TechNet Augusta 2021 Sponsorship and Branding Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
Deadline to contract for 2021 Sponsorships is August 4th.
Sunday, August 15, 3:00 PM - 5:00 PM
- Room: Lower Reynolds Street Lobby
Monday, August 16, 7:30 AM - 7:00 PM
- Room: Lower Reynolds Street Lobby
Monday, August 16, 9:30 AM - 10:30 AM
Before you can explore the many ways in which Artificial Intelligence (AI) can be transformative within cybersecurity, you need to grasp what AI is and is not. In this session, we will define AI, the types of AI, and the various approaches - providing a framework for understanding the practical implications of AI within cybersecurity. At the end of the session, you will be able to identify the concepts that are foundational to AI and major high-level approaches to machine learning and deep learning and how it is being used to transform the technology we are using in our lines...
...read more...
Speaker(s)
Tracks:
Monday, August 16, 10:00 AM - 4:00 PM
- Room: Gordon Lakes Golf Course, Fort Gordon, GA
The AFCEA Augusta-Fort Gordon Chapter is excited to announce the TechNet Augusta Golf Tournament on Monday, August 16, 2021.
Join us on award-winning Gordon Lakes Golf Course, Fort Gordon, Georgia. Proceeds fund AFCEA's local STEM Education Programs.
Scramble Format with Shotgun Start at 10:00am
Lunch, drinks, range balls included
$100 Per Player/$45 for Active Duty Military
Mulligans available - $5 Each or 3 for $10
Sponsorships and Prize Donations available
Click here for more information and to register and/or sponsor!...
Tracks:
Monday, August 16, 11:00 AM - 12:00 PM
This lecture will cover the implications for DOD and potentially the rest of government on implementation of the CMMC practice.
Why is this certification needed?
What is different from CMMC than the NIST 800 standards?
What is the cost of the certification and is it reimbursable?
The course will conclude with information on the results of the Executive Order on CMMC....
Speaker(s)
Tracks:
Monday, August 16, 12:30 PM - 1:30 PM
"Oops! I probably should not have clicked that link"
The most terrifying words that a company IT professional ever hear. While there have been many discussions, publications, and webinars about data security, problem prevention, CMMC, and good cyber hygiene, does a company know what do when there has been a cyber event?
This seminar will address the immediate consequences, the fallout and potential costs associated with it, and most importantly, who pays for all of the costs of addressing the mess.
Cyber Insurance is one of the most important coverages that a business can have, but most executives know more about putting a...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 16, 1:00 PM - 2:00 PM
The Controlled Unclassified Information (CUI) security controls described by National Institute of Standards and Technology (NIST) Standards Publication (SP) 800-171 require that contractors have an incident response capability.
The DFARS rule also imposes cyber incident reporting as well. Both of these subjects, incident response and cyber incident reporting, are likely areas where contractors will struggle both in getting their Cybersecurity Maturity Model Certification (CMMC) certification and actually complying with their contracts. There are other bombshells and landmines in these requirements as well. As they often say, the devil is in the details.
This presentation will likely be like no other CMMC presentation...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 16, 2:00 PM - 5:00 PM
Join F5 and NGINX for a training focused on helping organizations meet Federal requirements around protecting applications with a Web Application Firewall (WAF). Specifically leveraging NGINX App Protect (NAP) to protect applications while supporting the Federal industry shift towards modern application development processes (containers, Kubernetes, microservices, DevOps, and DevSecOps).
NGINX App Protect delivers the best in class WAF capabilities you have come to expect from BIG-IP products, while being agile enough to be leveraged in in modern application architectures. Learn how to deploy NAP as a standalone ADC, a container as an Ingress Controller or even as part of your API Gateway capabilities.
During...
...read more...
Speaker(s)
Tracks:
Monday, August 16, 2:30 PM - 3:30 PM
Cutting-edge security begins with a rock-solid foundation that includes knowing with certainty what is in a network. While investments in quantum encryption, artificial intelligence, machine learning, and block-chain are interesting, none of it will matter without a strong foundation.
The SANS/CIS Top 20-an industry-recognized benchmark focusing on security tasks that have the greatest impact-lists, in priority order, areas upon which an organization should focus; a complete and thorough understanding of the organization's inventory tops that list. Intuitively, this make sense; if a company does not know what it has, it cannot adapt or defend it.
Accepting that inventory is a crucial first...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 16, 4:00 PM - 5:00 PM
Free online attendance available - to register, click here
Bob Dylan once wrote, "You don't need a weatherman to know which way the wind blows." Well, when it comes to the cloud, it seems that we're still struggling to figure out how to work securely in the cloud.
Join CompTIA's Dr. James Stanger has he discusses insights from working cloud security professionals around the world about what it means to secure the cloud. He’ll discuss seven practices that will help organizations navigate the most pressing cloud security issues of our time....
Speaker(s)
Tracks:
Monday, August 16, 5:00 PM - 7:00 PM
- Room: Marriott 9th Street Courtyard
Tracks:
Tuesday, August 17, 7:00 AM - 8:00 AM
Tuesday, August 17, 7:00 AM - 5:00 PM
- Room: Lower Reynolds Street Lobby
Tuesday, August 17, 8:00 AM - 8:15 AM
Tuesday, August 17, 8:15 AM - 9:00 AM
Tuesday, August 17, 9:00 AM - 10:00 AM
Tuesday, August 17, 9:30 AM - 11:30 AM
- Room: Olmstead/Courtyard/Surface Parking Lot
Tracks:
Tuesday, August 17, 9:30 AM - 5:30 PM
Tuesday, August 17, 9:45 AM - 10:15 AM
- Room: Barton Field, Fort Gordon
Tuesday, August 17, 10:00 AM - 11:00 AM
Overview of the newly developed Army Program Office for Information Advantage and the plan to integrate IA into the Army, define what Information Advantage, Information Advantage Activities is, and how these activities will support Unified Action during Multi-Domain Operations. ...
Speaker(s)
Handout(s)
Tuesday, August 17, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center
The AFCEA TECHNET Military/Collegiate CTF Competition is a 4-hour, jeopardy-Style competition for aspiring and seasoned cyber and cybersecurity professionals. This competition is a learning tool that will measure the participants current familiarity with various cybersecurity topics and will further sharpen the tools they have learned through education, training or self-learning. The CTF provides opportunities to share ideas amongst team members and with other teams, promoting the concept of continual learning for the Soldiers and students.
The Jeopardy-style CTF is similar to the actual Jeopardy game as the scoreboard looks like a Jeopardy board with different categories and point values. In this...
...read more...
Tracks:
Tuesday, August 17, 10:15 AM - 10:45 AM
Cyber Quest is an Army live prototype assessment (ALPA) event conducted annually at Fort Gordon, GA. Supported by government, industry and academia partners in the assessment of emerging Cyber, Electronic Warfare (EW), Signal, and Intelligence technologies to inform current capability development and rapid acquisition requirements....
Speaker(s)
Tuesday, August 17, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center Auditorium
Mr. Ross Guckert, Program Executive Officer for Program Executive Office Enterprise Information Systems (PEO EIS), will provide an overview of PEO EIS, organizational changes, and PEO EIS’s role in the Army’s Unified Network....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 17, 10:30 AM - 11:15 AM
Tuesday, August 17, 10:30 AM - 11:30 AM
The Army is diligently working with industry to develop capabilities to fill operational gaps that have materialized with the shift to Multi-Domain Operations (MDO) and operationalization of Information Advantage (IA) while focusing on Joint interoperability. As Army operations transform to a data-centric mindset from the enterprise to the tactical edge, the Army must ensure data is at the right place at the right time and in a format that can be identified, retrieved, and correlated quickly enough to speed decision cycles and provide commanders decision dominance. Signal and Cyber Warrant Officer (WO) skill sets, focus areas, and education are evolving...
...read more...
Speaker(s)
Tracks:
Tuesday, August 17, 11:00 AM - 12:00 PM
- Room: Georgia Cyber Center Auditorium
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 17, 11:30 AM - 1:30 PM
- Room: Olmstead/Courtyard/Surface Parking Lot
Tracks:
Tuesday, August 17, 12:00 PM - 12:30 PM
Overview of ACM Cyber portfolio and capabilities that will deliver decision dominance. Mission mapping and dependency modeling of mission critical systems to determine how the failure or degradation of a mission system(s) impacts their mission tasks and warfighting functions....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 17, 12:15 PM - 1:15 PM
DoD Weapon Systems are chock-full of digital components and generate massive amounts of Operational Technology (OT) data every day. They are more networked and software dependent than ever before, but many systems were designed before cyber security requirements existed. According to the GAO, during recent operational testing, the DoD routinely found mission-critical cyber vulnerabilities that could deny, degrade, or disable weapon systems. But can the data transmitted from these systems hold the key in their cyber defense? During this session, we will discuss the art and science of translating never before seen serial data into human-readable information and how the...
...read more...
Speaker(s)
Tracks:
Tuesday, August 17, 12:30 PM - 1:00 PM
Army Capability Manager Electronic Warfare overview of the rapidly developing electronic warfare systems supporting information advantage and information advantage activities....
Speaker(s)
Handout(s)
Tuesday, August 17, 1:15 PM - 2:45 PM
Tuesday, August 17, 1:30 PM - 2:30 PM
- Room: Georgia Cyber Center
We have reached capacity for this event, and registration is closed.
Event Organizer: Amentum and AFCEA International
Event Theme: Assuring an Operationally-Focused LVC Environment – Enabling the Warfighter’s Information Advantage
Description: Presenters will discuss their views (and how Govt and Industry should partner) on how best (given the threats and operational to deliver, secure, maintain and modify a realistic, high fidelity persistence training environment to conduct the spectrum of Information Dominance & Cyberspace Operations, providing a holistic, on-demand standardized training platform (s) enabling end-to-end planning, preparation, execution and assessment for Combatant Commands, Service Components (Army) and Strategic-Valued Coalition Partners. This will include a discussion (at the SECRET...
...read more...
Speaker(s)
Tuesday, August 17, 1:45 PM - 2:45 PM
The U.S. Army Cyber School (USACyS) will present an overview of the Army Cyber Corps focused on accessing, educating and employing the Cyber and Electromagnetic Warfare workforces. Included in this session are required capabilities for the USACyS and the future inclusion of Information Advantage in support Unified Action during Multi-Domain Operations....
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 17, 2:00 PM - 3:00 PM
Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don't trust approach applied to users and assets in yesterday's on-premise, perimeter-centric environments.
According to a recent survey, 100% of U.S. Federal Government agencies are storing sensitive data in third-party cloud, mobile, social, big data and IoT platforms, which inherently makes data vulnerable. Traditional perimeter protection does not protect off-premise data, which speaks to the need to take a zero trust approach to data security.
Attend this session discussion to learn about the best practices for implementing a zero trust...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 17, 2:45 PM - 3:45 PM
- Room: Georgia Cyber Center
We have reached capacity for this event, and registration is closed.
Event Organizer: Amentum and AFCEA International
Event Theme: Assuring an Operationally-Focused LVC Environment – Enabling the Warfighter’s Information Advantage
Description: Presenters will discuss their views (and how Govt and Industry should partner) on how best (given the threats and operational to deliver, secure, maintain and modify a realistic, high fidelity persistence training environment to conduct the spectrum of Information Dominance & Cyberspace Operations, providing a holistic, on-demand standardized training platform (s) enabling end-to-end planning, preparation, execution and assessment for Combatant Commands, Service Components (Army) and Strategic-Valued Coalition Partners. This will include a discussion (at the SECRET...
...read more...
Speaker(s)
Tuesday, August 17, 3:15 PM - 4:00 PM
Information Advantage enables our formations to deter adversaries, and achieve relative advantage through the application of Information Warfare. The 1st SFC (A) concept of Information Advantage is broadened and deepened to integrate multiple aspects of Integrated Information Warfare and is enabled by our global access and placement. It leverages both the technical and cognitive aspects of information to continuously see, sense, and act to compete in the physical and cognitive dimensions. 1st SFC seeks to achieve information advantage when we engage in competition with our adversaries, sustain strategic alliances and partnerships, and shape the operational environment in crisis and high-intensity...
...read more...
Speaker(s)
Tracks:
Tuesday, August 17, 4:00 PM - 5:30 PM
- Room: Olmstead/Courtyard/Surface Parking Lot
Tracks:
Wednesday, August 18, 7:00 AM - 9:00 AM
Wednesday, August 18, 7:00 AM - 5:00 PM
- Room: Lower Reynolds Street Lobby
Wednesday, August 18, 8:00 AM - 9:00 AM
The ever-increasing focus on ICS and IIOT continues to grow exponentially daily. From maritime to airborne to ground operations and everything in between the impact of digitizing everything possible provides both enhancements to operations and also increased vulnerabilities. How does that impact Cyber-Electromagnetic Activities (CEMA)? In this session, we will discuss:
Overview of ICS/IoT Capabilities as well as current and future trends
Mapping of trends/implementations to the CEMA models and objectives
IoT effects on Cyberspace Intelligence, Surveillance and Reconnaissance (ISR) and Operational Preparation of the Environment (OPE)
Operating and Defending the networks against IoT Threat Vectors
IoT for situational Awareness in support of commander's operation
Having...
...read more...
Speaker(s)
Tracks:
Handout(s)
Modernization of the Army Unified Network to enable decision-making, protection of information, and facilitate information advantage activities....
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 18, 9:15 AM - 10:00 AM
Wednesday, August 18, 10:00 AM - 4:00 PM
Wednesday, August 18, 10:15 AM - 11:15 AM
Computer Hardware, Enterprise Software and Solutions (CHESS) is the Army’s designated primary source for commercial IT. CHESS provides a no-fee, flexible procurement strategy through which an Army user may procure commercial-off-the-shelf (COTS) IT hardware, software and services via an e-commerce (IT e-mart) based process. CHESS offers simple, straightforward contract vehicles through its online Army e-commerce ordering system, the IT e-mart (https://chess.army.mil). These contracts provide continuous vendor competition for best value and consolidation of requirements to maximize cost avoidance and leverage the Army’s buying power....
Speaker(s)
Handout(s)
Wednesday, August 18, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center
This back-to-back keynote and panel session will focus on how the Army is modernizing tactical formations with expeditionary and intuitive communications systems today, and increasing capacity, resiliency and convergence for the future. It will outline the path ahead to Capability Sets 23 and 25, and address how the Army is leveraging Soldier feedback, as well as innovation from industry and S&T, to insert technologies that support Joint All-Domain Command and Control (JADC2) and Multi-Domain Operations (MDO)....
Speaker(s)
Tracks:
Wednesday, August 18, 10:30 AM - 11:15 AM
To ensure its ability to fight and win in a cyber-contested environment, the Army must transform battlefield software sustainment by enabling rapid capability fielding, real-time cyber protection, and software readiness. This discussion will focus on the U.S. Army Communications-Electronics Command Software Engineering Center’s pioneering efforts to field better software faster and more cost-effectively, and make cyber patching fast and easy for Soldiers. It will also focus on opportunities for industry to partner with the Army in this crucial initiative. ...
Speaker(s)
Tracks:
Wednesday, August 18, 10:30 AM - 11:30 AM
Virtualizing “The Edge”: Edge 2.0 – The edge is currently complex, vulnerable, and fragile. Today’s digital experiences require a combination of multiple networks, clouds, CDNs, and edges that are manually stitched together. This creates complexity because each platform has a unique set of tools and services and exposes new ways for attackers to exploit vulnerabilities. Current edge solutions do not provide the level of functionality or defense required by today’s digital enterprises. Learn how F5+Volterra will deliver a globally distributed app-to-app network that is security first, app-driven with an infinitely scalable edge capability to deliver a new, purely software-defined edge...
...read more...
Speaker(s)
Tracks:
Wednesday, August 18, 11:00 AM - 12:00 PM
- Room: Georgia Cyber Center Auditorium
This back-to-back keynote and panel session will focus on how the Army is modernizing tactical formations with expeditionary and intuitive communications systems today, and increasing capacity, resiliency and convergence for the future. It will outline the path ahead to Capability Sets 23 and 25, and address how the Army is leveraging Soldier feedback, as well as innovation from industry and S&T, to insert technologies that support Joint All-Domain Command and Control (JADC2) and Multi-Domain Operations (MDO)....
Speaker(s)
Tracks:
Wednesday, August 18, 11:30 AM - 1:30 PM
- Room: Olmstead/Courtyard/Surface Parking Lot
Tracks:
Wednesday, August 18, 11:45 AM - 12:45 PM
Information Technology (IT) and Operational Technology (OT) environments have coexisted for many years with some level of separation and distinction. Many critical infrastructure sectors have seen the IT and OT worlds converge from a technology perspective many years ago and in recent years there has been a new type of convergence occurring within IT and OT from the perspective of organization charts with a blending of personnel and leadership across traditional IT and OT areas of a company. These blended, dotted line organizations are pushed to balance the insatiable business hunger for operational data and providing support for the operational...
...read more...
Speaker(s)
Tracks:
What does the DODIN security architecture look like in light of Zero Trust? In this panel, DISA leaders will layout the latest in the way ahead for the DODIN security architecture as well as what changes we can expect to see beginning in 2023, which is right around the corner. If you want to get ahead of the curve, this is a "must see" session....
Speaker(s)
Tracks:
Wednesday, August 18, 1:00 PM - 2:00 PM
This session will focus on three key personnel initiatives designed to enhance Signal personnel supporting Multi-Domain formations. The first initiative is an update on enlisted convergence where we reduce the 25 career field from 17 to 7 MOSs. Next, we will provide our analysis and the way forward on Data Workforce. Finally, we will discuss our efforts to enhance our Warrant Officer professional education curriculum. ...
Speaker(s)
Handout(s)
Wednesday, August 18, 2:15 PM - 3:00 PM
Wednesday, August 18, 2:30 PM - 5:30 PM
Advance registration requested. Click here to register.
Join CompTIA, GDIT, Rackspace Technologies and Hewlett Packard Enterprise (HPE) to learn more about practical steps to ensure network resilience. This three-hour, online mini-bootcamp will center on the latest best practices for identifying, managing, monitoring and verifying a secure supply chain.
This event will include a panel discussing global Cyber Security Operations and how to leverage industry best practices to achieve cost savings, increased security, and greater network and service availability through consolidatedstandardize processes across the Department of Defense Information Networks (DODIN) worldwide.
In addition, there will be comprehensive presentations on how secure multi-cloud-as-a-service can help ensure...
...read more...
Speaker(s)
Tracks:
Wednesday, August 18, 4:00 PM - 5:00 PM
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, PenTest+, Linux+, and CASP+; 1 GIAC CPE; 1 CertNexus CFR CEC
AI/ML is becoming the norm for - and the new battleground between - bad actors and the good guys. Opportunities in both warfare and business are on the table. On this panel, cybersecurity leaders will discuss how government and industry are quickly adopting artificial intelligence and machine learning.
Topics will include:
Identifying key opportunities, threats, and challenges with AI/MI
Implementing AI/MI while maintaining good cyber hygiene to defend against rapidly evolving threats
Integrating AI/ML into existing infrastructure
Changing systems
Changing culture
Changing concepts of...
...read more...
Speaker(s)
Tracks:
Wednesday, August 18, 5:00 PM - 6:30 PM
Thursday, August 19, 7:00 AM - 8:00 AM
Thursday, August 19, 7:00 AM - 1:30 PM
- Room: Lower Reynolds Street Lobby
Thursday, August 19, 8:00 AM - 9:00 AM
Thursday, August 19, 8:30 AM - 10:00 AM
- Room: Olmstead/Courtyard/Surface Parking Lot
Thursday, August 19, 8:30 AM - 1:30 PM
Thursday, August 19, 9:15 AM - 10:15 AM
As more users gravitate to the Cloud and Smart Technologies there is an ever-present transmission of data from one point to another. With such an increase, it becomes more challenging for collectors and analysts alike to discern between the relevant intelligence information and the clutter. In this session, we will discuss how applying data science techniques can assist Cyber Electromagnetic Activities (CEMA) operators in processing Big Data while increasing analytic production. Specifics include:
Overview of Data Science in Cyber Operations
Shining the Light on Dark Data
Employing Data Science techniques to target specific information in a large data set
Utilizing processed information to satisfy data needs
Through...
...read more...
Speaker(s)
Tracks:
Handout(s)
Cyberspace threats are constantly evolving, transitioning between known, unknown, low risk, and high impact. This panel will explore the challenges and opportunities small businesses have found while trying to survive in the competitive world of government contracting. We will discuss the impacts and rewards of the Cyber Maturity Model, threat intelligence sharing, and cost management of cybersecurity....
Speaker(s)
Tracks:
Thursday, August 19, 9:30 AM - 10:00 AM
Thursday, August 19, 10:00 AM - 11:00 AM
Thursday, August 19, 10:30 AM - 11:30 AM
Speaker(s)
Tracks:
Handout(s)
Thursday, August 19, 11:30 AM - 1:30 PM
- Room: Olmstead/Courtyard/Surface Parking Lot
Tracks:
Thursday, August 19, 12:00 PM - 1:00 PM
Networks exist to connect users to services and applications, and network design should start with those services at the core. Total network security is nearly impossible. We must use anomalies to mitigate the damage. Secure Vector Routing (SVR) is a transformational new routing architecture (non-proprietary) that enables the network to differentiate the way it delivers applications and services with unmatched simplicity, security, and scalability. It replaces tunnel-based network overlays and inefficient provisioning systems with distributed control, simple intelligent service-based routing, and in-band (data plane) session-based signaling. SVR is fully compatible and interoperable with existing network protocols and architectures, allowing it to be gradually introduced into an existing IP...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 19, 1:30 PM - 2:15 PM
Thursday, August 19, 2:15 PM - 2:30 PM