TechNet Augusta 2021 Sponsorship and Branding Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
Please note that all times for TechNet Augusta are listed as Eastern Daylight Time (EDT).
Tuesday, January 26, 10:00 AM - 2:00 PM
Click here for more information and to register (separate registration required)...
Tracks:
Wednesday, January 27, 2:15 PM - 5:15 PM
Click here for more information...
Tracks:
Thursday, January 28, 10:00 AM - 2:00 PM
Click here for more information and to register (separate registration required)...
Tracks:
Tuesday, February 16, 8:00 AM - 9:00 AM
Tuesday, February 16, 1:00 PM - 1:25 PM
Tuesday, February 16, 1:30 PM - 2:00 PM
Tuesday, February 16, 2:00 PM - 2:15 PM
Tuesday, February 16, 2:15 PM - 3:00 PM
The Army Capability Manager for Electronic Warfare will provide an update on Terrestrial Layer System (TLS) Electronic Warfare Planning and Management Tool (EWPMT) as well as forecasts of new projects such as a requirement for a spectrum analyzer and real-time spectrum monitoring. The Army needs sensors to display in real-time both adversary and friendly emissions in the electromagnetic operating environment (EMOE), enabling deception and masking techniques to increase unit survival. Discussion will also include current progress on Electronic Warfare Planning and Management Tool (EWPMT) Terrestrial Layer System variants and ongoing efforts with Multi-Function Electronic Warfare Air (MFEW Air)....
Speaker(s)
Tuesday, February 16, 3:05 PM - 3:35 PM
To help the government obtain high-confidence analysis and more certain conclusions about data, Perspecta Labs has invested in the development of the cyber reconnaissance framework. This proof-of-principle implementation uses a data-driven, automated cyber collection pipeline that identifies information gaps, then strategizes and executes techniques to collect relevant data to fill those gaps. The result is a unified model for cyber intelligence gathering that supports operational priorities, informs decision makers, and dynamically adapts to available resources and current intelligence needs.
Our framework mitigates the information gaps in cyber intelligence and its application within cyber network defense. It goes a step beyond the...
...read more...
Speaker(s)
Tracks:
Tuesday, February 16, 3:35 PM - 3:45 PM
Tuesday, February 16, 3:45 PM - 4:30 PM
Tuesday, February 16, 4:35 PM - 5:05 PM
Deloitte TechTalk - Mission Understanding: Leveraging Data in Multi-Domain Operations
World Wide Technology TechTalk - Data Maturity Curve
RedHat TechTalk - Data Volume, Velocity, Variety, Veracity, and Value (DV5) in Multi-Domain Operations
...
Speaker(s)
Tracks:
Wednesday, February 17, 8:00 AM - 9:00 AM
Wednesday, February 17, 9:00 AM - 1:00 PM
Wednesday, February 17, 1:00 PM - 1:30 PM
Wednesday, February 17, 1:35 PM - 2:05 PM
Wildflower TechTalk - Protecting Your Cloud with a Zero Trust Environment
Dell Technologies TechTalk - Optimize business decisions with the power of AI
Hitachi Vantara Federal TechTalk - Data Management at Extreme Scale
...
Speaker(s)
Tracks:
Wednesday, February 17, 2:05 PM - 2:15 PM
Wednesday, February 17, 2:15 PM - 3:00 PM
Wednesday, February 17, 3:05 PM - 3:35 PM
Veeam TechTalk - Veeam Government Solutions: Learn More About Mission Critical Data Protection
Garrison TechTalk - Reaching the unreachable: exploiting multi-domain data
Recorded Future TechTalk - Threat Intelligence and Multi-Domain Operations Support
...
Speaker(s)
Tracks:
Wednesday, February 17, 3:35 PM - 3:45 PM
Wednesday, February 17, 3:45 PM - 4:30 PM
Wednesday, February 17, 4:35 PM - 5:05 PM
Tuesday, April 20, 12:01 AM - 11:59 PM
Tuesday, April 20, 8:00 AM - 6:00 PM
Tuesday, April 20, 1:15 PM - 1:25 PM
Tuesday, April 20, 1:30 PM - 2:00 PM
Tuesday, April 20, 2:00 PM - 2:15 PM
Tuesday, April 20, 2:15 PM - 3:00 PM
Tuesday, April 20, 3:05 PM - 3:35 PM
Deloitte TechTalk - Resilient Communications in a Contested MDO Environment
Pure Storage TechTalk - Addressing Data Security Challenges in Support of Multi-Domain Operations
Wildflower TechTalk - Protecting Your Cloud with a Zero Trust Environment
...
Speaker(s)
Tracks:
Tuesday, April 20, 3:35 PM - 3:45 PM
Tuesday, April 20, 3:45 PM - 4:30 PM
Tuesday, April 20, 4:35 PM - 5:05 PM
General Dynamics Mission Systems TechTalk - Tactical Cross Domain Solution - TACDS ®
Sterling TechTalk - Resilient Communications in a Contested Multi-Domain Operation from Client to Cloud
Verizon/Taqtile TechTalk - Verizon DoD 5G Use Case: Augmented and Virtual Reality Training (featuring Taqtile)
...
Speaker(s)
Tracks:
Wednesday, April 21, 12:01 AM - 11:59 PM
Wednesday, April 21, 8:00 AM - 6:00 PM
Wednesday, April 21, 1:00 PM - 1:50 PM
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 21, 1:50 PM - 2:10 PM
Wednesday, April 21, 2:05 PM - 2:15 PM
Wednesday, April 21, 2:15 PM - 3:00 PM
Wednesday, April 21, 3:05 PM - 3:35 PM
Leonardo DRS TechTalk - Vehicle Integrated Power
NetApp TechTalk - NetApp Support to Joint Multi-Domain Operations
ViaSat TechTalk - Kill the Exquisite Kill Chain and Build a Resilient Kill Chain
...
Speaker(s)
Tracks:
Wednesday, April 21, 3:35 PM - 3:45 PM
Wednesday, April 21, 3:45 PM - 4:30 PM
Wednesday, April 21, 4:35 PM - 5:05 PM
Fidelis Security TechTalk - There's No Better Trap than Deception
Tanium TechTalk - Got Cyber Resilience?
...
Speaker(s)
Tracks:
Tuesday, May 18, 12:01 AM - 11:59 PM
Tuesday, May 18, 8:00 AM - 6:00 PM
Tuesday, May 18, 10:00 AM - 11:00 AM
THE SESSION PRESENTER WILL BE AVAILABLE TO FIELD QUESTIONS VIA CHAT DURING THIS TIMESLOT THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants)
Is the U.S. Cyber Strategy 30 Years Behind Our Health Care Strategy?
In this presentation I posit there is a growing set of problems and corresponding remediation measures many, including the recent Cyberspace Solarium Commission Report authors glossed over or missed entirely. My purpose is to invite a changed narrative to supplement the existing constructiveapproaches being taken today.
Why a supplemental narrative/discussion?
• If 80%+ of cybersecurity issues are due to human elements, why was there not...
...read more...
Speaker(s)
Tracks:
Tuesday, May 18, 11:00 AM - 11:45 AM
The digitization of the U.S. economy, society, government, and military looms larger by the day. While hardware and software can be produced, reprogrammed, or upgraded relatively quickly, the human-talent challenge is the proverbial “Long Pole of Tent” that will shield our nation and its people from harm. Many talent-development programs have been implemented by the U.S. government, industry, and state governments. Yet, one proven innovation in talent development remains untapped: the establishment of a federal service academy devoted to the challenge of digitization, with emphasis on cyber security and artificial intelligence....
Speaker(s)
Handout(s)
Tuesday, May 18, 1:15 PM - 1:30 PM
Tuesday, May 18, 1:30 PM - 2:00 PM
Tuesday, May 18, 2:00 PM - 2:15 PM
Tuesday, May 18, 2:15 PM - 3:00 PM
Tuesday, May 18, 3:05 PM - 3:35 PM
Tuesday, May 18, 3:35 PM - 3:45 PM
Tuesday, May 18, 3:45 PM - 4:30 PM
As Signal, Cyber, and EW capabilities rapidly develop and evolve to enhance the Department of Defense’s ability to compete, penetrate, disintegrate, exploit, and re-compete in Multi-Domain Operations (MDO), we strive to maintain the ability to adequately train our workforce to employ, maintain, and provide instruction on these capabilities. Technology is advancing at a pace that makes it a challenge to keep educational curriculum and mechanisms updated to enable the DoD workforce to leverage this technology to provide commanders the data they need to achieve and maintain decision dominance. Emerging technologies and the proliferation of data-centric capabilities have the potential to...
...read more...
Speaker(s)
Tracks:
Wednesday, May 19, 12:01 AM - 11:59 PM
Wednesday, May 19, 8:00 AM - 6:00 PM
Wednesday, May 19, 11:00 AM - 11:45 AM
Stress-related issues appear to be causing an elevated and concerning level of suicides among Defense and Intelligence Community cyber personnel who staff the front-line desks that defend American infrastructure and related US assets against foreign intrusion, but many refuse to seek mental health treatment as doing so may jeopardize their security clearance. Members of the AFCEA Cyber Committee have been working with government partners to attempt to identify causes and influences, as well as possible changes in current protocol and available technology or solutions, to ensure these critical workers can continue to do their jobs while addressing their mental health....
Speaker(s)
Wednesday, May 19, 12:00 PM - 12:45 PM
Wednesday, May 19, 1:15 PM - 1:35 PM
Wednesday, May 19, 1:35 PM - 2:05 PM
Wednesday, May 19, 2:05 PM - 2:15 PM
Wednesday, May 19, 2:15 PM - 3:15 PM
Wednesday, May 19, 3:20 PM - 3:50 PM
Wednesday, May 19, 3:50 PM - 4:00 PM
Wednesday, May 19, 4:00 PM - 4:45 PM
Wednesday, May 19, 4:45 PM - 5:00 PM
Wednesday, May 19, 6:00 PM - 11:59 PM
THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants)
This lecture will cover the implications for the Department of Defense (DoD) and potentially the rest of the government on the implementation of the CMMC practice
-Why is this certification needed?
-What is the difference between CMMC and the National Institute of Standards and Technology (NIST) 800 standards?
-What is the cost of the certification and is it reimbursable?
The attendee should come away with the latest information on the CMMC process and where it stands as of April 2021.
...
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP+; 1 GIAC CPE
Because it can be so lucrative, malware has emerged as a favorite of attackers who have turned cybercrime into a big-money endeavor. Learn how threat actors are targeting organizations with frightening effectiveness by researching their human targets before launching a malware attack. Once the victim is chosen and the malware deployed, the threat actor remains connected, lurking on victims' computers until they can grab banking details, credit card data, and other sensitive information. This session shows how attackers know their victims and targets better than they...
...read more...
Speaker(s)
Tracks:
High speed networks are the critical foundation that supports many of an agencys most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle attacks, and metadata exposure leave agencies susceptible to a range of devastating repercussions.
So, what is the best way to protect network traffic? Encrypt everywhere-between data centers and headquarters to backup and disaster recovery sites, whether on premises or in the cloud.
This session will discuss...
...read more...
Speaker(s)
Tracks:
Cutting-edge security begins with a rock-solid foundation that includes knowing with certainty what is in a network. While investments in quantum encryption, artificial intelligence, machine learning, and block-chain are interesting, none of it will matter without a strong foundation. The SysAdmin, Audit, Network and Security (SANS)/Center for Internet Security (CIS) (SANS/CIS) Top 20-an industry-recognized benchmark focusing on security tasks that have the greatest impact-lists, in priority order, areas upon which an organization should focus; a complete and thorough understanding of the organizations inventory tops that list. Intuitively, this make sense; if a company does not know what it has, it...
...read more...
Speaker(s)
Tracks:
THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants)
There exists a missing link in classified network physical security specifically dealing with the endpoint embracing the connection from the wall to the desktop and the network user interface. This gap in protection has been virtually ignored, enabling catastrophic breaches in security from insider threats, most notably, Bradley (Chelsea) Manning and Edward Snowden.
This session focuses on the nature of the insider threat as it relates to the network endpoint. The discussion covers shortcomings of existing policies and how archaic countermeasures have not kept pace with technology and emerging threats. ...
...read more...
Speaker(s)
Tracks:
Is the U.S. Cyber Strategy 30 Years Behind Our Health Care Strategy?
In this presentation I posit there is a growing set of problems and corresponding remediation measures many, including the recent Cyberspace Solarium Commission Report authors glossed over or missed entirely. My purpose is to invite a changed narrative to supplement the existing constructiveapproaches being taken today.
Why a supplemental narrative/discussion?
• If 80%+ of cybersecurity issues are due to human elements, why was there not a single recommendation addressing the most important human element at all - Character.
• Because, as virtually ALL indicators attest, the problem is getting worse,...
...read more...
Tracks:
THE SESSION WILL BE VIEWABLE ON-DEMAND THROUGHOUT THE SERIES (by full Series registrants)
Join Mark Baggett as he discusses new tools and some new features of older tools that enhance your threat hunting capability. This short one hour talk will provide you with the insight you need to begin using these to for hunting phishing domains and command and control channels on your networks. All of these free tools for incident responders, forensicators, threat hinters and network defenders are available today to everyone that attends....
Speaker(s)
Tracks:
THIS SESSION WILL BE AVAILABLE FOR ON-DEMAND VIEWING THROUGHOUT THE SERIES
Mobile devices are often discussed in terms of organizational risk and while there certainly is the potential, this session will discuss how organizations can utilize mobile devices to bolster security.
Technologies previously cost prohibitive to smaller oganizations can now be leveraged including:
Two-Factor Authentication
Employee Tracking
Physical Access Controls
Combining mobile device security with traditional authentication methods have the opportunity to strengthen organizational information security posture....
Speaker(s)
Tracks:
Modern combat vehicles, even more so than their civilian counterparts, are effectively mobile processing networks. A typical vehicle contains over one hundred microprocessors, globally sourced with each processor running millions of lines of software code with uncertain provenance and uneven quality. Many of our adversaries wield remarkably effective hacking skills, and by its nature, the advantage in cybersecurity goes to the attacker because a defender must defend all his assets while the attacker can choose any point of attack. To address this challenge, L3Harris recently developed a novel Model Based System Engineering (MBSE) approach to model and simulate the integration...
...read more...
Speaker(s)
Tracks:
Today’s modern battlefield is a dynamic conglomeration of ground, air, and satellite surveillance tightly intertwined with critically timed communications, sequential tasks, and complex interdependencies between dispersed warfighters, command elements, and multiple tiers of mission systems. The continuity of these entities is essential for providing key information necessary for timely and strategic decision-making. Data proceeding from these collective resources must be gathered and organized in a manner conducive to efficient, secure, and reliable analysis and dissemination, whether at the strategic apex, the tactical edge, or some node in between.
Accordingly, failure along this network can have compounding effects, negatively impacting the execution...
...read more...
Speaker(s)
Tracks:
The Army requires long-range electronic warfare (EW) sensors and/or antenna built in a small deployable form-factor that can achieve ranges greater than 40 kilometers.
Applied Signals Intelligence, Inc. (ASI) understands the importance to be able to detect, identify, and locate electromagnetic spectrum (EMS) signatures at significant distances to provide friendly and adversary situational awareness and to enable lethal and non-lethal targeting capabilities in large areas of operations.
ASI is currently supplying long-range electronic warfare (EW) systems built in a small deployable form-factor that can achieve ranges greater than 40 kilometers to various military organizations. The sensors are based on ASI’s recent advance...
...read more...
Speaker(s)
Tracks:
Commercial SATCOM is leading the satellite industry with evolutionary Low Earth Orbit (LEO) satellites that can provide greater network throughput and support smaller and mobile satellite terminals. There is also a large infrastructure-based capital expenditure requirement to support these LEO assets and an added cost to set up these networks with the latest technologies. Government owned satellite networks are expensive and are at a technological disadvantage compared to their commercial counterparts in regard to size, scale, and price as well as the immense amount of resources required to operate and maintain these networks. Additionally, near-peer adversaries are aware of Government...
...read more...
Speaker(s)
Tracks:
The Department of Defense is faced with high degrees of difficulty regarding the state of their data and the ability to turn this data into meaningful information on a timely basis. As technological capabilities advance around data acquisition, more data comes faster and more efficiently than ever before. As a result, the size and scope of the “big-data” dilemma that faces the whole world becomes especially problematic in the defense arena. This is true at nearly every step in the data management process, including: collecting, accessing, cleaning, transmitting, analyzing, securing and storing joint operational data.
In addition, an even more critical...
...read more...
Speaker(s)
Tracks:
Concerns about active RF interrogation are well known. RF interrogation of communication, radar and combat systems enable the interrogator to determine the operating characteristics of that equipment and potentially to conduct electronic warfare. Protective covers manufactured from RF shielding drapable materials, developed under a Cooperative Research and Development Agreement with Naval Surface Warfare Center Port Hueneme Division, prevent both asset interrogation and electronic warfare.
The RF shielding material can also prevent the scanning of a sensitive asset to determine its shape. This step is critical if the asset’s performance can be deduced by knowing its shape. The material, with slight modification,...
...read more...
Speaker(s)
Tracks:
Real-time Spectrum visualization absolutely relies upon intelligence and sensor information, yet the fields are slow in coming together to trade and integrate data. As intelligence, signal, cyber and electronic warfare work more closely together, this relationship and the associated real-time data exchange requirement emerges as a critical area of improvement....
Speaker(s)
Tracks:
Analysts struggle with identifying anomalies in encrypted data because of the volume of Open Source Intelligence (OSINT). To address this, Perspecta has developed an interactive, artificial intelligence / machine-learning platform that extracts and highlights operationally relevant information from news and social media channels.
Designed for the needs of the intelligence community, this solution used advanced Natural Language Processing (NLP) algorithms to track emerging patterns and trends in near real time. Analysts get an integrated dashboard that shows all open source intelligence channels. They can drill down to original OSINT information for more in-depth analysis, more readily reach conclusions about tone and...
...read more...
Speaker(s)
Tracks: