TechNet Augusta 2023 Sponsorship Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
The deadline to purchase a sponsorship at TechNet Augusta is July 14th, 2023.
Sunday, August 13, 1:00 PM - 4:00 PM
- Room: Olmstead Street Level Foyer
Monday, August 14, 7:30 AM - 4:30 PM
- Room: Olmstead Street Level Foyer
Monday, August 14, 8:00 AM - 12:00 PM
Monday, August 14, 9:30 AM - 10:30 AM
In this briefing on practical AI for Cyber Operations, Stephen Scarbrough from IntelliGenesis LLC, shares his expertise on how AI can be utilized to improve cybersecurity. Scarbrough discusses the benefits and limitations of AI in cyber operations and provides insights on selecting the right algorithms and techniques for specific use cases. He also emphasizes the importance of data quality and data management in the success of AI-based solutions.
Through real-world examples and case studies, Scarbrough highlights how AI can enhance threat detection, response, and mitigation. Overall, the briefing provides valuable insights for organizations looking to leverage AI in their cybersecurity strategy....
Speaker(s)
Tracks:
Monday, August 14, 10:30 AM - 5:00 PM
- Room: Gordon Lakes Golf Course
CLICK HERE for details, sponsorships, and registration...
Tracks:
Monday, August 14, 11:00 AM - 12:00 PM
In this session Stephen Scarbrough from IntelliGenesis sheds light on the increasing vulnerability of Industrial Control Systems (ICS) to cyber-attacks. Scarbrough emphasizes that ICS are critical components of various industries such as energy, transportation, and manufacturing, and a successful cyber-attack on these systems can have catastrophic consequences to mission success. Mr. Scarbrough discusses the unique challenges in securing ICS and shares his insights on how organizations can improve their defense mechanisms.
Through real-world examples and case studies, he will highlight the potential impact of a cyber-attack on ICS and the need for proactive measures to mitigate this threat. Overall, the briefing...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 1:00 PM - 2:00 PM
Before you can explore the many ways in which Artificial Intelligence (AI) can be transformative within cybersecurity, you need to grasp what AI is and is not. In this session, we will define AI, the types of AI, and the various approaches - providing a framework for understanding the practical implications of AI within cybersecurity. At the end of the session, you will be able to identify the concepts that are foundational to AI and major high-level approaches to machine learning and deep learning and how it is being used to transform the technology we are using in our lines...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 1:00 PM - 4:30 PM
Monday, August 14, 2:30 PM - 3:30 PM
For over a decade the Department of Defense (DoD) has been trying to increase the cyber security capability of its contractors. That effort, now in its fifth iteration, has included mandated improvements in computer security controls as well as in after the fact forensic analysis of cyber incidents.
This presentation examines the current state of the computer security requirements that have been imposed on contractors to protect Controlled Unclassified Information, what constitutes a cyber incident, a contractor's duties for forensically analyzing and reporting a cyber incident, and finally, it examines what is missing from the entire program that will keep it...
...read more...
Speaker(s)
Tracks:
As the technology dependence of our nation continues to grow exponentially the ability to protect citizens, critical infrastructure and the vast amount of data requires a prepared and agile cybersecurity workforce. The ability to collect and interpret large amounts of data is critical. Open-Source Intelligence gathering or the ability to gather intelligence through publicly available data and social media is highly effective. While analyst often have access to tremendous amounts of data, their ability to interpret can be significantly negatively impacted if the analyst only speaks and read English. ...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 4:00 PM - 5:00 PM
The DoD is implementing a Cybersecurity Maturity Model Certification (CMMC) that offers a consistent roadmap for the Defense Industrial Base (DIB), and beyond, to mature its overall Cybersecurity capabilities in a proactive way to enhance their business case, protect their brand, while protecting our Nation’s Economy and Security. The CMMC ecosystem consists of various organizations managed and coordinated by the CyberAB and the Cybersecurity Assessor and Instructor Certification Organization (CAICO), they currently include:
Organizations Seeking Compliance (OSC)
CMMC Third-Party Assessment Organizations (C3PAO)
Provisional Assessors/ Certified CMMC Professionals/ Certified CMMC Assessors
Registered Practitioner Organization (RPO)
Registered Practitioner (RP)/ Registered Practitioner Advanced (RPA)
Licensed Publishing Partners (LPPs)/ Licensed...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 4:30 PM - 8:00 PM
- Room: Print Your Badge Station, 2nd Fl Above Main Lobby
Monday, August 14, 7:00 PM - 9:00 PM
Tuesday, August 15, 6:30 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Tuesday, August 15, 7:00 AM - 8:00 AM
Tuesday, August 15, 8:00 AM - 10:00 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Tuesday, August 15, 9:30 AM - 11:30 AM
Tuesday, August 15, 9:30 AM - 5:30 PM
Tuesday, August 15, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center Virtual World/Virtual
The AFCEA CERTS Military/Collegiate CTF Competition is a 4-hour, jeopardy-Style competition for aspiring and seasoned cyber and cybersecurity professionals. This competition is a learning tool that will measure the participants current familiarity with various cybersecurity topics and will further sharpen the tools they have learned through education, training or self-learning. The CTF provides opportunities to share ideas amongst team members and with other teams, promoting the concept of continual learning for the Soldiers and students.
The Jeopardy-style CTF is similar to the actual Jeopardy game as the scoreboard looks like a Jeopardy board with different categories and point values. In this...
...read more...
Tracks:
Tuesday, August 15, 10:15 AM - 11:15 AM
Tuesday, August 15, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center Auditorium
Tracks:
Tuesday, August 15, 10:30 AM - 11:30 AM
Tuesday, August 15, 11:00 AM - 12:30 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Tuesday, August 15, 11:30 AM - 1:30 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Tuesday, August 15, 12:30 PM - 1:45 PM
- Room: Oglethorpe Ballroom A-E
Tracks:
Tuesday, August 15, 2:00 PM - 3:00 PM
Tuesday, August 15, 2:00 PM - 3:30 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Tuesday, August 15, 3:00 PM - 4:15 PM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Tuesday, August 15, 3:00 PM - 4:30 PM
Tuesday, August 15, 4:15 PM - 5:30 PM
Wednesday, August 16, 7:00 AM - 9:00 AM
Wednesday, August 16, 7:00 AM - 6:00 PM
- Room: Olmstead Street Level Foyer
Wednesday, August 16, 8:00 AM - 9:00 AM
Wednesday, August 16, 9:15 AM - 10:15 AM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Wednesday, August 16, 9:30 AM - 11:00 AM
Wednesday, August 16, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center Virtual World/Virtual
The High School/Middle School Capture the Flag will be a Jeopardy-style event. Schools from the Central Savannah River Area (CSRA) will compete, highlighting their skills, resiliency, and achievements. Topics covered for this event will include Binary Exploitation, Reverse Engineering, Web Exploitation, Cryptography, Forensics, and Security.
CLICK HERE for more information and to register a team....
Tracks:
Wednesday, August 16, 10:00 AM - 4:00 PM
Wednesday, August 16, 10:30 AM - 11:00 AM
- Room: Georgia Cyber Center Auditorium
Tracks:
Wednesday, August 16, 10:30 AM - 11:30 AM
No situations are risk free! Implementing risk management is a key to good decision-making and is essential for strong cybersecurity.
Due to dependence on information technology, leaders in most fields need to understand cybersecurity vulnerabilities and mitigation options. Join our panel of ROTC cadets as they share their opinions on application of theoretical lessons in cybersecurity to risk management challenges and opportunities they might face in the military.
Questions for the panelists will include:
What lessons, either academic or experiential, have been most helpful in forming your concept of cybersecurity risk management?
What to you think is the nation's greatest cybersecurity threat?
Which concepts do...
...read more...
Tracks:
Wednesday, August 16, 10:45 AM - 11:45 AM
- Room: Georgia Cyber Center
Details pending. Space extremly limited. Separate registration required. Session will be repeated at 12:15pm....
Wednesday, August 16, 11:00 AM - 12:30 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Wednesday, August 16, 11:30 AM - 1:30 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Wednesday, August 16, 12:15 PM - 1:15 PM
- Room: Georgia Cyber Center
Details pending. Space extremly limited. Separate registration required. Session is a repeat of the 1045-1145 session....
Wednesday, August 16, 1:30 PM - 2:15 PM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Wednesday, August 16, 1:30 PM - 4:30 PM
Wednesday, August 16, 2:30 PM - 3:30 PM
Wednesday, August 16, 2:30 PM - 4:00 PM
Wednesday, August 16, 2:45 PM - 3:15 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Wednesday, August 16, 3:15 PM - 4:45 PM
- Room: Georgia Cyber Center Auditorium
Tracks:
Wednesday, August 16, 4:00 PM - 5:00 PM
- Room: Oglethorpe Ballroom A-E
The U.S. Government has embarked on an endeavor to improve cyber security, including critical infrastructure by migrating to zero trust architecture with the deadline for executive departments and agencies to meet specific standards and objectives by the end of FY 2024.
OMB Memo M-22-09 states, The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once...
...read more...
Tracks:
Wednesday, August 16, 5:00 PM - 6:30 PM
Please join us in the Riverwalk Hallway at the conclusion of the AFCEA IDEA Senior Cyber Leaders Panel on Moving Toward Zero Trust Cybersecurity Principles for a networking reception that also features a student poster show and cyber demonstration.
CLICK HERE for additional information on the Poster Show....
Tracks:
Wednesday, August 16, 6:00 PM - 9:00 PM
Thursday, August 17, 7:00 AM - 8:00 AM
Thursday, August 17, 7:00 AM - 8:15 AM
Thursday, August 17, 7:00 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Thursday, August 17, 8:00 AM - 8:45 AM
- Room: Oglethorpe Ballroom A-E
Tracks:
Thursday, August 17, 8:00 AM - 3:30 PM
- Room: Georgia Cyber Center Classrooms
Thursday, August 17, 8:30 AM - 10:00 AM
Thursday, August 17, 8:30 AM - 1:00 PM
Thursday, August 17, 9:00 AM - 10:00 AM
Thursday, August 17, 9:00 AM - 1:00 PM
Thursday, August 17, 9:30 AM - 10:00 AM
- Room: Georgia Cyber Center Auditorium
Tracks:
Thursday, August 17, 10:00 AM - 11:00 AM
- Room: Oglethorpe Ballroom A-E
Each of these leaders and their commands have a critical role in Enabling a Data-Centric Army. It is imperative that there’s synchronization across these commands as the network is developed and built, operated, evaluated, and sustained.. This session will discuss respective roles and the synchronization entailed in Enabling a Data-Centric Army, including how JFHQ-DODIN drives unified action across the DoD to secure, operate, and defend the DoD Information Network....
Speaker(s)
Tracks:
Thursday, August 17, 10:00 AM - 11:30 AM
- Room: Georgia Cyber Center Auditorium
Tracks:
Thursday, August 17, 11:00 AM - 1:00 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Thursday, August 17, 12:30 PM - 1:30 PM
- Room: Oglethorpe Ballroom A-E
Speaker(s)
Tracks:
Thursday, August 17, 4:00 PM - 6:00 PM
Thursday, August 17, 5:30 PM - 7:00 PM
- Room: Print Your Badge Station, 2nd Fl Above Main Lobby
Thursday, August 17, 6:00 PM - 8:00 PM