TechNet Augusta 2019 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Solution Review: Conducting Secure Cyber Missions Using Network Obfuscation and Managed Attribution

  • Room: Estes B
Tuesday, August 20, 2019: 3:55 PM - 4:10 PM

Speaker(s)

Speaker (confirmed)
Tom Badders
Senior Product Manager
Telos Corporation

Description

Like their counterparts in physical warfighting domains, cyber operators need camouflage when they conduct their missions. This session will explore how a range of emerging technologies work together to disguise operators and eliminate cyber attack surfaces from the view of adversaries. Such techniques are already in use by the DoD, the Intelligence Community, and commercial organizations to shield their cyber protection teams and to carry out cyber threat investigations, threat hunting operations, and internet-based research. Attendees will learn how these capabilities privatize the public internet using high levels of network obfuscation, multiple layers of encryption, and dynamic IP routing, and how managed attribution masks the identity and location of personnel to ensure total protection as they conduct their operations. These same capabilities can also hide servers, applications, and unified mobile communications to ensure completely private voice, text, video, and chat over any device. Attendees will leave the session with a better understanding of these techniques and greater insights into how they protect people, assets, and operations in the digital domain to minimize operational risk and to help achieve mission success.

Tracks: