TechNet Augusta 2019 Sponsorship and Branding Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
Monday, August 19, 7:30 AM - 4:30 PM
Monday, August 19, 9:30 AM - 10:30 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Just like the Cloud, most people may not have heard of the Internet of Things (IoT). However, they will, and they continue to fuel the ever-expanding landscape of the devices and services, while not even realizing it. As this occurs, the Internet of Things (IoT) population of endpoints and data continues to rapidly grow accordingly. How does that impact Cyber Electromagnetic Activities (CEMA)? In this session, we will discuss:
Overview of IoT Capabilities as well as current and future trends
Mapping of trends/implementations...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 10:30 AM - 5:00 PM
- Room: Gordon Lakes Golf Course, Fort Gordon, GA
Click Here for registration, sponsorship, and more information.
Scramble Format with Shotgun Start at 1:00pm
Lunch, drinks, range balls, BBQ dinner included
$100 Per Player/$50 for Active Duty Military
Mulligans available - Two for $10...
Monday, August 19, 11:00 AM - 12:00 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC
The goal of this session is to provide a basic overview of cybersecurity challenges and techniques and tools to address these challenges.
Challenges:
Internet of Things
Increasing complexity of attacks
Today's networks are borderless
Complex networks are not secure networks
Exponentially Increasing attack surfaces.
Solutions & Benefits of an integrated cyber defense framework:
Provides visibility, coverage and flexibility across the entire network
Delivers flexible integration options for multiple security partners
Helps achieve security in your network while maintaining performance
Extends across traditional and emerging network environments
Enables rapid insertion of emerging solution
Attendees can gain an awareness...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 19, 1:00 PM - 2:00 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, and CASP+; 1 GIAC CPE
Today’s supply chains are largely disconnected, often have poor visibility into the location and status of raw materials, parts or even finished goods, and lack a secure, reliable way to share this information across participants. The Internet of Things (IoT) and Blockchain offer opportunities to address these issues, enabling enterprises to better forecast demand, respond to supply chain incidents and provide enhanced customer care. Designing and implementing IoT and Blockchain solutions can be a challenge for many organizations who may lack the time, expertise,...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 19, 2:15 PM - 3:15 PM
Approved for 1 CompTIA CEU: Cloud+; 1 GIAC CPE
Data Science is the solution to the overwhelming volume of data available to assist decision makers. As more users gravitate to the Cloud and Smart Technologies there is an ever-present transmission of data from one point to another. With such an increase, it becomes more challenging for collectors and analysts alike to discern between the relevant intelligence information and the clutter. In this session, we will discuss how applying data science techniques can assist Cyber Electromagnetic Activities (CEMA) operators in processing Big Data while increasing analytic production. Specifics include:
Overview of Data Science in Cyber Operations
Identifying...
...read more...
Speaker(s)
Tracks:
Monday, August 19, 3:30 PM - 4:30 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, and CASP; 1 GIAC CPE; and 1 CertNexus CFR CEC
Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for information protection. CSPs own the responsibility to secure the infrastructure that runs its cloud services. Data owners are responsible for protecting the confidentiality, integrity, and availability of their data in the cloud. Making sure that this data is safe from unauthorized access requires organizations to consider not only the physical and logical security of the CSP but also who...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 7:00 AM - 5:00 PM
Tuesday, August 20, 7:30 AM - 8:30 AM
- Room: Oglethorpe Ballroom Lobby
Tuesday, August 20, 8:30 AM - 9:00 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Tuesday, August 20, 9:00 AM - 10:00 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Tuesday, August 20, 9:00 AM - 3:00 PM
- Room: Morris Building Auditorium (across 10th St Circle)
NOTE: This session is held outside of the Marriott/Convention Center at the Morris Building Auditorium, located directly across 10th St Circle from Augustino's)
For more information, click here....
Tuesday, August 20, 10:00 AM - 11:30 AM
- Room: Olmstead Exhibit Hall
Tuesday, August 20, 10:00 AM - 5:30 PM
Tuesday, August 20, 10:15 AM - 11:15 AM
The CCOE CDID Capability Manager for Cyber (formerly TRADOC Capability Manager Cyber-TCM Cyber) addresses capabilities and advancements in facing near-peer competitors in Multi-Domain Operations (MDO). The Army's Cyberspace Operations (CO) requirements and capabilities support the Army's Modernization Strategy and help ensure Army Forces, as an element of the Joint Force, achieve success in competition and armed conflict. The changing character of war requires an innovative approach to rapidly deliver and evolve cyberspace capabilities for MDO. The CM Cyber describes (Defensive Cyberspace Operations (DCO), Offensive Cyberspace Operations (OCO), Cyber Situational Understanding (Cyber SU) in support of CEMA challenges and approaches to...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater - Olmstead Exhibit Hall
MG Garrett Yee, Assistant to the Director, Defense Information Systems Agency (DISA), will host a panel of agency subject matter experts who will address the benefits of DISA's enterprise mobility infrastructure, storage, browser isolation and continuous multifactor authentication services and capabilities to make information secure and readily accessible to the warfighter from the office to the frontline.
Panel Topics:
Mobility
Assured Identity/CMFA and Browser Isolation
Storage (MILDrive) and SAFE
...
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, & CASP; 1 CertNexus CFR CEC; 1 GIAC CPE
There exists a major loophole at the network endpoint from the wall to the desktop that cybersecurity does not address. Physical security of network and terminal hardware and its user interface has been ignored in policy and practice enabling catastrophic breaches from insider threats, most notably Manning and Snowden.
This session focuses on the need for convergence between physical security and cybersecurity to thwart emerging insider threats. It reviews the background of information technology, existing policies, or lack thereof, and the shortcomings of...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 10:45 AM - 1:15 PM
Approved for 2 CompTIA CEUs: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+; 2 CertNexus CFR CECs
Cyber Quest is an Army live prototype assessment (ALPA) event, conducted annually at Fort Gordon, GA, with government, industry and academia partners. The purpose of the event is to assess emerging Cyber, Electronic Warfare (EW), Signal, and Intelligence technologies to inform current capability gaps and rapid acquisition requirements.
This two and a half hour session will provide the audience with an overview of Cyber Quest, initial insights from Cyber Quest 2019 presented by the TRADOC Capability Managers for Cyber, Electronic Warfare, Networks and Services, and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 11:00 AM - 12:30 PM
Technology is changing industry and companies pursuing tech are thriving. Augusta, GA has been identified as a location with robust resources that enable Federal and private collaboration, partnerships and innovation. Additionally, the area’s cybersecurity initiatives, including workforce development programs, are attractively positioned to take advantage of the rapidly evolving cybersecurity sector. This panel will explore how cyber initiatives through collaborative efforts of academia, government, and industry have affected economic development in the CSRA and across the State. ...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 11:30 AM - 12:30 PM
- Room: Engagement Theater - Olmstead Exhibit Hall
In this session, the US Army Network Enterprise Technology Command (NETCOM) will discuss key initiatives across four lines of effort: Conduct DoD Information Networks (DODIN) Operations; Standardize Network, Authorities, Processes; Modernize the Network; and Sustain the Force. The session will be conducted in a panel format, with approximately 30 minutes of overview and 30 minutes for questions....
Speaker(s)
Tracks:
Recommended for Acquisition Training
Training will provide an overview of GSA’s Governmentwide Acquisition Contracts (GWACs) that consist of Alliant 2, 8(a)STARSII and VETS2 vehicles and the IT Schedule 70 to assist you in determining the best solution for your IT requirements....
Speaker(s)
Tracks:
Handout(s)
Approved for 1 CompTIA CEU: A+, Network+, Cloud+; 1 CertNexus CFR CEC
The Army's tactical network modernization strategy is focused on delivering a resilient, unified network that can help prepare our forces to fight and win against any adversary, in the most challenging contested and congested electromagnetic spectrum and cyber environments. The Network Cross Functional Team (CFT) and Program Executive Office for Command, Control, Communications (PEO C3T) will discuss how the Integrated Tactical Network balances network resiliency and information dominance through an integrated, multi-path system of systems approach.
Objectives: After completing this session, attendees will have a greater understanding of the Integrated...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 11:30 AM - 1:30 PM
- Room: Olmstead Exhibit Hall
Tuesday, August 20, 1:00 PM - 2:15 PM
- Room: Oglethorpe Ballroom A-E
Representatives from partner nations Germany, Israel, Japan and Netherlands will discuss efforts within their respective countries to improve Cyberspace capabilities.
Each country will present a short description of their efforts in the Cyberspace domain followed by a question and answer session. This will provide the audience a unique opportunity to hear how other nations are addressing the challenges the world faces in Cyberspace. The panel will be led by Mr. Robert Kazimer, Senior Executive Service, Deputy to the Commander, Cyber Center of Excellence....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 2:15 PM - 3:00 PM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Tuesday, August 20, 3:15 PM - 3:30 PM
As cyber missions evolve and intensify, the right Artificial Intelligence (AI) tool is a necessary precondition for success, enabling army networks and network defenders to correlate established metrics with real-time activity data. Whether the immediate priority is defense or offense, an effective response to the modern landscape demands not only faster operational decisions, but the right decisions to counter an emerging threat or take advantage of a strategic opportunity—without requiring high-level data science skills to undertake a mission.
To defend against external threats, an AI system must offer increased speed and more effective response by enabling autonomous active cyber operations. That...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:15 PM - 4:15 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Objective: To relate the vision and pillars of the 2018 National Cyber Security Strategy and their dependence on the security of our supply chain. The audience should walk away with an idea of how the government and some industry members are addressing the vision, responses, and impacts. This panel discussion should raise awareness of security risks as the government and industry work together on future acquisitions.
The Sept 2018 National Cyber Security Strategy is changing our national vision regarding Supply Chain...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater - Olmstead Exhibit Hall
The Army is piloting a new organizational design called the Expeditionary Signal Battalion-Enhanced (ESB-E), providing a current ESB (the 50th ESB-E, 35th Signal Brigade) with alternative tactical network equipment that is smaller, lighter, more resilient and expeditionary. Through the ESB-E pilot, Soldier feedback from training, operational and field exercises is helping shape future equipment solutions and force structure for the service's 24 ESBs. The 50th ESB-E's three companies are operating different sets of equipment so the Army can determine the salient characteristics needed to meet future ESB equipment requirements. This theater session will provide updates on the ESB-E pilot effort,...
...read more...
Speaker(s)
Tracks:
Handout(s)
The U.S. Army Cyber School (USACyS), as the Army school proponent for Cyber Warfare and Electronic Warfare, acquires America’s most talented and innovative citizens and develops them into the world’s most lethal, professional, ethical, and technically competent Cyber Warfare and Electronic Warfare workforces.
With the vision to become the world’s leading organization in educating, training, and developing DoD’s Cyber Warfare (CW) and Electronic Warfare (EW) forces of choice is focused on building purposeful career paths and academic programs with four core strengths: intellectual curiosity, operational competency, mental agility, and persistent collaboration.
As the USACyS continues to shape its CW courses to meet...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 3:15 PM - 4:30 PM
Cisco, a leader in networking technology, with support from the Monster.com team and other industry leaders, will discuss the critical role of interpersonal relationships in the quest to successfully transition into the private sector. They will discuss the importance of working with friends and colleagues in industry to identify a path from your military career field into a career outside of the military....
Tuesday, August 20, 3:35 PM - 3:50 PM
Enhanced Network Visualization Environment (ENVE) is a suite of cyber products that offers visualization and automated analysis of passive network data. This unique solution enables deeper and accurate insight of network data while having the capability to be delivered as a full stack or modularized set of products.
Key Features:
• Reverse engineers a network and automatically generates a physical network topology
• Provides real-time situational awareness (SA) of traffic on a network
• Passively fingerprints devices on a network, characterizing nodes with detailed information
• Intuitive interfaces that allow easy understanding of large, complex networks and fast search, retrieval of network artifacts
• Automatically illuminates...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 3:55 PM - 4:10 PM
Like their counterparts in physical warfighting domains, cyber operators need camouflage when they conduct their missions. This session will explore how a range of emerging technologies work together to disguise operators and eliminate cyber attack surfaces from the view of adversaries. Such techniques are already in use by the DoD, the Intelligence Community, and commercial organizations to shield their cyber protection teams and to carry out cyber threat investigations, threat hunting operations, and internet-based research. Attendees will learn how these capabilities privatize the public internet using high levels of network obfuscation, multiple layers of encryption, and dynamic IP routing, and...
...read more...
Speaker(s)
Tracks:
Tuesday, August 20, 4:15 PM - 4:30 PM
Data Services are made reliable and robust when data is treated as a system. Leveraging capability inherent in newer protocols for data management and networking, large scale architectures can be made data-centric. Dis-aggregation of data and service makes data systems portable across hybrid, multi-cloud environments, accelerates standardization, simplifies infrastructure and empowers distributed data discovery. Data Services delivered with a system methodology drives operational simplicity, enablement and delivery of a data management platform “as a Service” tailored to mission need....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 20, 4:15 PM - 5:30 PM
- Room: Olmstead Exhibit Hall
Wednesday, August 21, 7:00 AM - 8:45 AM
This panel discussion will provide some perspective for military members on the transition process, including some lessons learned from veterans who have made the jump into industry. During this breakfast event, attendees will hear from an array of technology and sales leaders who have used their military experience after moving into the private sector, leveraging their skills and maturity to help their next employer succeed....
Wednesday, August 21, 7:00 AM - 9:00 AM
- Room: Oglethorpe Ballroom Lobby
Wednesday, August 21, 7:00 AM - 5:00 PM
Wednesday, August 21, 8:00 AM - 8:15 AM
In the emergent era of great power competition, our nation's adversaries seek to achieve their strategic aims, short of traditional conflict, by the use of a stand-off approach across the warfighting domains. Our adversaries will leverage this “grey zone” conflict across Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, and Time (PMESII-PT) in an attempt to defeat U.S. power. The importance of cross-functional integrated cyber, electronic warfare and signals intelligence has been recognized for the last decade not only the United States but across our near-peer competitors and potential adversaries. As the US Army builds force structure, doctrine, and material...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 8:00 AM - 9:00 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 1 GIAC CPE; 1 CertNexus CFR CEC
Students should come away from this course with an understanding of the major successes and challenges associated with Artificial Intelligence (AI) and Machine Learning (ML) to include understanding the differences and relationship of each to the other and the cyber security skillset requirements for AI or MI integration.
The presentation will address some of the major success and challenges associated with AI and MI along with the tools and system integration aspects for Cyber Security and Network Operational roles:
An overview on...
...read more...
Speaker(s)
Tracks:
Handout(s)
The U.S. Army Signal School Commandant and Regimental Command Sergeant Major will provide an overview of Signal Proponency and Institutional Education initiatives....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 8:20 AM - 8:35 AM
Envistacom is the world leader in communications waveform virtualization for both cloud, public and private data centers, as well as tactical edge products using high-performance computing (HPC) architectures. Envistacom has invested in this transformative technology enabling the abstraction of modem waveforms and other capabilities from purpose built, real time, and continuous data processing physical devices to virtualized applications hosted on computing platforms. As the cloud infrastructure continues to take the world by storm, the computing fabric revolution that is supporting the cloud is being supported by the HPC. The HPC is the combination of the Central Processing Unit (traditional PC...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 8:40 AM - 8:55 AM
The Warfighter demand for LPI/LPD/Anti-Jam (AJ) communications against increasingly sophisticated adversaries mimics the historical contest between armor and artillery. The traditional communications approach to counter the threat uses expensive, hard-to-use, nuclear-hardened communications systems or direct-sequence waveforms to protect low capacity data links by spending large amounts of bandwidth. Viasat's approach is to arm our warfighters with affordable, resilient, high-capacity, easy to use, rapid deploy SATCOM systems that have inherent LPI/LPD/AJ protection. This requires our adversaries to bring their most exquisite and expensive systems to the field, to invest considerable resources, and yet fail against our flexible, affordable systems. Our approach...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 9:00 AM - 9:15 AM
Bear Systems provides a new type of cybersecurity that protects devices and device communications. Bear’s solution was originally designed for lightweight IoT devices in order to consume minimal power while providing maximum device and data communications security.
Bear’s Systems places full security on every device. Our solution enables lightweight device protection, data encryption and decryption, device authentication and authorization. The solution employs end-to-end AI for advanced remediation capabilities and device management.
Bear’s powerful next-generation device and data communications protection and control enables ubiquitous coverage across all IoBT devices. Bear works across any type of existing network from Ethernet, WiFi and Bluetooth to...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 9:00 AM - 3:00 PM
- Room: Morris Building Auditorium (across 10th St Circle)
NOTE: This session is held outside of the Marriott/Convention Center at the Morris Building Auditorium, located directly across 10th St Circle from Augustino's)
For more information, click here....
Wednesday, August 21, 9:15 AM - 10:00 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Wednesday, August 21, 10:00 AM - 4:00 PM
Wednesday, August 21, 10:15 AM - 11:15 AM
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 10:30 AM - 11:30 AM
- Room: Olmstead Exhibit Hall
Wednesday, August 21, 10:30 AM - 11:45 AM
As requirements are released for set-asides and IDIQs, rarely can one company meet all the deliverables for any given effort. Small businesses often can bring experience and performance in niche areas to the team. This leads to teams of small businesses as well as teams with a mix of small and large businesses. Knowing which business to team with and when will increase the likelihood of success as multiple vendors are vying for the same opportunities.
In this discussion, we will explore the roles of teaming, the importance of building cohesive, collaborative teams as well as teaming strategies to meet customer...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 11:30 AM - 12:30 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Because it can be so lucrative, malware has emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. Learn how threat actors are targeting organizations with frightening effectiveness by researching their human targets before launching a malware attack. Once the victim is chosen and the malware deployed, the threat actor remains connected, lurking on victims' computers until they can grab banking details, credit card data, and other sensitive information. This session shows how attackers know their...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 11:30 AM - 1:30 PM
- Room: Olmstead Exhibit Hall
Wednesday, August 21, 11:45 AM - 12:45 PM
- Room: Engagement Theater - Olmstead Exhibit Hall
Speaker(s)
Tracks:
Wednesday, August 21, 1:00 PM - 2:00 PM
Small businesses provide myriad support functions to government and military customers, which include support to cyberspace operations, information operations and the Intelligence Community. Each of these are vital to fielding an agile force that can project power in the tactical environment while providing necessary strategic support to ensure mission success and safety of forces. Join us for a brief discussion on the impacts and advantages of small businesses’ support in the multi-domain environment....
Speaker(s)
Tracks:
Wednesday, August 21, 1:00 PM - 2:30 PM
- Room: Oglethorpe Ballroom A-E
Multi-Domain Operations include Air, Land, Sea, Space, and Information. Cyber-Space is evolving into the "high ground" of all the domains and the Services must be able to operate, fight, and win across the spectrum of all domains. This panel, made up of experts from government and industry, will discuss and explore the challenges that the Army and other Services face in providing networks that are agile and flexible to enable command and control across the battlefield. ...
Speaker(s)
Tracks:
Wednesday, August 21, 1:30 PM - 4:30 PM
Approved for 3 CompTIA CEUs: A+, Network+, Security+, Cloud+, CASP, & Linux+
Join CompTIA, General Dynamics Information Technology and VMware for a preview of the CompTIA Cloud+ and CASP+ certifications. The 3-hour mini bootcamp includes essential information on how to secure, maintain, and optimize cloud infrastructure services.
Businesses report that a lack of cloud expertise is among their top challenges, and the government is no different in needing critical in-demand cloud skill sets. Integrating cloud-based services affects how an organization secures their IT infrastructure and data. Attendees will learn about the appropriate cloud solutions to meet government agency requirements as well as the new tools...
...read more...
Speaker(s)
Tracks:
Wednesday, August 21, 2:00 PM - 4:00 PM
- Room: Nelson Hall Studio B/Fort Gordon
Approved for 2 CompTIA CEUs: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 2 CertNexus CFR CECs
Event Organizer: PEO STRI, AECOM and AFCEA International
Event Theme: ADVANCING CYBER TRAINING: An Evolution from 'Classic' Cyber Training to delivering a Secure and Live, Virtual & Constructive (LVC) Training Environment for Cyber Mission Forces
Description: The intent of this classified conference is to focus on select critical needs for enhancing CYBERCOM and subordinate organization capabilities to identify and mitigate threats while advancing Cyber Warrior skills and readiness. Our objective is to assist Army Acquisition Senior Leaders in thinking through the cyber “challenge” and provide innovative insights...
...read more...
Tracks:
Wednesday, August 21, 2:45 PM - 3:00 PM
Over the past 12 years, Cisco has published over 50 academic papers on the topic of cybersecurity analytics and a multitude of open source. We have done this because we believe that this area of study must remain transparent and open. Having said that, getting a good grade on your paper and being effective on the battlefield of the Internet is very different. Taking concepts from academia research and then applying it in the world, at scale, and with real nation state threat actors in play is something we think we have done well. Sharing this experience is important because...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 2:45 PM - 3:45 PM
Approved for 1 CompTIA CEU: A+, Network+, Cloud+, & Linux+
Discover how network convergence, 5G and edge data center technologies will impact your post/base through smart light pole deployments.
Covering FTTx, network convergence, IoT, WiFi, FWA and small cell integration on the pole and the different concealment considerations for the smart base of tomorrow?
In the smart(er) post/base of tomorrow we are starting to see more networks converging, supplying connectivity from edge devices to data centers regionally or at the edge. This is very similar to what is happening in our cities. These FTTx networks needs to be designed with a plug &...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater - Olmstead Exhibit Hall
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Our panel of senior women leaders will discuss the thrills and challenges of entering and succeeding in their chosen field, including evolving cybersecurity threats, vulnerabilities and solutions. Discussion will center on
Evolving cyber threats
increasingly complex social engineering for hostile purposes
attacks on critical infrastructure
Enterprise vulnerabilities
which enable malicious insiders to threaten assets including information
which allow uninformed end-users to cause damage
Promising solutions
artificial intelligence for threat analysis and damage remediation
increasing public awareness of security and privacy threats and vulnerabilities
Each expert panelist will also comment on cybersecurity...
...read more...
Speaker(s)
Tracks:
The Cyber Capabilities Development and Integration Directorate Networks and Services (CDID N&S) is the centralized capability manager for the Army's network and associated services. Colonel Mark Parker, the Director of CDID N&S, will discuss current modernization efforts to unify network operations, integrate tactical and enterprise networks, modernize existing capabilities in brigade combat teams, and converge capabilities in all domains in support of the Army Modernization Strategy....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 3:00 PM - 8:00 PM
- Room: Georgia Cyber Center - Cyber Lab
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+
On Wednesday, August 21st 2019, members of the Cyber & Intelligence (C&I) Market from the Augusta, GA and Columbia, MD offices will host the first-ever International Capture the Flag (CTF) event between the US Army Cyber School and the Japanese Ground Self-Defense Force Signal School. This event with take place at the Georgia Cyber Center (GCC) during AFCEA TECHNET 2019 and is expected to draw 160+ participants.
The participant teams, including military personnel, government personnel, and students will exercise their cyber expertise to compete in and expand their...
...read more...
Tracks:
Wednesday, August 21, 3:05 PM - 3:20 PM
Recent innovations in radar and EW technologies, adversary capabilities, and techniques drive ECM systems towards converged and flexible systems, necessitating multifunction hardware capable of fielding a dynamic array of solutions—solutions which even evolve and react to changing mission and technique requirements through machine learning. The element level digital phased array is uniquely suited for this role, and is rapidly being matured to bring this capability to the warfighter. BAE Systems is developing a next generation ECM system based on its software defined digital array architecture. OASIS is an RF countermeasure-focused, multifunction RF system for protection of military rotorcraft and UAS....
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 3:25 PM - 3:40 PM
In order to provide EW support and full spectrum cyber activities in support of Multi Domain Operations at the Operational and Tactical levels, the United States Army will require advanced early warning capabilities, new tools to provide precision targeting and collection from increased stand off ranges, and EW/Cyber tools to defeat A2/AD efforts launched by adversaries. EW/Cyber tools must be in place during the competition phase to provide enduring persistent access to adversary military communications and ISR infrastructure as well as insight to the "neutral" networks and infrastructure utilized by both adversary and US/Allied forces in foreign areas around the...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 21, 4:15 PM - 5:30 PM
Thursday, August 22, 7:00 AM - 8:00 AM
- Room: Oglethorpe Ballroom Lobby
Thursday, August 22, 7:00 AM - 5:30 PM
Thursday, August 22, 8:00 AM - 8:15 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Thursday, August 22, 8:15 AM - 9:00 AM
- Room: Oglethorpe Ballroom A-E
The Cyber CoE Commanding General highlights the Army's ability to conduct operations in today's competitive cyberspace and electromagnetic spectrum environments, then transitions to future enablers to project power to dominate in information warfare and prevail in mutli-domain operations.
