 11:30 AM
- Room: Olmstead Exhibit Hall
Tracks:
Tuesday, August 16, 9:30 AM - 6:00 PM
- Room: Olmstead Exhibit Hall
Tuesday, August 16, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center
For more information and to register, please click here.
The AFCEA TechNet Augusta Military/Collegiate CTF Competition is a 4-hour, jeopardy-Style competition for aspiring and seasoned cyber and cybersecurity professionals. This competition is a learning tool that will measure the participants current familiarity with various cybersecurity topics and will further sharpen the tools they have learned through education, training or self-learning. The CTF provides opportunities to share ideas amongst team members and with other teams, promoting the concept of continual learning for the Soldiers and students.
The Jeopardy-style CTF is similar to the actual Jeopardy game as the scoreboard looks like a Jeopardy...
...read more...
Tracks:
Tuesday, August 16, 10:15 AM - 11:15 AM
This session will provide an overview of Cyber Quest 2022 including:
DoD and Industry Participants
Planning Phases
Experiment Objectives
Execution CONOPS
Outcomes
...
Speaker(s)
Tuesday, August 16, 10:30 AM - 10:50 AM
The U.S. Army has embarked on a digital transformation at all echelons, top of mind across Army
leadership are emerging cybersecurity challenges faced by adversaries. Digital transformation during the
COVID-19 pandemic has added to the complexity and threat exposure landscape as the Army workforce
has transformed and more soldiers, civilians, contractors, and vendors reflects a hybrid workforce. This
post-pandemic situation presents challenges to Army cyber leadership coupled with major geo-political
events.
This new “normal” Army workforce coupled with stated objectives within the Army’s Unified Network
goals implies that Army users, devices, applications and data are moving towards a cloud focused
approach for application access. Legacy security solutions such...
...read more...
Speaker(s)
Tracks:
Tuesday, August 16, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center Auditorium
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 16, 10:30 AM - 11:30 AM
Over the past 20 plus years Information Security, Information Assurance and how Cyber Security have increasingly become an exercise in managing risk to the point of almost abandoning mitigating vulnerabilities. Relying organizations & consulting professionals have focused on using legacy techniques & stacking redundant symmetric authentication factors to avoid meaningful change. Security by obscurity, that has failed in the past, has once again become good enough to satisfy risk management objectives. The result is that we continue to conduct business online without confidence that the online credentials being used are accurately associated with a specific entity. We still offer little...
...read more...
Speaker(s)
Tracks:
Handout(s)
During this session, the Signal School will have instructors from various courses talk about current instruction in the classrooms to enhance the proficiency of the Signal data workforce. Subject Matter Instructors from the Signal Functional Area 26 A and B Courses along with our Warrant Officer courses will provide details of the tools and method of teaching used in the classrooms. They will also discuss future requirements and ideal solutions going forward. Signal School leaders from the proponency division and Training Development will address timelines to implements these solutions and the collection of requirements the Army and industry....
Speaker(s)
Tracks:
Tuesday, August 16, 11:00 AM - 11:20 AM
As the electromagnetic spectrum becomes more and more critical to both Army and adversary operations, it is necessary to better understand and visualize the electromagnetic environment as well as dynamically control friendly emitters under various conditions. This need is further amplified by the increasing demand for spectrum resources at home and abroad especially with respect to commercial spectrum auctions such as AWS-3, AMBIT, EMBRS, and future shared bands. Naturally, this introduces the need for intelligent and dynamic spectrum management systems that can easily monitor and quickly adapt to changes in the electromagnetic environment. To address this need, Peraton Labs is...
...read more...
Speaker(s)
Tracks:
Tuesday, August 16, 11:00 AM - 12:30 PM
- Room: Georgia Cyber Center Auditorium
Learn about PEO EIS challenges and business opportunities. PEO EIS project leaders share insights about their priorities, strategic initiatives and industry best practices....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 16, 11:30 AM - 11:50 AM
Coming soon
...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 16, 11:30 AM - 12:30 PM
Learn about the various paths and efforts toward recruiting America's most talented and innovative citizens and developing them into the world's most lethal, professional, ethical and technically competent cyber and electromagnetic warfare workforces. ...
Speaker(s)
Tracks:
Tuesday, August 16, 11:30 AM - 1:30 PM
- Room: Olmstead Exhibit Hall
Tracks:
Tuesday, August 16, 12:00 PM - 12:20 PM
Zero trust is about knowing who is doing what within your network and ensuring that in the event of anomalous activity, you can control and limit threats to the network. Applying the granularity of Privileged Access Management (PAM) to achieve zero trust objectives ensures all access is appropriate, managed, and documented, regardless of how the perimeter has been redefined. To stay agile, agencies must leverage Zero Trust principals to never trust, always verify, and only allow access when contextual parameters are met. Leveraging PAM and robust identity security strategies enables agencies to move from a network-based approach to a data...
...read more...
Speaker(s)
Tracks:
Tuesday, August 16, 12:30 PM - 1:45 PM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Tuesday, August 16, 1:45 PM - 2:00 PM
Tuesday, August 16, 2:00 PM - 2:20 PM
The Department of Defense operates in a highly complex data landscape with zettabytes of data residing in hundreds if not thousands of disparate data sources spread across an on-premises, hybrid and multi-cloud environment. Data management is a foundational pillar for overcoming data silos, improving data literacy (understanding of data), fostering data collaboration and enabling data integrity at scale. Moreover, it is critical for implementing the Federal Data Strategy, driving successful cloud migration and data modernization initiatives as well as democratizing the use of high quality and trustworthy data that is easily discoverable, certified for use and fully traceable for analytics...
...read more...
Speaker(s)
Tracks:
Tuesday, August 16, 2:00 PM - 3:00 PM
In recent years, the severity and frequency of software supply chain attacks have increased significantly. Utilizing open-source components to accelerate the development process has proven to have great advantages, which is why a staggering 98% of all code bases rely on them. However, supply chains have many blind spots or cracks that attackers can take advantage of (e.g., Solarwinds SUNBURST, and Log4Shell). Future supply chain security will move beyond Common Vulnerabilities and Exposures (CVE) scanning of the software you consume. It will encompass attack vectors such as malicious code injected in the source code you develop; the integrity of the...
...read more...
Speaker(s)
Tracks:
Handout(s)
In 2018, there were more than 31,000 cybersecurity incidents affecting government agencies. In 2019, the U.S. government accounted for 5.6 percent of data breaches and 2.1 percent of all exposed records.
It is imperative the US Government secures citizens’ information and federal agencies must continue to deliver services, regardless of cyber-attacks seeking disruption of those services. Fortunately, significant strides have been made to ensure just that.
The Biden Administration’s budget request includes roughly $10.9 billion for civilian cybersecurity-related activities, which represents an 11% increase compared to 2022. To date, over a billion dollars has been awarded through NITAAC for cybersecurity solutions including...
...read more...
Speaker(s)
Tracks:
CYBERCOM and Splunk are working together and setting the standard for hunting adversaries with a multi-tiered approach. This approach spans kits to cloud and everything in between leaving threats nowhere to run. Learn how CYBERCOM is conducting missions, what they are doing with post mission data, and how they are working towards aligning campaigns over multiple geographical locations. From moving data off the kit to cloud and leveraging APT Falconer to apply attribution, this CYBERCOM approach has something for everyone....
Speaker(s)
Tracks:
Tuesday, August 16, 2:30 PM - 2:50 PM
As the Army continues to build toward cloud enterprise architectures and move away from legacy platforms, these systems increasingly require automated data security to be readily available across the force. Policies, regulations, laws, classification rules, and other protections must be implemented and enforced effectively to ensure that the right data is going to the right people, with the right access, and for the right reasons. Applying and enforcing unified data standards across the community for Industry, Intelligence, Defense, Federal, State, and foreign partners is not realistic, but the need for data protection and data handling is an element of common...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 16, 3:00 PM - 4:45 PM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Tuesday, August 16, 4:30 PM - 6:00 PM
Wednesday, August 17, 7:00 AM - 9:00 AM
- Room: Oglethorpe Ballroom Lobby
Tracks:
Wednesday, August 17, 7:00 AM - 6:00 PM
- Room: Olmstead Street Level Foyer
Wednesday, August 17, 8:00 AM - 8:30 AM
The Army Capability Manager Networks and Services (ACM N&S) is the manager for the Army DoDIN Networks & Services for fielded and future forces ensuring mission success across the force in support of joint All-Domain operations (JADO)....
Speaker(s)
Tracks:
Wednesday, August 17, 8:00 AM - 9:00 AM
The focus on traditional enterprise IT and the convergence of Operational Technology(OT) and critical infrastructure continues to expand. There is still a large knowledge gap in defensive cyber operations on the impacts of OT and critical infrastructure and how to protect against them.
In this discussion we will cover common protocols, discovery techniques, mitigation and protection of risks....
Speaker(s)
Tracks:
Global cybersecurity threats continue to rise exponentially, contributing to an environment of sustained ongoing threats to our nation. Collaboratively, our military with public and private organizations deploy a wide range of tools to protect our nations critical infrastructure and digital assets; however, even with strong organizational protections, weak personal cybersecurity practices can contribute to a weakened security posture, placing us all at a higher risk level. This session will discuss cyber vulnerabilities that can be introduced through lax personal cybersecurity practices of individuals and their families. Strategies and skills will be shared to mitigate you or your family being the...
...read more...
Speaker(s)
Tracks:
Building Zero Trust Architectures start with determining Identity, and, from there, building trust with authentication and authorization.
Coalition Interoperability also starts with identification, authentication, and authorization. Considering the United States conducts operations with Joint and Coalition partners, the ability to securely communicate is based on the same principles.
Team GDIT’s solution built for the DISA’s Enterprise ICAM capability is a baseline that can help build trust in Coalition environments. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for Zero Trust, network micro segmentation, data protection, and Secure Access Services Edge. This identity-based approach allows...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 8:30 AM - 9:00 AM
This 30-minute session will provide the audience a briefing on current requirements for Tactical Radios and Assured Positioning, Navigation, and Timing (APNT) to support the Army....
Speaker(s)
Tracks:
Wednesday, August 17, 9:15 AM - 10:15 AM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Wednesday, August 17, 9:30 AM - 11:00 AM
Wednesday, August 17, 10:00 AM - 4:00 PM
- Room: Olmstead Exhibit Hall
Wednesday, August 17, 10:15 AM - 10:30 AM
Wednesday, August 17, 10:30 AM - 10:50 AM
A unified network needs to support multiple contexts for data and network connectivity to support customers from garrison to disadvantaged tactical users. This requires an approach that is decentralized and flexible while using standard toolsets that enable seamless operations from tactical edge to cloud. These requirements mean that traditional methods of establishing data lakes or warehouses will not work due to the requirements for responsive data transport and differences in information requirements between different echelons and organizations. Legacy approaches also experience further issues when teams need to evolve data to meet operational requirements. Traditional approaches generate rigid data dependencies controlled...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 17, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center Auditorium
The network is foundational to Army modernization by enabling the speed, range and convergence required to achieve decision dominance and overmatch. In support of the Secretary of the Army's objective to become more data centric, the Army is delivering new capabilities and integrating data-centric operational concepts into Project Convergence experimentation and unit operational exercises in the Indo-Pacific and Europe. The Army's continued momentum in simultaneously fielding and developing several capability sets, aligned to the Army Unified Network Plan and Digital Transformation Strategy, will deliver and modernize the tactical network for the Army of 2030....
Speaker(s)
Tracks:
Handout(s)
The Army Capability Manager for Cyber will provide an update on Cyberspace Situational Understanding and the Persistent Cyber Training Environment as well as forecasts of new projects. ...
Speaker(s)
Tracks:
Wednesday, August 17, 10:30 AM - 11:30 AM
A ROTC instructor from GA Tech and three military cadets from Georgia Tech, one from North Georgia University, and one from Georgia Southern University will discuss Cyber Security from a college student's viewpoint. College students, and especially those entering the military, have a unique view of cyber security - the threats, the future, and possible solutions. They also remember what first got them excited about cyber security and how they hope to make a difference in our world. Attendees at this session should come away with a fresh look at cyber security, the environment surrounding it, and possible solutions/proposed solutions...
...read more...
Speaker(s)
Tracks:
State-sponsored cyber attacks are so pervasive today that there are networks that have experienced hacks and networks that will experience a hack in the future. How can you mitigate this type of threat? This practical and interactive session will focus on the candid firsthand lessons learned from one of the most sophisticated attacks in U.S. history. Gain insight into successfully predicting vulnerabilities, assessing risk, ensuring compliance, communicating with stakeholders, and trusting your network is ready....
Speaker(s)
Tracks:
Handout(s)
Approved for 1 CompTIA CEU for A+, Data+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, and CASP+, 1 GIAC CPE, and 1 CertNexus CEC for CFR
Wednesday, August 17, 10:45 AM - 11:45 AM
- Room: Georgia Cyber Center
NOTE: Registration for both classified sessions has reached capacity.
The session will be held at the SECRET level.
The Army’s modernization priorities depend on timely, accurate, and available deep sensing for kinetic and non-kinetic effects across the crisis continuum to support both Multi-Domain Operations and achieve the strategic goals for Joint All Domain Command and Control (JADC2). Intelligence capability modernization is necessary to sense, decide, and act at the speed and scale of modern and future combat where National, Joint, and Commercial sensors are available across all domains. As necessary as sensing and acting capabilities are, technology and the supporting architectures to...
...read more...
Speaker(s)
Wednesday, August 17, 11:00 AM - 11:20 AM
As technology advances, cyber security breaches in classified military environments have grown exponentially. In this tech talk, we’ll cover the following topics:
Mobile device threats in secure work environments
Building rapid device deployment timelines
Importance of cybersecurity training for military personnel
In 2019, the research found that 24% of all enterprise mobile devices were prone to threats, not including out-of-date software. Securing company and organizational data is no longer about physical security; it's about digital protection. In a world where mobile devices are essential in many fields, there is a heightened risk of network vulnerability. ID Technologies’ Archon ZV secure laptop or phone is...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 11:00 AM - 11:30 AM
The Army Capability Manager for Electromagnetic Warfare will provide a briefing on current requirements for electromagnetic warfare and spectrum management to support the Army....
Speaker(s)
Tracks:
Wednesday, August 17, 11:00 AM - 12:30 PM
- Room: Georgia Cyber Center Auditorium
The network is foundational to Army modernization by enabling the speed, range and convergence required to achieve decision dominance and overmatch. In support of the Secretary of the Army's objective to become more data centric, the Army is delivering new capabilities and integrating data-centric operational concepts into Project Convergence experimentation and unit operational exercises in the Indo-Pacific and Europe. The Army's continued momentum in simultaneously fielding and developing several capability sets, aligned to the Army Unified Network Plan and Digital Transformation Strategy, will deliver and modernize the tactical network for the Army of 2030....
Speaker(s)
Tracks:
Wednesday, August 17, 11:30 AM - 11:50 AM
For years the Army has focused on developing the perfect waveform. By the time the waveform is ready for use, it is normally 5 to 10 years behind the threat or commercial capabilities have out-paced the developmental program. Phantom offers a shift in paradigm in a ready-now solution focused not on development but on providing immediate impact. A combination of three existing products, Phantom is ready for testing and employment immediately, and delivers a transport environment that is waveform agnostic, lightweight, secure, and randomly diverse in path selection providing a true multi-path, hiding in plain sight networking capability. It enables...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 11:30 AM - 1:30 PM
- Room: Olmstead Exhibit Hall
Tracks:
Wednesday, August 17, 12:00 PM - 12:20 PM
Defense Department IT professionals have practiced a defense-in-depth strategy for years relying upon a series of firewalls for fundamental security against predicted and known threats. However, in today’s post COVID-19 world, the attack surface is changing as network access is moved away from traditional perimeter based security to cloud based security, making the former security strategy increasingly irrelevant as a way to protect networks, data, and intellectual property. That’s especially true given the proliferation of privileged accounts that give users the ability to access sensitive data and applications, including ubiquitous devices, like smartphones and tablets, that allow access to Department...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 17, 12:00 PM - 12:30 PM
- Room: Oglethorpe Ballroom ABCDE
USCENTCOM’s Collaborative Partner Environment (CPE) is a secret releasable network that is based on Zero Trust principles, Identity Credential and Access Management (ICAM), and Attribute Based Access Control (ABAC) to allow collaboration between USCENTCOM and all its partners while protecting access at the object level. Additionally, CPE has been designated as the pathfinder for Joint All Domain Command and Control (JADC2) LOE 1, 2, 3, 5 and Mission Partner Environment (MPE). In its current state CPE provides protected chat, e-mail and SharePoint. ...
Speaker(s)
Handout(s)
Wednesday, August 17, 12:15 PM - 1:15 PM
- Room: Georgia Cyber Center
NOTE: Registration for both classified sessions has reached capacity.
The session will be held at the SECRET level.
The Army’s modernization priorities depend on timely, accurate, and available deep sensing for kinetic and non-kinetic effects across the crisis continuum to support both Multi-Domain Operations and achieve the strategic goals for Joint All Domain Command and Control (JADC2). Intelligence capability modernization is necessary to sense, decide, and act at the speed and scale of modern and future combat where National, Joint, and Commercial sensors are available across all domains. As necessary as sensing and acting capabilities are, technology and the supporting architectures to...
...read more...
Speaker(s)
Wednesday, August 17, 12:30 PM - 12:50 PM
The modern operational theater operates in a contested joint environment. In this environment speed and security of access across the unified network mean the difference in operational success. When fully leveraged, the unified network enables new forms of maneuver across the joint environment. To assure success, rapid access to data across the cloud and edge to the unit enable maximum agility for the commander, leader, and soldier to operate with reliability of communications and engage the data for the multi-domain enabled mission. As a part of this capability, identity least-privilege access to attributes enables rapid and secure access to these...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 17, 1:00 PM - 1:20 PM
The Zero Trust framework shatters the archaic perceptions of how to operate securely...it provides freedom and security of movement across networks, not just within one with the one with a strong security perimeter. While most people believe Zero Trust is a better security framework than the "walled garden" approach, there are several issues that need to be addressed before Zero Trust becomes reality. Governance, policy, funding, and the technical implementations of a Zero Trust architecture require substantial work and investigation before we can realize the benefits and move beyond the paradigm of "trusted" networks to a more resilient and robust...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 1:30 PM - 2:15 PM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Wednesday, August 17, 2:30 PM - 2:50 PM
Evolving into the future fighting force, the Army must utilize data as the critical component in determining the outcome of military operations. Success in the operating environment hinges on the ability of Army decision-makers to have real-time information available to realize decision dominance. Supporting the need for real-time data means the Army must operate on a common data fabric leveraging speed, security, and simplicity at echelon while understanding the dynamics and complexity of its globally distributed systems. The resulting benefit is an information repository with agility, scalability, and integrity while operating in contested operating environments.
Starting with the fundamental question...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 2:30 PM - 3:30 PM
Defensive cyber operations are becoming more and more complex, and our adversaries are beginning to research and employ advanced AI based methodologies and capabilities which we must meet at the edge.
In this discussion we will cover what AI capabilities are being utilized, what industry partners are providing to meet the needs of defensive cyber operations and how these capabilities enhance our cyber warfighters....
Speaker(s)
Tracks:
The Indo-Pacific Area of Responsibility (AOR) requires a persistent forward Joint Operational/Tactical Force that can C2 and synchronize/integrate multi-domain operations and effects. The Corps must maintain persistent forward presence consisting of smaller distributed C2 nodes scalable IOT meet shifting demands. This nodal operating concept requires a network that helps distribute all of the Warfighting Function capabilities across nodes. The collective of all the nodes will be purpose built and task organized by mission---always maintaining the ability to receive forces and provide command and control. This inherently demands a network architecture to quickly absorb and C2 forces, communicate across Warfighting Functions...
...read more...
Speaker(s)
Wednesday, August 17, 2:30 PM - 4:00 PM
Recommended for acquisition training...
Speaker(s)
Tracks:
Wednesday, August 17, 2:30 PM - 4:30 PM
Join CompTIA, Elasticsearch By Light, and ThinkDataSolutions in a 2-hour, live mini bootcamp. We will investigate the data analytics skills and security best practices that make it possible to make great decisions in the field. Our Augusta session will focus on providing an overview of the skills and best practices taught and validated by the Data+ certification. The first hour of the event will be instructor-led. It will provide an overview of the Data+ certification, giving you a preview of the skills taught in the certification. For the second hour, we will then have an industry-focused panel with data experts...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 2:45 PM - 3:15 PM
- Room: Georgia Cyber Center Auditorium
In great power competition, the need to see across further distances, shorten the sensor to shooter chain and enhance commander decision making is critical to multi-domain options. At Program Executive Office Intelligence, Electronic Warfare and Sensors, Project Management Offices are delivering advanced deep sensing and data analytics capabilities to Soldiers every day. This back-to-back session will open with senior program executive office leadership offering views on how the current environment, acquisition trends and soldier feedback is dynamically changing how we deliver capabilities. Our second session is a panel, made up of senior experts from the acquisition and requirements communities, who...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 3:00 PM - 3:20 PM
The Army needs a reliable, scalable data transport mechanism to deliver sensor data from origination through all points of consumption; at the edge, on-premise, and in the cloud in a simple, secure, universal, and scalable way. The data transport architecture should provide guaranteed delivery, even in contested or denied, disrupted, intermittent or limited bandwidth (DDIL) environments. These requirements can be addressed by a Universal Data Distribution (UDD) architecture.
UDD provides a wide range of extensible capabilities ranging from real-time data ingestion, edge processing, transformation, and routing through to descriptive, prescriptive, and predictive analytics. UDD provides the capability to connect to any...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 3:15 PM - 4:45 PM
- Room: Georgia Cyber Center Auditorium
In great power competition, the need to see across further distances, shorten the sensor to shooter chain and enhance commander decision making is critical to multi-domain options. At Program Executive Office Intelligence, Electronic Warfare and Sensors, Project Management Offices are delivering advanced deep sensing and data analytics capabilities to Soldiers every day. This back-to-back session will open with senior program executive office leadership offering views on how the current environment, acquisition trends and soldier feedback is dynamically changing how we deliver capabilities. Our second session is a panel, made up of senior experts from the acquisition and requirements communities, who...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 3:30 PM - 3:50 PM
Developing a comprehensive situational awareness capability requires the ability to connect sensor data from multiple domains across the enterprise. In DoD, this effort is complicated by decentralized data sources, tactical networks experiencing intermittent comms and of course multi domain networks at various classification levels. While traditional approaches to situational awareness typically involve a data lake approach which requires selective forwarding of data to centralized locations, valuable insights could be lost because data is typically restricted by classification domain and not all the data is accessible. WWT will show a new approach for situational awareness and data analytics that can provide...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 4:00 PM - 5:00 PM
- Room: Oglethorpe Ballroom ABCDE
No situations are risk free!
Implementing risk management is a key to good decision-making and is essential for strong cybersecurity.
For wise policy, engineering, and operations, leaders must understand vulnerabilities and mitigation options. Join senior leaders in cybersecurity to learn about risk management challenges and opportunities they have faced, including security, privacy, and cyber supply chain risk management activities. Discussion will center on the NIST Risk Management Framework, which can be applied to all types of system or technology, including the Internet of Things and control systems, and within all organizations, regardless of size or sector.
Topics will include:
How can we better understand risk management in cybersecurity and in daily life?
What is...
...read more...
Speaker(s)
Tracks:
Wednesday, August 17, 5:00 PM - 6:30 PM
Please join us in the Riverwalk Hallway at the conclusion of the Senior Cyber Leaders Discuss Risk Management Challenges and Opportunities session for a networking reception that also features a student poster show and cyber demonstration.
To register as a poster presenter, please complete this form and return it to usarmy.gordon.cyber-coe.list.g357-outreach@army.mil...
Tracks:
Wednesday, August 17, 6:00 PM - 9:00 PM
- Room: Salt & Marrow Kitchen, Crowne Plaza North Augusta
Tracks:
Thursday, August 18, 7:00 AM - 8:00 AM
- Room: Oglethorpe Ballroom Lobby
Tracks:
Thursday, August 18, 7:00 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Thursday, August 18, 8:00 AM - 8:45 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Handout(s)
Thursday, August 18, 8:00 AM - 3:30 PM
- Room: Georgia Cyber Center Classrooms
Thursday, August 18, 8:30 AM - 10:00 AM
- Room: Olmstead Exhibit Hall
Tracks:
Thursday, August 18, 8:30 AM - 1:00 PM
- Room: Olmstead Exhibit Hall
Thursday, August 18, 9:00 AM - 9:20 AM
The Army has a requirement to design, operate and maintain a unified network to counter emerging threats, enable new forms of maneuver and allow the commander to fully leverage capabilities across echelons to execute Multi-Domain Operations. As maneuver formations become cloud enabled, the ability to ensure reliability of communications while leveraging common data hosted both on premises at the unit and off premises in a cloud environment, with no loss of continuity, is essential. Essential elements of the Unified Network include: To optimize the unified network strategy, The Army must approach domains of operating and securing the network as any...
...read more...
Speaker(s)
Tracks:
Thursday, August 18, 9:00 AM - 10:00 AM
Thursday, August 18, 9:00 AM - 1:00 PM
A critical aim of this conference is to expose local middle and high school students to information regarding cutting-edge technological advancements. Information presented at TechNet conference aligns with the Pathway to Cyber Security Systems curriculum, STEM, and Junior Reserve Officers’ Training Corps (JROTC). This event is an outlet for students to attend Cyber and STEM demonstrations and offer students an opportunity to participate in key activities.
9:00am
Arrival/Registration
9:30am - 10:00am
Ms. Ciera Williams and Mr. Kevin Thompson, NSA Georgia
10:00am – 10:30am
Mr. Deonte’ Morrison, ARCYBER “How to Prepare Now for A Cybersecurity Career”
10:30pm - 12:00pm
Tour the exhibit floor
12:00pm – 12:30pm
Lunch; DS Judith Holley, Cyber...
...read more...
Speaker(s)
Handout(s)
Thursday, August 18, 9:30 AM - 9:50 AM
Environment and Infrastructure Orchestration and Automation. The need for infrastructure access is exploding. Whether hosted on-premises, in the cloud, or in a hybrid environment, the teams responsible for executing the strategy have the need to access infrastructure, data, and application resources quickly. Their goals and expectations depend on it. TSI customers balance speed and innovation with governance and control through an Environments as a Service approach. End users access pre-built blueprints containing all the resources for the environments they need, while administrators control how the resources in those blueprints are used. Whether to support application development, QA testing, network labs,...
...read more...
Speaker(s)
Tracks:
Thursday, August 18, 9:30 AM - 10:00 AM
- Room: Georgia Cyber Center Auditorium
Speaker(s)
Tracks:
Thursday, August 18, 10:00 AM - 11:00 AM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Thursday, August 18, 10:00 AM - 11:30 AM
- Room: Georgia Cyber Center Auditorium
PEO STRI is the U.S. Army’s acquisition lead in delivering unmatched testing, training and information operations to enhance operational readiness in support of national defense. The Army is looking to PEO STRI as the primary organization responsible for Readiness and Modernization in the modeling and simulation, training and testing domains. PEO STRI is continuously exploring how we outpace the threat to deliver relevant information operations capability and tactics to the training battlefield. PEO STRI’s panel will focus on cyber resiliency capabilities and options for continuous monitoring and outpacing the threat by delivering relevant information operations to the test and training...
...read more...
Speaker(s)
Tracks:
Thursday, August 18, 11:00 AM - 1:00 PM
- Room: Olmstead Exhibit Hall
Tracks:
Thursday, August 18, 11:30 AM - 11:50 AM
To combat security threats in the operational environment, cyber operations teams and cyber protection teams rely on a wide variety of security solutions to protect networks from cyber-attacks and traffic anomalies. These tools require a variety of data sources including logs, but an ongoing critical need is the packet data itself. To enable access of critical packet data to a central platform, the program will need to deploy an intelligent high availability security visibility architecture that supports both inline and out-of-band packet processing across a distributed infrastructure. Keysight recommends implementing the following best practices to create maximum data capture, data...
...read more...
Speaker(s)
Tracks:
Thursday, August 18, 12:00 PM - 12:20 PM
Organization’s data needs are not slowing down. In fact, 71% of organizations today feel that their data is growing at a concerning rate. Federal organizations are facing the challenge of defending enterprises at the multi-million endpoint scale and traditional approaches to security fall apart at the size of Government. This requires new methods for collecting and detecting threats at the petabyte to exabyte scale. Organizations, such as the Army, are not immune to this challenge, but rather more susceptible as the needs of the networks must always match the needs of the Warfighter. Multi-cloud environments, microservices, and observability, logging, and...
...read more...
Speaker(s)
Tracks:
Thursday, August 18, 12:30 PM - 1:15 PM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Thursday, August 18, 1:15 PM - 1:30 PM
- Room: Oglethorpe Ballroom ABCDE
Speaker(s)
Tracks:
Thursday, August 18, 4:00 PM - 6:00 PM
Thursday, August 18, 6:00 PM - 8:00 PM
Friday, August 19, 7:30 AM - 9:00 AM
Friday, August 19, 9:00 AM - 4:00 PM
Friday, August 19, 5:30 PM - 11:30 PM
The All-Service Ball Committee welcomes you to the 2022 All-Service Ball. This year’s event will be held at the Marriott Convention Center in Augusta, Georgia on Friday, August 19th from 5:30PM to 11:30PM. Join us in celebrating the rich traditions of the Signal and Cyber Corps while continuing your professional networking!
text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-decoration-thickness: initial;
text-decoration-style: initial;text-decoration-color: initial;word-spacing:
0px">Click here for details and to purchase tickets or sponsorship packages...
Tracks: