TechNet Augusta 2019 Sponsorship and Branding Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
Monday, August 19, 9:30 AM - 10:30 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Just like the Cloud, most people may not have heard of the Internet of Things (IoT). However, they will, and they continue to fuel the ever-expanding landscape of the devices and services, while not even realizing it. As this occurs, the Internet of Things (IoT) population of endpoints and data continues to rapidly grow accordingly. How does that impact Cyber Electromagnetic Activities (CEMA)? In this session, we will discuss:
Overview of IoT Capabilities as well as current and future trends
Mapping of trends/implementations...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 11:30 AM - 12:30 PM
Approved for 1 CompTIA CEU: A+, Network+, Cloud+; 1 CertNexus CFR CEC
The Army's tactical network modernization strategy is focused on delivering a resilient, unified network that can help prepare our forces to fight and win against any adversary, in the most challenging contested and congested electromagnetic spectrum and cyber environments. The Network Cross Functional Team (CFT) and Program Executive Office for Command, Control, Communications (PEO C3T) will discuss how the Integrated Tactical Network balances network resiliency and information dominance through an integrated, multi-path system of systems approach.
Objectives: After completing this session, attendees will have a greater understanding of the Integrated...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:15 PM - 3:30 PM
As cyber missions evolve and intensify, the right Artificial Intelligence (AI) tool is a necessary precondition for success, enabling army networks and network defenders to correlate established metrics with real-time activity data. Whether the immediate priority is defense or offense, an effective response to the modern landscape demands not only faster operational decisions, but the right decisions to counter an emerging threat or take advantage of a strategic opportunity—without requiring high-level data science skills to undertake a mission.
To defend against external threats, an AI system must offer increased speed and more effective response by enabling autonomous active cyber operations. That...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:15 PM - 4:15 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Objective: To relate the vision and pillars of the 2018 National Cyber Security Strategy and their dependence on the security of our supply chain. The audience should walk away with an idea of how the government and some industry members are addressing the vision, responses, and impacts. This panel discussion should raise awareness of security risks as the government and industry work together on future acquisitions.
The Sept 2018 National Cyber Security Strategy is changing our national vision regarding Supply Chain...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:55 PM - 4:10 PM
Like their counterparts in physical warfighting domains, cyber operators need camouflage when they conduct their missions. This session will explore how a range of emerging technologies work together to disguise operators and eliminate cyber attack surfaces from the view of adversaries. Such techniques are already in use by the DoD, the Intelligence Community, and commercial organizations to shield their cyber protection teams and to carry out cyber threat investigations, threat hunting operations, and internet-based research. Attendees will learn how these capabilities privatize the public internet using high levels of network obfuscation, multiple layers of encryption, and dynamic IP routing, and...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 8:00 AM - 9:00 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 1 GIAC CPE; 1 CertNexus CFR CEC
Students should come away from this course with an understanding of the major successes and challenges associated with Artificial Intelligence (AI) and Machine Learning (ML) to include understanding the differences and relationship of each to the other and the cyber security skillset requirements for AI or MI integration.
The presentation will address some of the major success and challenges associated with AI and MI along with the tools and system integration aspects for Cyber Security and Network Operational roles:
An overview on...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 11:30 AM - 12:30 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Because it can be so lucrative, malware has emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. Learn how threat actors are targeting organizations with frightening effectiveness by researching their human targets before launching a malware attack. Once the victim is chosen and the malware deployed, the threat actor remains connected, lurking on victims' computers until they can grab banking details, credit card data, and other sensitive information. This session shows how attackers know their...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 2:00 PM - 4:00 PM
- Room: Nelson Hall Studio B/Fort Gordon
Approved for 2 CompTIA CEUs: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 2 CertNexus CFR CECs
Event Organizer: PEO STRI, AECOM and AFCEA International
Event Theme: ADVANCING CYBER TRAINING: An Evolution from 'Classic' Cyber Training to delivering a Secure and Live, Virtual & Constructive (LVC) Training Environment for Cyber Mission Forces
Description: The intent of this classified conference is to focus on select critical needs for enhancing CYBERCOM and subordinate organization capabilities to identify and mitigate threats while advancing Cyber Warrior skills and readiness. Our objective is to assist Army Acquisition Senior Leaders in thinking through the cyber “challenge” and provide innovative insights...
...read more...
Tracks:
Thursday, August 22, 1:00 PM - 3:30 PM
- Room: Oglethorpe Ballroom A-E
Each PEO will provide a 20-25 minute update of their respective role and responsibilities followed by 5-10 minutes of Q&A; 30 minute break after first two sessions.
1300 – 1330: PEO C3T
1330 – 1400: PEO EIS
1400 - 1430: Break
1430 - 1500: PEO IEW&S
1500 - 1530: PEO Soldier...
Speaker(s)
Handout(s)
Thursday, August 22, 3:45 PM - 5:00 PM
- Room: Oglethorpe Ballroom A-E
Recommended for Acquisition Training
This session focuses on Other Transaction Agreement (OTA) and new contract vehicles that have not been presented in this format at other venues or conferees. Attendees will learn that on May 14, 2020 the Defense Security Service (DSS) and Defense Information Systems Agency (DISA) awarded an Other Transaction Agreement (OTA) for nearly $75 million. The objective with the OTA contracting vehicle is to "integrate new bold and transformational approaches from the National Background Investigation Service (NBIS) architecture and take the next step with technology to integrate and align others mission" as stated by Terry Carpenter, PEO for...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 5:00 PM - 6:30 PM
Friday, August 23, 9:30 AM - 10:30 AM
Defensive Cyber Operations (DCO) has been busy. Within the last 18 months, it established three new organizations, implemented the Cyber Operations Broad Responsive Agreement (COBRA) Other Transaction Authority (OTA) and opened The Forge, a cyber innovation center at Fort Belvoir, Virginia. Learn about upcoming DCO opportunities and how industry can leverage The Forge in this informative session....
Speaker(s)
Handout(s)