TechNet Augusta 2019 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Tuesday, August 20, 3:15 PM - 3:30 PM

  • Room: Estes B
As cyber missions evolve and intensify, the right Artificial Intelligence (AI) tool is a necessary precondition for success, enabling army networks and network defenders to correlate established metrics with real-time activity data. Whether the immediate priority is defense or offense, an effective response to the modern landscape demands not only faster operational decisions, but the right decisions to counter an emerging threat or take advantage of a strategic opportunity—without requiring high-level data science skills to undertake a mission. To defend against external threats, an AI system must offer increased speed and more effective response by enabling autonomous active cyber operations. That... ...read more...
Speaker(s)
Speaker (confirmed)
Ray Cruciata
Security Specialist
Splunk
Tracks:
Handout(s)

    Tuesday, August 20, 3:35 PM - 3:50 PM

    • Room: Estes B
    Enhanced Network Visualization Environment (ENVE) is a suite of cyber products that offers visualization and automated analysis of passive network data. This unique solution enables deeper and accurate insight of network data while having the capability to be delivered as a full stack or modularized set of products. Key Features: • Reverse engineers a network and automatically generates a physical network topology • Provides real-time situational awareness (SA) of traffic on a network • Passively fingerprints devices on a network, characterizing nodes with detailed information • Intuitive interfaces that allow easy understanding of large, complex networks and fast search, retrieval of network artifacts • Automatically illuminates... ...read more...
    Speaker(s)
    Speaker (confirmed)
    Jeremy Martin
    Senior Solution Architect
    NexTech Solutions
    Tracks:

      Tuesday, August 20, 3:55 PM - 4:10 PM

      • Room: Estes B
      Like their counterparts in physical warfighting domains, cyber operators need camouflage when they conduct their missions. This session will explore how a range of emerging technologies work together to disguise operators and eliminate cyber attack surfaces from the view of adversaries. Such techniques are already in use by the DoD, the Intelligence Community, and commercial organizations to shield their cyber protection teams and to carry out cyber threat investigations, threat hunting operations, and internet-based research. Attendees will learn how these capabilities privatize the public internet using high levels of network obfuscation, multiple layers of encryption, and dynamic IP routing, and... ...read more...
      Speaker(s)
      Speaker (confirmed)
      Tom Badders
      Senior Product Manager
      Telos Corporation
      Tracks:

        Tuesday, August 20, 4:15 PM - 4:30 PM

        • Room: Estes B
        Data Services are made reliable and robust when data is treated as a system.  Leveraging capability inherent in newer protocols for data management and networking, large scale architectures can be made data-centric.  Dis-aggregation of data and service makes data systems portable across hybrid, multi-cloud environments, accelerates standardization, simplifies infrastructure and empowers distributed data discovery.  Data Services delivered with a system methodology drives operational simplicity, enablement and delivery of a data management platform “as a Service” tailored to mission need....
        Speaker(s)
        Speaker (confirmed)
        Justin Duncan, CISSP, ISSAP, ISSMP, CCSP
        Senior Systems Engineer
        Pure Storage Federal Group
        Tracks:
        Handout(s)

          Wednesday, August 21, 8:00 AM - 8:15 AM

          • Room: Estes B
          In the emergent era of great power competition, our nation's adversaries seek to achieve their strategic aims, short of traditional conflict, by the use of a stand-off approach across the warfighting domains. Our adversaries will leverage this “grey zone” conflict across Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, and Time (PMESII-PT) in an attempt to defeat U.S. power. The importance of cross-functional integrated cyber, electronic warfare and signals intelligence has been recognized for the last decade not only the United States but across our near-peer competitors and potential adversaries. As the US Army builds force structure, doctrine, and material... ...read more...
          Speaker(s)
          Speaker (confirmed)
          Raymond Reyes
          Chief Information & Business Development Officer
          Corvus Consulting LLC
          Tracks:

            Wednesday, August 21, 8:20 AM - 8:35 AM

            • Room: Estes B
            Envistacom is the world leader in communications waveform virtualization for both cloud, public and private data centers, as well as tactical edge products using high-performance computing (HPC) architectures. Envistacom has invested in this transformative technology enabling the abstraction of modem waveforms and other capabilities from purpose built, real time, and continuous data processing physical devices to virtualized applications hosted on computing platforms. As the cloud infrastructure continues to take the world by storm, the computing fabric revolution that is supporting the cloud is being supported by the HPC. The HPC is the combination of the Central Processing Unit (traditional PC... ...read more...
            Speaker(s)
            Speaker (confirmed)
            Michael Beeler
            Vice President of Waveform & Analytics Virtualization
            Envistacom LLC
            Tracks:
            Handout(s)

              Wednesday, August 21, 8:40 AM - 8:55 AM

              • Room: Estes B
              The Warfighter demand for LPI/LPD/Anti-Jam (AJ) communications against increasingly sophisticated adversaries mimics the historical contest between armor and artillery. The traditional communications approach to counter the threat uses expensive, hard-to-use, nuclear-hardened communications systems or direct-sequence waveforms to protect low capacity data links by spending large amounts of bandwidth. Viasat's approach is to arm our warfighters with affordable, resilient, high-capacity, easy to use, rapid deploy SATCOM systems that have inherent LPI/LPD/AJ protection. This requires our adversaries to bring their most exquisite and expensive systems to the field, to invest considerable resources, and yet fail against our flexible, affordable systems. Our approach... ...read more...
              Speaker(s)
              Speaker (confirmed)
              Lawrence Kingsley, Ph.D.
              Viasat, Inc.
              Tracks:
              Handout(s)

                Wednesday, August 21, 9:00 AM - 9:15 AM

                • Room: Estes B
                Bear Systems provides a new type of cybersecurity that protects devices and device communications. Bear’s solution was originally designed for lightweight IoT devices in order to consume minimal power while providing maximum device and data communications security. Bear’s Systems places full security on every device. Our solution enables lightweight device protection, data encryption and decryption, device authentication and authorization. The solution employs end-to-end AI for advanced remediation capabilities and device management. Bear’s powerful next-generation device and data communications protection and control enables ubiquitous coverage across all IoBT devices. Bear works across any type of existing network from Ethernet, WiFi and Bluetooth to... ...read more...
                Speaker(s)
                Speaker (confirmed)
                Keith Withington
                Chief Technology Officer/Co-Founder
                Bear Systems
                Tracks:

                  Wednesday, August 21, 2:45 PM - 3:00 PM

                  • Room: Estes B
                  Over the past 12 years, Cisco has published over 50 academic papers on the topic of cybersecurity analytics and a multitude of open source. We have done this because we believe that this area of study must remain transparent and open. Having said that, getting a good grade on your paper and being effective on the battlefield of the Internet is very different. Taking concepts from academia research and then applying it in the world, at scale, and with real nation state threat actors in play is something we think we have done well. Sharing this experience is important because... ...read more...
                  Speaker(s)
                  Speaker (confirmed)
                  Sunil Amin
                  Principal Engineer
                  Cisco
                  Tracks:
                  Handout(s)

                    Wednesday, August 21, 3:05 PM - 3:20 PM

                    • Room: Estes B
                    Recent innovations in radar and EW technologies, adversary capabilities, and techniques drive ECM systems towards converged and flexible systems, necessitating multifunction hardware capable of fielding a dynamic array of solutions—solutions which even evolve and react to changing mission and technique requirements through machine learning. The element level digital phased array is uniquely suited for this role, and is rapidly being matured to bring this capability to the warfighter. BAE Systems is developing a next generation ECM system based on its software defined digital array architecture. OASIS is an RF countermeasure-focused, multifunction RF system for protection of military rotorcraft and UAS.... ...read more...
                    Speaker(s)
                    Speaker (confirmed)
                    Shane Clark
                    Scientist
                    BAE Systems
                    Tracks:
                    Handout(s)

                      Wednesday, August 21, 3:25 PM - 3:40 PM

                      • Room: Estes B
                      In order to provide EW support and full spectrum cyber activities in support of Multi Domain Operations at the Operational and Tactical levels, the United States Army will require advanced early warning capabilities, new tools to provide precision targeting and collection from increased stand off ranges, and EW/Cyber tools to defeat A2/AD efforts launched by adversaries. EW/Cyber tools must be in place during the competition phase to provide enduring persistent access to adversary military communications and ISR infrastructure as well as insight to the "neutral" networks and infrastructure utilized by both adversary and US/Allied forces in foreign areas around the... ...read more...
                      Speaker(s)
                      Speaker (confirmed)
                      Herm Hasken
                      Principal Operations Consultant
                      Markpoint Technologies LLC
                      Tracks:
                      Handout(s)