TechNet Augusta 2021 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Select Criteria: Dates = 05/18/2021, 05/19/2021

Tuesday, May 18, 10:00 AM - 11:00 AM

    THE SESSION PRESENTER WILL BE AVAILABLE TO FIELD QUESTIONS VIA CHAT DURING THIS TIMESLOT THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants) Is the U.S. Cyber Strategy 30 Years Behind Our Health Care Strategy? In this presentation I posit there is a growing set of problems and corresponding remediation measures many, including the recent Cyberspace Solarium Commission Report authors glossed over or missed entirely. My purpose is to invite a changed narrative to supplement the existing constructiveapproaches being taken today. Why a supplemental narrative/discussion? •       If 80%+ of cybersecurity issues are due to human elements, why was there not... ...read more...
    Speaker(s)
    Speaker (confirmed)
    Adam Bricker
    Founding Executive Director, Carolina Cyber Institute
    Montreat College
    Tracks:

      Tuesday, May 18, 11:00 AM - 11:45 AM

        The digitization of the U.S. economy, society, government, and military looms larger by the day. While hardware and software can be produced, reprogrammed, or upgraded relatively quickly, the human-talent challenge is the proverbial “Long Pole of Tent” that will shield our nation and its people from harm. Many talent-development programs have been implemented by the U.S. government, industry, and state governments. Yet, one proven innovation in talent development remains untapped: the establishment of a federal service academy devoted to the challenge of digitization, with emphasis on cyber security and artificial intelligence....
        Speaker(s)
        Speaker (confirmed)
        Mark Hagerott
        Chancellor
        North Dakota University System
        Speaker (confirmed)
        Mark Loepker
        Education Program Director
        National Cryptologic Foundation
        Speaker (confirmed)
        Charlene Mowery
        Senior Director, Strategic Programs, National Security
        Microsoft
        Handout(s)

          Tuesday, May 18, 1:15 PM - 1:30 PM

            Speaker(s)
            Speaker (confirmed)
            The Honorable Hardie Davis
            Mayor of Augusta
            Speaker (confirmed)
            MG Neil S. Hersey, USA
            Commanding General
            U.S. Army Cyber Center of Excellence & Fort Gordon
            Speaker (confirmed)
            LtGen Robert M. Shea, USMC (Ret.)
            President & CEO
            AFCEA International

              Tuesday, May 18, 1:30 PM - 2:00 PM

                Speaker(s)
                Keynote (confirmed)
                LTG Stephen G. Fogarty, USA
                Commanding General
                U.S. Army Cyber Command
                Tracks:

                  Tuesday, May 18, 2:00 PM - 2:15 PM

                  Tuesday, May 18, 2:15 PM - 3:00 PM

                    Speaker(s)
                    Moderator (confirmed)
                    Ronald W. Pontius
                    Deputy to the Commanding General
                    U.S. Army Cyber Command
                    Panelist (confirmed)
                    Manuel N. Hermosilla
                    Executive Director
                    U.S. Fleet Cyber Command / U.S. TENTH Fleet
                    Panelist (confirmed)
                    Jeffrey R. Jones
                    Vice Director, Command, Control, Communications and Computers / Cyber
                    Deputy Chief Information Officer Joint Staff, J6
                    Panelist (confirmed)
                    Brig Gen Bradley L. Pyburn, USAF
                    Deputy Commander
                    Sixteenth Air Force (Air Forces Cyber)
                    Tracks:

                      Tuesday, May 18, 3:05 PM - 3:35 PM

                        Speaker(s)
                        Speaker (confirmed)
                        Matt Ashton
                        Sr. Systems Engineer
                        Gigamon
                        Speaker (confirmed)
                        Andrew Balzarini
                        Director, Marketing & Alliances
                        Wildflower International
                        Speaker (confirmed)
                        Peter Dunn
                        CTO, Defense and Intelligence Agencies
                        CDW-G
                        Speaker (confirmed)
                        Herb Estrella
                        Sr. Virtualization Delivery Engineer
                        CDW-G
                        Speaker (confirmed)
                        John McSorley
                        Senior Delivery Engineer
                        CDW-G
                        Speaker (confirmed)
                        Jay Pasquesi
                        Advanced Technology Account Executive
                        CDW-G

                          Tuesday, May 18, 3:35 PM - 3:45 PM

                          Tuesday, May 18, 3:45 PM - 4:30 PM

                            As Signal, Cyber, and EW capabilities rapidly develop and evolve to enhance the Department of Defense’s ability to compete, penetrate, disintegrate, exploit, and re-compete in Multi-Domain Operations (MDO), we strive to maintain the ability to adequately train our workforce to employ, maintain, and provide instruction on these capabilities. Technology is advancing at a pace that makes it a challenge to keep educational curriculum and mechanisms updated to enable the DoD workforce to leverage this technology to provide commanders the data they need to achieve and maintain decision dominance. Emerging technologies and the proliferation of data-centric capabilities have the potential to... ...read more...
                            Speaker(s)
                            Speaker (confirmed)
                            CW04 Daniel Belew, USMC
                            Academics Officer
                            Marine Corps Communication-Electronics School (MCCES)
                            Speaker (confirmed)
                            CW5 Robert Byrd, USA
                            Senior Engineer & Chief Technology Advisor
                            U.S. Special Operations Command J6
                            Speaker (confirmed)
                            CW02 Clayton Henry, USN
                            U.S. Fleet Cyber Command (FCC)/U.S. TENTH Fleet (C10F)
                            Speaker (confirmed)
                            CW5 Paul Sankey, USA
                            Command Chief Warrant Officer (Incoming)
                            US Army Cyber Center of Excellence
                            Tracks:

                              Wednesday, May 19, 11:00 AM - 11:45 AM

                                Stress-related issues appear to be causing an elevated and concerning level of suicides among Defense and Intelligence Community cyber personnel who staff the front-line desks that defend American infrastructure and related US assets against foreign intrusion, but many refuse to seek mental health treatment as doing so may jeopardize their security clearance. Members of the AFCEA Cyber Committee have been working with government partners to attempt to identify causes and influences, as well as possible changes in current protocol and available technology or solutions, to ensure these critical workers can continue to do their jobs while addressing their mental health....
                                Speaker(s)
                                Speaker (confirmed)
                                Brig Gen Craig Baker, USAF
                                Vice Commander
                                12th Air Force
                                Speaker (confirmed)
                                Tim Kosiba
                                Deputy Commander
                                National Security Agency - Georgia
                                Speaker (confirmed)
                                Jim Payne
                                Vice President, Special Projects
                                pExchange, LLC
                                Speaker (confirmed)
                                Steven Shirley
                                Executive Director
                                National Defense Information Sharing and Analysis Center

                                  Wednesday, May 19, 12:00 PM - 12:45 PM

                                    Speaker(s)
                                    Moderator (confirmed)
                                    Nancy J. Limauro
                                    Partnership & Engagement Liaison
                                    Office of the Chief Learning Officer, Cybersecurity and Infrastructure Security Agency
                                    Panelist (confirmed)
                                    Linda Calvin, JD
                                    Vice President, School of IT
                                    Ivy Tech Community College
                                    Panelist (confirmed)
                                    Julie Cruz, Ph.D.
                                    Director, Technology Career Field
                                    Army Civilian Career Management Activity
                                    Panelist (confirmed)
                                    Mark Loepker
                                    Education Program Director
                                    National Cryptologic Foundation
                                    Tracks:

                                      Wednesday, May 19, 1:15 PM - 1:35 PM

                                        Speaker(s)
                                        Keynote (confirmed)
                                        Brooks A. Keel, Ph.D.
                                        President, Augusta University
                                        Chair, AU Medical Associates
                                        Tracks:

                                          Wednesday, May 19, 1:35 PM - 2:05 PM

                                            Speaker(s)
                                            Speaker (confirmed)
                                            LTG (Ret.) Thomas Bostick, USA
                                            Senior Strategic Advisor
                                            Deloitte Consulting, LLP
                                            Speaker (confirmed)
                                            Greg Campion
                                            Manager
                                            Deloitte Consulting, LLP
                                            Speaker (confirmed)
                                            John Forsythe
                                            Managing Director
                                            Deloitte Consulting, LLP
                                            Speaker (confirmed)
                                            Steve Green
                                            Client Relationship Executive
                                            Deloitte Consulting, LLP
                                            Tracks:

                                              Wednesday, May 19, 2:05 PM - 2:15 PM

                                              Wednesday, May 19, 2:15 PM - 3:15 PM

                                                Speaker(s)
                                                Moderator (confirmed)
                                                COL Mollie Pearson, USA (Ret.)
                                                CEO, PearsonConsulting, LLC
                                                Principal, Deep Water Point, LLC
                                                Panelist (confirmed)
                                                MG Maria B. Barrett, USA
                                                Commanding General
                                                NETCOM
                                                Panelist (confirmed)
                                                Venice Goodwine
                                                Chief Information Security Officer, Information Security Center
                                                Department of Agriculture
                                                Panelist (confirmed)
                                                Lethia S. Jackson, Ph.D.
                                                Professor and Chair, Department of Technology & Security
                                                Bowie State University
                                                Panelist (confirmed)
                                                Angie Lienert
                                                President and CEO
                                                IntelliGenesis, LLC
                                                Tracks:
                                                Sponsored by:

                                                  Wednesday, May 19, 3:20 PM - 3:50 PM

                                                    Speaker(s)
                                                    Speaker (confirmed)
                                                    Michael Chung
                                                    Director
                                                    Red Ventures/HackerOne
                                                    Speaker (confirmed)
                                                    Jacob Kaplan-Moss
                                                    Head of Engineering
                                                    Hangar/HackerOne
                                                    Speaker (confirmed)
                                                    Jeff Reichard
                                                    Senior Director of Enterprise Strategy
                                                    Veeam Software
                                                    Speaker (confirmed)
                                                    Jeff John Roberts
                                                    Writer
                                                    Fortune/HackerOne

                                                      Wednesday, May 19, 3:50 PM - 4:00 PM

                                                      Wednesday, May 19, 4:00 PM - 4:45 PM

                                                        Speaker(s)
                                                        Speaker (confirmed)
                                                        COL John T. Batson
                                                        Signal School Commandant / Chief of Signal
                                                        U.S. Army
                                                        Speaker (confirmed)
                                                        BG Paul G. Craft, USA
                                                        Commandant
                                                        Cyber School
                                                        Speaker (confirmed)
                                                        Col Derek E. Lane, USMC
                                                        Commanding Officer
                                                        Marine Corps Communication-Electronics School

                                                          Wednesday, May 19, 4:45 PM - 5:00 PM

                                                            Speaker(s)
                                                            Speaker (confirmed)
                                                            The Honorable Hardie Davis
                                                            Mayor of Augusta
                                                            Speaker (confirmed)
                                                            MG Neil S. Hersey, USA
                                                            Commanding General
                                                            U.S. Army Cyber Center of Excellence & Fort Gordon
                                                            Speaker (confirmed)
                                                            LtGen Robert M. Shea, USMC (Ret.)
                                                            President & CEO
                                                            AFCEA International

                                                              Wednesday, May 19, 6:00 PM - 11:59 PM

                                                                THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants)    This lecture will cover the implications for the Department of Defense (DoD) and potentially the rest of the government on the implementation of the CMMC practice -​Why is this certification needed? -What is the difference between CMMC and the National Institute of Standards and Technology (NIST) 800 standards?  -What is the cost of the certification and is it reimbursable?  The attendee should come away with the latest information on the CMMC process and where it stands as of April 2021. ...
                                                                Speaker(s)
                                                                Speaker (confirmed)
                                                                Tommy Gardner, Ph.D.
                                                                Chief Technology Officer
                                                                HP Federal
                                                                Tracks:
                                                                    Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP+; 1 GIAC CPE Because it can be so lucrative, malware has emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. Learn how threat actors are targeting organizations with frightening effectiveness by researching their human targets before launching a malware attack. Once the victim is chosen and the malware deployed, the threat actor remains connected, lurking on victims' computers until they can grab banking details, credit card data, and other sensitive information. This session shows how attackers know their victims and targets better than they... ...read more...
                                                                    Speaker(s)
                                                                    Speaker (confirmed)
                                                                    Paul Wang
                                                                    Threat Analyst
                                                                    proofpoint
                                                                    Tracks:
                                                                        High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle attacks, and metadata exposure leave agencies susceptible to a range of devastating repercussions. So, what is the best way to protect network traffic? Encrypt everywhere-between data centers and headquarters to backup and disaster recovery sites, whether on premises or in the cloud. This session will discuss... ...read more...
                                                                        Speaker(s)
                                                                        Speaker (confirmed)
                                                                        Jose Morales
                                                                        Technical Trainer
                                                                        Thales Trusted Cyber Technologies
                                                                        Tracks:
                                                                            Cutting-edge security begins with a rock-solid foundation that includes knowing with certainty what is in a network. While investments in quantum encryption, artificial intelligence, machine learning, and block-chain are interesting, none of it will matter without a strong foundation. The SysAdmin, Audit, Network and Security (SANS)/Center for Internet Security (CIS)  (SANS/CIS) Top 20-an industry-recognized benchmark focusing on security tasks that have the greatest impact-lists, in priority order, areas upon which an organization should focus; a complete and thorough understanding of the organization’s inventory tops that list. Intuitively, this make sense; if a company does not know what it has, it... ...read more...
                                                                            Speaker(s)
                                                                            Speaker (confirmed)
                                                                            Jim Carnes
                                                                            Chief Security Architect
                                                                            Ciena
                                                                            Speaker (confirmed)
                                                                            Jim Westdorp
                                                                            Principal, Government Architecture and Chief Technology Officer
                                                                            Ciena Government Solutions, Inc. (CGSI)
                                                                            Tracks:
                                                                                THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants) There exists a missing link in classified network physical security specifically dealing with the endpoint embracing the connection from the wall to the desktop and the network user interface.  This gap in protection has been virtually ignored, enabling catastrophic breaches in security from insider threats, most notably, Bradley (Chelsea) Manning and Edward Snowden. This session focuses on the nature of the insider threat as it relates to the network endpoint.  The discussion covers shortcomings of existing policies and how archaic countermeasures have not kept pace with technology and emerging threats. ... ...read more...
                                                                                Speaker(s)
                                                                                Speaker (confirmed)
                                                                                Robert "Bob" Bauman
                                                                                President & Chief Executive Officer
                                                                                Trusted Systems, Inc.
                                                                                Tracks:
                                                                                    Is the U.S. Cyber Strategy 30 Years Behind Our Health Care Strategy? In this presentation I posit there is a growing set of problems and corresponding remediation measures many, including the recent Cyberspace Solarium Commission Report authors glossed over or missed entirely. My purpose is to invite a changed narrative to supplement the existing constructiveapproaches being taken today. Why a supplemental narrative/discussion? •       If 80%+ of cybersecurity issues are due to human elements, why was there not a single recommendation addressing the most important human element at all - Character. •       Because, as virtually ALL indicators attest, the problem is getting worse,... ...read more...
                                                                                    Tracks:
                                                                                        THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants) Join Mark Baggett as he discusses new tools and some new features of older tools that enhance your threat hunting capability. This short one hour talk will provide you with the insight you need to begin using these to for hunting phishing domains and command and control channels on your networks. All of these free tools for incident responders, forensicators, threat hinters and network defenders are available today to everyone that attends....
                                                                                        Speaker(s)
                                                                                        Speaker (confirmed)
                                                                                        Mark Baggett
                                                                                        Instructor, SANS Institute
                                                                                        Author, "Automating Information Security with Python"
                                                                                        Tracks:
                                                                                            THIS SESSION WILL BE AVAILABLE FOR ON-DEMAND VIEWING THROUGHOUT THE SERIES Mobile devices are often discussed in terms of organizational risk and while there certainly is the potential, this session will discuss how organizations can utilize mobile devices to bolster security.  Technologies previously cost prohibitive to smaller oganizations can now be leveraged including: Two-Factor Authentication Employee Tracking Physical Access Controls Combining mobile device security with traditional authentication methods have the opportunity to strengthen organizational information security posture....
                                                                                            Speaker(s)
                                                                                            Speaker (confirmed)
                                                                                            Kevin Harris, Ph.D.
                                                                                            Program Director for Cyber Security, Information Systems Security, and Information Technology Management
                                                                                            American Public University Systems
                                                                                            Tracks:
                                                                                                Modern combat vehicles, even more so than their civilian counterparts, are effectively mobile processing networks. A typical vehicle contains over one hundred microprocessors, globally sourced with each processor running millions of lines of software code with uncertain provenance and uneven quality. Many of our adversaries wield remarkably effective hacking skills, and by its nature, the advantage in cybersecurity goes to the attacker because a defender must defend all his assets while the attacker can choose any point of attack. To address this challenge, L3Harris recently developed a novel Model Based System Engineering (MBSE) approach to model and simulate the integration... ...read more...
                                                                                                Speaker(s)
                                                                                                Speaker (confirmed)
                                                                                                Ken Zhang
                                                                                                Solution Architect, Cyber Systems
                                                                                                L3 Harris Technologies
                                                                                                Tracks:
                                                                                                    Today’s modern battlefield is a dynamic conglomeration of ground, air, and satellite surveillance tightly intertwined with critically timed communications, sequential tasks, and complex interdependencies between dispersed warfighters, command elements, and multiple tiers of mission systems. The continuity of these entities is essential for providing key information necessary for timely and strategic decision-making. Data proceeding from these collective resources must be gathered and organized in a manner conducive to efficient, secure, and reliable analysis and dissemination, whether at the strategic apex, the tactical edge, or some node in between. Accordingly, failure along this network can have compounding effects, negatively impacting the execution... ...read more...
                                                                                                    Speaker(s)
                                                                                                    Speaker (confirmed)
                                                                                                    Hunter Moore
                                                                                                    Principal Researcher
                                                                                                    Rotunda Solutions, Inc.
                                                                                                    Tracks:
                                                                                                        The Army requires long-range electronic warfare (EW) sensors and/or antenna built in a small deployable form-factor that can achieve ranges greater than 40 kilometers. Applied Signals Intelligence, Inc. (ASI) understands the importance to be able to detect, identify, and locate electromagnetic spectrum (EMS) signatures at significant distances to provide friendly and adversary situational awareness and to enable lethal and non-lethal targeting capabilities in large areas of operations. ASI is currently supplying long-range electronic warfare (EW) systems built in a small deployable form-factor that can achieve ranges greater than 40 kilometers to various military organizations. The sensors are based on ASI’s recent advance... ...read more...
                                                                                                        Speaker(s)
                                                                                                        Speaker (confirmed)
                                                                                                        Martin Rofheart, Ph.D.
                                                                                                        President
                                                                                                        Applied Signals Intelligence (ASI)
                                                                                                        Tracks:
                                                                                                            Commercial SATCOM is leading the satellite industry with evolutionary Low Earth Orbit (LEO) satellites that can provide greater network throughput and support smaller and mobile satellite terminals. There is also a large infrastructure-based capital expenditure requirement to support these LEO assets and an added cost to set up these networks with the latest technologies. Government owned satellite networks are expensive and are at a technological disadvantage compared to their commercial counterparts in regard to size, scale, and price as well as the immense amount of resources required to operate and maintain these networks. Additionally, near-peer adversaries are aware of Government... ...read more...
                                                                                                            Speaker(s)
                                                                                                            Speaker (confirmed)
                                                                                                            Michael Young
                                                                                                            Senior Director of Advanced Programs
                                                                                                            Envistacom
                                                                                                            Tracks:
                                                                                                                The Department of Defense is faced with high degrees of difficulty regarding the state of their data and the ability to turn this data into meaningful information on a timely basis.  As technological capabilities advance around data acquisition, more data comes faster and more efficiently than ever before.  As a result, the size and scope of the “big-data” dilemma that faces the whole world becomes especially problematic in the defense arena.  This is true at nearly every step in the data management process, including: collecting, accessing, cleaning, transmitting, analyzing, securing and storing joint operational data.  In addition, an even more critical... ...read more...
                                                                                                                Speaker(s)
                                                                                                                Speaker (confirmed)
                                                                                                                Matthew Maher
                                                                                                                Chief Data Scientist
                                                                                                                Processus Group
                                                                                                                Speaker (confirmed)
                                                                                                                Rob Orlando
                                                                                                                Chief Operations Officer
                                                                                                                Processus Group
                                                                                                                Tracks:
                                                                                                                    Concerns about active RF interrogation are well known.  RF interrogation of communication, radar and combat systems enable the interrogator to determine the operating characteristics of that equipment and potentially to conduct electronic warfare.  Protective covers manufactured from RF shielding drapable materials, developed under a Cooperative Research and Development Agreement with Naval Surface Warfare Center Port Hueneme Division, prevent both asset interrogation and electronic warfare. The RF shielding material can also prevent the scanning of a sensitive asset to determine its shape.  This step is critical if the asset’s performance can be deduced by knowing its shape.  The material, with slight modification,... ...read more...
                                                                                                                    Speaker(s)
                                                                                                                    Speaker (confirmed)
                                                                                                                    David Sharman, Ph.D.
                                                                                                                    Military and Technical Advisor
                                                                                                                    Transhield, Inc.
                                                                                                                    Tracks:
                                                                                                                        Real-time Spectrum visualization absolutely relies upon intelligence and sensor information, yet the fields are slow in coming together to trade and integrate data. As intelligence, signal, cyber and electronic warfare work more closely together, this relationship and the associated real-time data exchange requirement emerges as a critical area of improvement....
                                                                                                                        Speaker(s)
                                                                                                                        Speaker (confirmed)
                                                                                                                        Jason LaClair
                                                                                                                        Federal Business Developer
                                                                                                                        Corvus Consulting, LLC
                                                                                                                        Speaker (confirmed)
                                                                                                                        SGM Ray Reyes, USA (Ret.)
                                                                                                                        Corvus Consulting, LLC
                                                                                                                        Tracks:
                                                                                                                            ​Analysts struggle with identifying anomalies in encrypted data because of the volume of Open Source Intelligence (OSINT).  To address this, Perspecta has developed an interactive, artificial intelligence / machine-learning platform that extracts and highlights operationally relevant information from news and social media channels. Designed for the needs of the intelligence community, this solution used advanced Natural Language Processing (NLP) algorithms to track emerging patterns and trends in near real time. Analysts get an integrated dashboard that shows all open source intelligence channels. They can drill down to original OSINT information for more in-depth analysis, more readily reach conclusions about tone and... ...read more...
                                                                                                                            Speaker(s)
                                                                                                                            Speaker (confirmed)
                                                                                                                            Dave Dickey, Ph.D.
                                                                                                                            Lead Investigator & Intelligence Analyst
                                                                                                                            Perspecta
                                                                                                                            Speaker (confirmed)
                                                                                                                            Himanshu Garg
                                                                                                                            Chief Architect for Artificial Intelligence & Deep Learning Scientist
                                                                                                                            Perspecta
                                                                                                                            Tracks: