About TechNet Cyber
The cyberspace battlefield has changed. No longer an arena where adversaries launch a single distributed denial of service attack, lob a virus or infiltrate a network, it is now a state of persistent barrages and simultaneous campaigns. Attacks against high-value targets still occur, but they are accompanied by a torrent of continuous assaults on political, economic and security interests.
Reflecting this altered, enlarged, and pan-organizational battle-space, the Defensive Cyber Operations Symposium has been re-named AFCEA TechNet Cyber, forming one of the pillars of the TechNet brand and encompassing both DoD as well as civilian agencies across a broad spectrum of mission sets.
Both offense and defense in this landscape requires a united front where no frontlines exist. A powerful cyber force built on a strong bond between government agencies and allied nations will be the only way to combat adversaries bent on not only destroying one country but also dominating all of cyberspace. Partnerships with industry fortify that foundation by providing innovation, expertise and novel thinking.
TechNet Cyber 2019 will be the staging area for military, industry and academia to discuss and plan how to achieve persistent engagement, persistent presence and persistent innovation. It is the opportunity to devise a new strategy to build resilience and defend networks.
TechNet Cyber Frequently Asked Questions
Who attends TechNet Cyber?
When/where does the symposium take place?
When is the exhibit hall open?
Registration and Program Questions
How much does it cost to attend?
What programs are available at TechNet Cyber?
Know Before You Go
Where do I pick up my badge?
Where can I park?
What is the dress code?
Who should I contact for assistance?
Photography/Videography/Audio Recording Policy
Exhibit & Sponsor Information
How can I exhibit at and/or sponsor?
What additional resources are available?
Prepare to be Aware
Conferences present opportunities for America's adversaries to target U.S. government employees, academia, defense industry and other personnel to collect our critical information. Be a hard target! Use good OPSEC practices to protect yourself and your organization's mission.
- Be aware of your surroundings when discussing sensitive unclassified critical information during the conference and after hours, in common/public areas (e.g. social gatherings, networking mixers, etc.).
- Be suspicious of strangers. Even though they sound like they belong at the conference, don't assume they are there for the same purpose as you.
- Use caution when sharing information with someone you don't know. Ask others to confirm a person's identity before sharing critical information about your organization's past, ongoing or future operations/activities/events. Protect your personal information, such as your room number and daily schedule. Don't give out your business cards freely, particularly when outside the United States. Remember, phishing is still the #1 adversary threat vector into your personal and government computers/devices/networks.
- If you use a laptop or other portable electronic device (personal or government-owned), use it cautiously. Disable the Bluetooth and WLAN/Wi-Fi connections when not in use, and if you use this type of connectivity, understand that you may expose personal and work-related critical information to an adversary. Be especially cautious when using unencrypted/unsecure WLAN/Wi-Fi hotspots.
BE SMART! BE SAFE! PRACTICE GOOD OPSEC!