TechNet Cyber Supporting Partner Opportunities (Advertisements and Supporting Partner recognition does not imply federal endorsement.)


Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2021 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!

Branding Opportunities Deadline: October 1st
Patron Package and Individual Opportunities Deadline: October 15th

Engagement Theater 1: Thunderdome (Zero Trust)

  • Room: Swing Hall, 2700/2800 Aisle
Wednesday, October 27, 2021: 2:00 PM - 3:00 PM

Speaker(s)

Moderator (confirmed)
Stephen M. Wallace
Emerging Technology Directorate, Enterprise and Innovation Center
Defense Information Systems Agency
Panelist (confirmed)
Joseph Brinker
Security Enablers Portfolio Manager, Cyber Development Directorate
Defense Information Systems Agency
Panelist (confirmed)
Angela Landress, Ph.D.
Chief, Cyber Development Directorate
Defense Information Systems Agency
Speaker (confirmed)
Andrew "Drew" Malloy
Technical Director, Cyber Development Directorate
Defense Information Systems Agency

Description

While the current defense-in-depth architecture has protected DoD data from adversaries in the past by placing various security products at multiple tiered locations, it has created silo’ed security architectures across NIPR and SIPR. The purpose of Thunderdome is to create a new zero trust security and network architecture that is dynamic, adaptable and can be extended from the user to the data edge. ​There are a lot of ways to describe zero trust, but there are three big, basic tenets of modern zero trust implementations: verify the user AND the device, make access and privileges conditional, and lastly, verify the data and applications explicitly. The bottom line is that it is data centric, and multi-attribute confidence levels enable authentication under the concept of least privileged access, which directly gets after the DoD Modernization Strategy.

Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, and Linux+; 1 GIAC CPE; and 1 CertNexus CFR CEC


Tracks: