TechNet Augusta 2024 Supporting Partner Opportunities


AFCEA has developed an enhanced supporting partner program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories such as Patron Packages, Branding and Individual Opportunities.

Deadline to purchase a Supporting Partnership is July 10th.

AFCEA Greater Augusta Chapter Course: CMMC: Ingenious Solution, Pipedream, Wrecking Ball, or Trojan Horse

  • Room: Lamar B/C
Monday, August 19, 2024: 2:30 PM - 3:30 PM

Speaker(s)

Speaker (confirmed)
Greg Fordham
Founder & Chief Executive Officer
Celestial Defense

Description

Cybersecurity Maturity Model Certification (CMMC) and the rest of the DoD rules for safeguarding Controlled Unclassified Information (CUI) provide a stout framework for combating cyber threats.  The question is at what cost and what will they actually accomplish?

DoD admits that just the CMMC assessment and certification requirements impose recurring contractor investments from hundreds of thousands to millions of dollars depending on contractor size.  In addition, there is no meaningful limit to what data can be covered, how it will be managed or how the requirements can be tailored.  The cost problem is further amplified with mandatory flow downs and broad-based applicability requirements that strangle operational effectiveness and efficiency at every level.  As a result, the oversight solution is commercially impractical based on DoD’s performance with other contractor business system reviews.  For anyone left standing, the consequence of reporting the inevitable cyber incident should send them packing. Then sadly, while the rules may suffice for garden variety cyber threats, for the nation state actors for whom the rules were intended, there are visible and glaring gaps.  Learn about these issues and then decide for yourself if CMMC is an ingenious solution, pipedream, wrecking ball or trojan horse.


Tracks:


Handouts



Click here for Continuing Education approvals