...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 9:00 AM - 10:00 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC
This session will provide an overview of current and future capabilities, policies, and resource requirements to facilitate communications security modernization and network transformation that enable building the Multi-Domain Force. With a goal to mitigate emerging threats to our current capabilities, the CIO, acquisition, and logistics communities' representatives are visiting numerous geographical locations to inform and educate commands about current and future requirements that include Advanced Cryptographic Capabilities (ACC), as well as gathering and sharing data from the different commands on current issues and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 9:00 AM - 11:15 AM
- Room: Olmstead Exhibit Hall
Thursday, August 22, 9:00 AM - 1:15 PM
Thursday, August 22, 9:00 AM - 1:30 PM
Thursday, August 22, 9:30 AM - 11:00 AM
- Room: Engagement Theater - Olmstead Exhibit Hall
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP; 1 CertNexus CFR CEC; 1 GIAC CPE
It’s all about the data! At least that’s where both industry and government have refocused in recent years. How do we prioritize access to – and defense of – critical data? How can we make sense of the mountains of data and metadata with cutting-edge analytics? Across the private sector, value and relevance have migrated to those who make best use of data. How can government take the same approach? How can military delivery mission-relevant data to the tactical edge,...
...read more...
Speaker(s)
Tracks:
Thursday, August 22, 9:45 AM - 10:45 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 GIAC CPE
The topic is specific to an ongoing study that examines the integration of surveillance activities, electronic jamming, and cyberspace attacks in a single tactical vehicle for the Army. The Terrestrial Layer System (TLS) is progressing rapidly as an integrated signals intelligence (SIGINT)/electronic warfare (EW)/cyberspace operations (CO) requirement. The Demonstration, Experimentation, and Prototype (DE&P) informs Army requirement development across formations, materiel, and training by integrating and layering capabilities and systems. Our future systems need to be approached from a layered perspective: protection of the soldier...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 10:10 AM - 11:10 AM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Network infrastructure (L0-L3) equipment has evolved from simple, fixed function devices to those that support dynamic services across multiple layers of the network with full programmability. Next generation network capabilities are going to be enabled by analytics and software that takes advantage of programmable nature of the underlying network. In this session, we will discuss how we can use the network itself as a sensor and apply analytics to improve both the security posture and availability of the network. Specifically...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 11:15 AM - 12:15 PM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 11:30 AM - 1:30 PM
- Room: Olmstead Exhibit Hall
Thursday, August 22, 1:00 PM - 3:30 PM
- Room: Oglethorpe Ballroom A-E
Each PEO will provide a 20-25 minute update of their respective role and responsibilities followed by 5-10 minutes of Q&A; 30 minute break after first two sessions.
1300 – 1330: PEO C3T
1330 – 1400: PEO EIS
1400 - 1430: Break
1430 - 1500: PEO IEW&S
1500 - 1530: PEO Soldier...
Speaker(s)
Handout(s)
Thursday, August 22, 2:00 PM - 4:00 PM
Among the toughest obstacles on the transition road map is securing that first interview and emerging successfully. Working with Monster.com, and other Industry professionals, Cisco will host a session on optimizing your resume to meet market demands and then making a great first impression in that interview. Bring a copy of your resume and take advantage of some free advice from men and women who have been there....
Thursday, August 22, 2:00 PM - 5:00 PM
Jack Voltaic 2.5 Cyber Workshop Series OverviewThe objective of the Jack Voltaic 2.5 Critical Infrastructure Security and Community Resilience Workshops is to engage the owners of high priority Department of Defense (DoD) critical infrastructure as well as municipality leaders on the topic of the key relationships between commercial critical infrastructure and DoD critical missions.
In support of these objectives, AECOM and the Army Cyber Institute, in conjunction with the Department of Homeland Security National Exercise Division, will conduct a series of one day training workshops to share insights from Jack Voltaic 2.0 and discuss how similar efforts have the potential to...
...read more...
Speaker(s)
Thursday, August 22, 3:30 PM - 3:45 PM
- Room: Oglethorpe Ballroom Lobby
Thursday, August 22, 3:45 PM - 5:00 PM
- Room: Oglethorpe Ballroom A-E
Recommended for Acquisition Training
This session focuses on Other Transaction Agreement (OTA) and new contract vehicles that have not been presented in this format at other venues or conferees. Attendees will learn that on May 14, 2020 the Defense Security Service (DSS) and Defense Information Systems Agency (DISA) awarded an Other Transaction Agreement (OTA) for nearly $75 million. The objective with the OTA contracting vehicle is to "integrate new bold and transformational approaches from the National Background Investigation Service (NBIS) architecture and take the next step with technology to integrate and align others mission" as stated by Terry Carpenter, PEO for...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 22, 5:00 PM - 6:30 PM
Friday, August 23, 7:00 AM - 8:00 AM
Friday, August 23, 7:00 AM - 1:30 PM
Friday, August 23, 8:00 AM - 5:00 PM
Approved for 6 CompTIA CEUs: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, CASP+; 6 CertNexus CFR CECs (note: AFCEA will not provide attendance documentation for this session)
During this session, representatives from industry, academia and the federal government are invited to participate in a detailed discussion with TRADOC Capability Managers for Cyber, Electronic Warfare, Networks and Services, and Tactical Radio about the problem statements and desired capabilities listed in the Cyber Quest 2020 Broad Agency announcement (BAA). The intent is to assist industry and government organizations refine their responses (whitepapers) to the BAA. Other key topics of discussion will include BAA whitepaper...
...read more...
Speaker(s)
Tracks:
Handout(s)
Friday, August 23, 8:30 AM - 9:30 AM
Approved for 1 CompTIA CEU: A+, Network+
The Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) recognizes that security is foundational to acquisition and should not be traded along with cost, schedule, and performance moving forward. To insure that these goals are met OSD is providing a preliminary briefing to educate government and industry stakeholders that consists of a review of various cybersecurity standards and best practices that will map controls and processes across several cybersecurity levels to reduce risk against a specific set of cyber threats. The outcome will be a requirement by government and industry...
...read more...
Speaker(s)
Tracks:
Handout(s)
The NASA Solutions for Enterprise-Wide Procurement (SEWP), Government-Wide Acquisition Contract (GWAC) provides the latest in Information Technology (IT) products and services for all Federal Agencies and their approved contractors. This includes cyber security solutions for all branches of the DoD, and the Intelligence Community.
The NASA SEWP contract vehicle consists of over 140 pre-competed Prime Contract Holders, including more than 110 small businesses. Small Business categories include: Service Disabled Veteran-Owned Small Businesses (SDVOSB); Woman-Owned Small Businesses (WOSB); Economically Disadvantaged Woman-Owned Small Businesses (EDWOSB); HUBZone Small Businesses; Veteran-Owned Small Businesses (VOSB); and Small Disadvantaged Businesses (SDB).
The success of the NASA SEWP GWAC...
...read more...
Speaker(s)
Handout(s)
Friday, August 23, 9:00 AM - 12:00 PM
The objective of the Jack Voltaic 2.5 Critical Infrastructure Security and Community Resilience Workshops is to engage the owners of high priority Department of Defense (DoD) critical infrastructure owners as well as municipality leaders on the topic of the key relationships between commercial critical infrastructure and DoD critical missions. In support of these objectives, AECOM and the Army Cyber Institute, in conjunction with the Department of Homeland Security National Exercise Division, will conduct a series of one day training workshops to share insights from Jack Voltaic 2.0 and discuss how similar efforts have the potential to strengthen the cyber resiliency...
...read more...
Speaker(s)
Friday, August 23, 9:30 AM - 10:30 AM
Defensive Cyber Operations (DCO) has been busy. Within the last 18 months, it established three new organizations, implemented the Cyber Operations Broad Responsive Agreement (COBRA) Other Transaction Authority (OTA) and opened The Forge, a cyber innovation center at Fort Belvoir, Virginia. Learn about upcoming DCO opportunities and how industry can leverage The Forge in this informative session....
Speaker(s)
Handout(s)
Friday, August 23, 10:30 AM - 10:45 AM
Friday, August 23, 10:45 AM - 12:00 PM
Approved for 1 CompTIA CEU: A+, Network+
Army Futures Command is working with the Assistant Secretary of the Army (Acquisition, Logistics and Technology) (ASAALT) to deliver key warfighting capabilities to enable the Army to defeat peer adversaries operating in a highly contested and congested battlefield. The Combat Capability Development Command's Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance Center (C5ISR) is pursuing a number of technology development efforts that will enhance the robustness and resiliency or our networks and sensor systems. This session will provide insight into how technology investments have been reshaped to enable Multi-Domain Operations in a contested...
...read more...
Speaker(s)
Tracks: