TechNet Cyber Sponsorship Opportunities

Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2019 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a sponsorship? Let us know! We are happy to discuss possibilities with you. Contact us today!

Booz Allen Hamilton  

McLean,  VA 
United States
  • Booth: 1723

For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. Together, we will find the answers and change the world. To learn more, visit (NYSE: BAH)

 Press Releases

  • Booz Allen Hamilton, a leading strategy and technology consulting firm, has deep functional knowledge and expertise spanning strategy, engineering, operations, technology, and analytics to help clients solve their toughest problems.

    Live demonstrations include the following capabilities and services:

    AI Cybersecurity Solutions: Cyber Precog is the only end-to-end, fully graphics processing unit enabled cyber defensive capability on the market. Through collaboration and co-development with NVIDIA, Booz Allen has architected a novel artificial intelligence (AI) solution than can be deployed to both the network center or the network edge to provide adaptive AI-powered enrichment at network speed. Cyber Precog’s pipeline has been designed to provide cyber-oriented workflows and use cases to a network security operations center, delivered in an intelligent and interpretable manner. The AI suite offers advanced capabilities to detect adaptive domain-based attacks, malware, beaconing-based attacks, and credential misuse resulting in lateral, adversarial movement. The suite also offers a novel, adaptive reinforcement learning capability to detect malicious anomalies that are signature agnostic, with 95% accuracy and full user interaction.

    AI Cyber Defense: Expanding attack surfaces and increasingly sophisticated adversaries have driven organizations to deploy more tools and sensors to increase visibility and control across the enterprise. While providing improved visibility, these tools and sensors have increased the workload of cybersecurity experts and inundated them with alerts and false positives. AI can be used to analyze data from various sensors and quickly identify attacks using behavior analysis, versus relying on traditional signature-based methods. Malicious events identified by the AI system can be fed into automation and orchestration platforms to take immediate action in triaging and remediating the threat. Booz Allen leveraged experience from software-defined, machine learning (ML), and unified collaboration (UC) engagements to deliver an automated threat detection and response capability accessible to help desk operators. Our Machine Intelligence, Network Defense, Security Orchestration, Automation, and Response (MINDSOAR) capability utilizes a containerized ML platform and develops a continuous training environment where models are constantly being trained and deployed and are accessible to help desk operations through a chat client.

    Automation and Orchestration: As networks become more complex with multi-vendor environments, frequent user changes, and changing compliance validation requirements, network automation can configure systems, deploy software, and orchestrate more advanced tasks such as continuous deployments or zero downtime rolling updates improving network resiliency by increasing change accuracy and performing changes faster. We’ve implemented automation tools like Ansible to reduce manual labor and simplify activities to address these challenges.

    Immersive Cyber Learning: Cyber Centurion is a virtual cyber environment that allows the entry-level analyst or operator to view the network from multiple aspects, display different features of the network, learn about network requirements, and expand abstract thought related to network behaviors with the aid of a virtual interface to guide and prompt the user. Within the environment, users can maneuver in and around a network, manipulate the network from a macro perspective, and work with individual elements of the network to build and then defend their network. As students engage with different components of the network, such as firewalls or routers, they must identify the component and then select the appropriate course of action to remediate the event to return their network to normal state.

    Network Access Control Capability for Comply to Connect (C2C): Every device connected to an agency network should comply with appropriate policies and configurations for that type of device (e.g., printer, laptop). It’s important to enforce this compliance before devices connect and before rogue, unauthorized, or already infected devices can be used as an attack vector. We are implementing robust network access control solutions for the Federal Government that can be applied to C2C by performing security posture checks as each device connects—before allowing any access privileges. Our solution stack monitors, classifies, and authorizes endpoint access across an enterprise. From simple MAC Address Bypass to complex security posture assessments, our solution integrates with enterprise security capabilities for a comprehensive assessment of endpoint compliance.

    Resiliency Decision Support: Modern enterprise networks are complex and vulnerable to degradation and disruption. This begs the question: How should an organization identify the biggest impacts to their network performance and apply resources, so these issues can be resolved quickly and within budget? We’ve taken a proactive stance toward network modernization by engineering a resiliency maturity index based on five core network key performance indicators (KPI): bandwidth, latency, resource utilization, topology redundancy, and compliance. The index educates and guides leadership into making smart investments by backing the decision-making process with resiliency scores supported by actual data.

    Secure Tactical Mobility: The National Security Agency’s Commercial Solutions for Classified (CSfC) Program enables secure wireless access to classified information within a tactical environment using commercially available products. Explore our ruggedized, deployable Secure Tactical Mobility offering that leverages CSfC-approved software components and WiFi-connected end-user devices to provide classified voice and collaboration services over private network connections.

    About Booz Allen

    For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. Together, we will find the answers and change the world. To learn more, visit



  • District Defend® Secure Mobility Solution
    Free your devices to go anywhere without compromising security...

  • Higher productivity, increased employee satisfaction, and lower operating costs are just some of the draws to adopting workplace mobility. But for many high-security workplaces, these benefits have remained out of reach—until now.

    With District Defend, you no longer need to sacrifice mobility for the sake of security. You can have both.

    Free your staff to move from the board room to the war room and every room in between on a single, secure device. Installed on laptops and tablets, District Defend is a context-aware solution that automatically matches the security settings of a device to the security requirements of its physical location. With a District Defend-equipped device, employees are no longer chained to their desks or burdened by keeping track of multiple devices for different security settings.

    District Defend can change security settings on a mobile device based on multiple contextual triggers:

    1. Physical location
    2. Network connectivity status
    3. Time-based permissions
    4. Individual employee characteristics (e.g. title, department or security clearance)

    How it Works

    Devices enabled with District Defend are secured through centrally-administered, situation-based controls. Using an intuitive web application, administrators can easily set policies that automatically reconfigure the security posture of individual devices. Policies can be enforced at the individual, group, and enterprise level.

    Key Features & Benefits

    Automated Enforcement Takes Staff Compliance Out of the Equation
    As a physical component, District Defend doesn’t rely on actions taken by end users to maintain compliance. Automated enforcement ensures that your mobile employees are working securely, wherever they happen to be.

    Secures Against Threats that Mobile Device Management (MDM) Can’t
    Unlike MDM solutions, District Defend sits below the Operating System (OS). By operating in the device’s firmware, it secures devices against a wider range of attacks and protects them during the boot process when they’re most vulnerable.

    Controls Devices Even When They’re Off
    District Defend continues to communicate security policies to powered off devices via Radio Frequency Identification (RFID) so they never miss a beat, so that as soon as devices turn on, they automatically adjust features to reflect the appropriate device setting.

    Know Where Your Devices Are
    District Defend gives your administrators full insight into the last known location of enterprise IT assets.

    Protection for Lost or Stolen Devices
    In addition to vigorous anti-tampering mechanisms, District Defend enforces data-at-rest encryption and enables pre-boot full disk wipes to ensure long term data protection.

    For more information, please go to: